Search results for: founding ownership teams
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1052

Search results for: founding ownership teams

752 Scalable CI/CD and Scalable Automation: Assisting in Optimizing Productivity and Fostering Delivery Expansion

Authors: Solanki Ravirajsinh, Kudo Kuniaki, Sharma Ankit, Devi Sherine, Kuboshima Misaki, Tachi Shuntaro

Abstract:

In software development life cycles, the absence of scalable CI/CD significantly impacts organizations, leading to increased overall maintenance costs, prolonged release delivery times, heightened manual efforts, and difficulties in meeting tight deadlines. Implementing CI/CD with standard serverless technologies using cloud services overcomes all the above-mentioned issues and helps organizations improve efficiency and faster delivery without the need to manage server maintenance and capacity. By integrating scalable CI/CD with scalable automation testing, productivity, quality, and agility are enhanced while reducing the need for repetitive work and manual efforts. Implementing scalable CI/CD for development using cloud services like ECS (Container Management Service), AWS Fargate, ECR (to store Docker images with all dependencies), Serverless Computing (serverless virtual machines), Cloud Log (for monitoring errors and logs), Security Groups (for inside/outside access to the application), Docker Containerization (Docker-based images and container techniques), Jenkins (CI/CD build management tool), and code management tools (GitHub, Bitbucket, AWS CodeCommit) can efficiently handle the demands of diverse development environments and are capable of accommodating dynamic workloads, increasing efficiency for faster delivery with good quality. CI/CD pipelines encourage collaboration among development, operations, and quality assurance teams by providing a centralized platform for automated testing, deployment, and monitoring. Scalable CI/CD streamlines the development process by automatically fetching the latest code from the repository every time the process starts, building the application based on the branches, testing the application using a scalable automation testing framework, and deploying the builds. Developers can focus more on writing code and less on managing infrastructure as it scales based on the need. Serverless CI/CD eliminates the need to manage and maintain traditional CI/CD infrastructure, such as servers and build agents, reducing operational overhead and allowing teams to allocate resources more efficiently. Scalable CI/CD adjusts the application's scale according to usage, thereby alleviating concerns about scalability, maintenance costs, and resource needs. Creating scalable automation testing using cloud services (ECR, ECS Fargate, Docker, EFS, Serverless Computing) helps organizations run more than 500 test cases in parallel, aiding in the detection of race conditions, performance issues, and reducing execution time. Scalable CI/CD offers flexibility, dynamically adjusting to varying workloads and demands, allowing teams to scale resources up or down as needed. It optimizes costs by only paying for the resources as they are used and increases reliability. Scalable CI/CD pipelines employ automated testing and validation processes to detect and prevent errors early in the development cycle.

Keywords: achieve parallel execution, cloud services, scalable automation testing, scalable continuous integration and deployment

Procedia PDF Downloads 48
751 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 804
750 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.

Keywords: caliphate, jihad, ASEAN, counterterrorism, social community

Procedia PDF Downloads 234
749 Public-Private Partnership for Community Empowerment and Sustainability: Exploring Save the Children’s 'School Me' Project in West Africa

Authors: Gae Hee Song

Abstract:

This paper aims to address the evolution of public-private partnerships for mainstreaming an evaluation approach in the community-based education project. It examines the distinctive features of Save the Children’s School Me project in terms of empowerment evaluation principles introduced by David M. Fetterman, especially community ownership, capacity building, and organizational learning. School Me is a Save the Children Korea funded-project, having been implemented in Cote d’Ivoire and Sierra Leone since 2016. The objective of this project is to reduce gender-based disparities in school completion and learning outcomes by creating an empowering learning environment for girls and boys. Both quasi-experimental and experimental methods for impact evaluation have been used to explore changes in learning outcomes, gender attitudes, and learning environments. To locate School Me in the public-private partnership framework for community empowerment and sustainability, the data have been collected from School Me progress/final reports, baseline, and endline reports, fieldwork observations, inter-rater reliability of baseline and endline data collected from a total of 75 schools in Cote d’Ivoire and Sierra Leone. The findings of this study show that School Me project has a significant evaluation component, including qualitative exploratory research, participatory monitoring, and impact evaluation. It strongly encourages key actors, girls, boys, parents, teachers, community leaders, and local education authorities, to participate in the collection and interpretation of data. For example, 45 community volunteers collected baseline data in Cote d’Ivoire; on the other hand, three local government officers and fourteen enumerators participated in the follow-up data collection of Sierra Leone. Not only does this public-private partnership improve local government and community members’ knowledge and skills of monitoring and evaluation, but the evaluative findings also help them find their own problems and solutions with a strong sense of community ownership. Such community empowerment enables Save the Children country offices and member offices to gain invaluable experiences and lessons learned. As a result, empowerment evaluation leads to community-oriented governance and the sustainability of the School Me project.

Keywords: community empowerment, Cote d’Ivoire, empowerment evaluation, public-private partnership, save the children, school me, Sierra Leone, sustainability

Procedia PDF Downloads 126
748 Accessibility of the Labor Market in Indonesian Cities

Authors: Hananto Prakoso, Jean-Pierre Orfeuil

Abstract:

The relationship between city size, urban transport efficiency (speed), employment proximity (distance) and accessibility of labour market is rarely examined especially in developing countries. This paper reveals the relationship using 2 points of views (active population and company). Then the analysis is divided according to 3 transport modes (car, public transport and motorcycle) and takes into account the vehicle ownership rate. We employ data across 111 districts in 4 big cities of Indonesia. In our result, speed indicator contributed positively to accessibility of labour market while distance elasticity is negative. In absolute value, elasticity of speed indicator is higher than that of distance.

Keywords: labour market, travel time, travel cost threshold, transportation

Procedia PDF Downloads 377
747 Challenges Faced by Family-Owned Education Institutions in Nepal in Implementing Effective Succession Planning Strategies

Authors: Arpan Upadhyaya, Sunaina Kuknor

Abstract:

The paper examines the succession management strategies and the preparation level of heirs in the context of family-owned educational institutions in Nepal. Sixteen in-depth, semi-structured interviews with the institution's leader were conducted. The study's findings show the lack of awareness about the importance of succession planning among the institution owners due to the availability of limited resources. The paper also provides some insights into how family ownership and management are done and the lack of formal processes in succession management strategies. It will aid researchers in considering the societal perspective of the successor, which is also a significant worry.

Keywords: effective plans, family business, interest, leadership, successor

Procedia PDF Downloads 114
746 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 294
745 Revolutionary Violence and Echoes of the «Thou Shalt Not Kill» Debate: A Tragic Reading of the Class Conflict in Colombia

Authors: Jaime Otavo

Abstract:

Oscar del Barco, a former member of Los Montoneros, an Argentine guerrilla group of the 1970s, published a letter in 2004 that sparked a heated debate in his country about revolutionary violence. Del Barco, on the subject of «No matarás» (Thou shalt not kill) –as this debate was known– wrote to Sergio Schmucler, his addressee, the following: "There is no 'ideal' that justifies the death of a man. The founding principle of any community is 'Thou shalt not kill'. Thou shalt not kill the man because every man is sacred, and every man is all men".In this paper, the «No matarás» debate will be used to problematize two interconnected ideas that, in Colombia, underpinned the use of revolutionary violence by the guerrilla movements that emerged in the 1970s. On the one hand, an anthropological optimism; on the other, a theological scheme of converting violence into justice. Based on this, two arguments are put forward: 1) that revolutionary violence arose from an ethical-political certainty, namely: the confidence in being on the right side of history (because the violent ones were others), but 2) that its persistence over time made visible a tragic element, that is, that the bipolarity between victim and executioner, good and evil, or friend and foe that is inscribed in the class struggle is a false dilemma for in the context of revolutionary violence –as in the context of Greek tragedy–, no one ever has to make a decision, nor can he do so. For this reason, it is maintained that the fundamental aspect about guerrilla violence in Colombia is that it imposed itself as a violence of negativity which not only exceeded the capacity of the extreme left to control its revolutionary praxis but also exploited the link with the political subjectivation to which it aspired, the proletariat as the gravedigger of the bourgeoisie.

Keywords: marxism, social movements, armed struggle, debate thou shalt not kill

Procedia PDF Downloads 82
744 Foreign Banks Taking More Risk: Evidence from Emerging Economies

Authors: Minghua Chen, Rui Wang

Abstract:

This paper addresses the impact of foreign ownership on the risk-taking behavior of banks. Using bank-level panel data of more than 1,300 commercial banks in 32 emerging economies during 2000-2013, we find that foreign owned banks take on more risk than their domestic counterparts. We further examine several factors that may potentially contribute to foreign banks’ differentiated riskiness from four perspectives, namely, foreign banks’ informational disadvantages, agency problems, the contagious effect of parent banks’ financial conditions and the disparity between home and host markets. We find supportive evidence that these factors play a significant role in affecting foreign banks’ risk-taking.

Keywords: bank risk-taking, emerging economies, financial liberalization, foreign banks

Procedia PDF Downloads 447
743 Urban Renewal from the Perspective of Industrial Heritage Protection: Taking the Qiaokou District of Wuhan as an Example

Authors: Yue Sun, Yuan Wang

Abstract:

Most of the earliest national industries in Wuhan are located along the Hanjiang River, and Qiaokou is considered to be a gathering place for Dahankou old industrial base. Zongguan Waterworks, Pacific Soap Factory, Fuxin Flour Factory, Nanyang Tobacco Factory and other hundred-year-old factories are located along Hanjiang River in Qiaokou District, especially the Gutian Industrial Zone, which was listed as one of 156 national restoration projects at the beginning of the founding of the People’s Republic of China. After decades of development, Qiaokou has become the gathering place of the chemical industry and secondary industry, causing damage to the city and serious pollution, becoming a marginalized area forgotten by the central city. In recent years, with the accelerated pace of urban renewal, Qiaokou has been constantly reforming and innovating, and has begun drastic changes in the transformation of old cities and the development of new districts. These factories have been listed as key reconstruction projects, and a large number of industrial heritage with historical value and full urban memory have been relocated, demolished and reformed, with only a few factory buildings preserved. Through the methods of industrial archaeology, image analysis, typology and field investigation, this paper analyzes and summarizes the spatial characteristics of industrial heritage in Qiaokou District, explores urban renewal from the perspective of industrial heritage protection, and provides design strategies for the regeneration of urban industrial sites and industrial heritage.

Keywords: industrial heritage, urban renewal, protection, urban memory

Procedia PDF Downloads 145
742 Design and Development of a Prototype Vehicle for Shell Eco-Marathon

Authors: S. S. Dol

Abstract:

Improvement in vehicle efficiency can reduce global fossil fuels consumptions. For that sole reason, Shell Global Corporation introduces Shell Eco-marathon where student teams require to design, build and test energy-efficient vehicles. Hence, this paper will focus on design processes and the development of a fuel economic vehicle which satisfying the requirements of the competition. In this project, three components are designed and analyzed, which are the body, chassis and powertrain of the vehicle. Optimum design for each component is produced through simulation analysis and theoretical calculation in which improvement is made as the project progresses.

Keywords: energy efficient, drag force, chassis, powertrain

Procedia PDF Downloads 338
741 Facilitation of Digital Culture and Creativity through an Ideation Strategy: A Case Study with an Incumbent Automotive Manufacturer

Authors: K. Ö. Kartal, L. Maul, M. Hägele

Abstract:

With the development of new technologies come additional opportunities for the founding of companies and new markets to be created. The barriers to entry are lowered and technology makes old business models obsolete. Incumbent companies have to be adaptable to this quickly changing environment. They have to start the process of digital maturation and they have to be able to adapt quickly to new and drastic changes that might arise. One of the biggest barriers for organizations in order to do so is their culture. This paper shows the core elements of a corporate culture that supports the process of digital maturation in incumbent organizations. Furthermore, it is explored how ideation and innovation can be used in a strategy in order to facilitate these core elements of culture that promote digital maturity. Focus areas are identified for the design of ideation strategies, with the aim to make the facilitation and incitation process more effective, short to long term. Therefore, one in-depth case study is conducted with data collection from interviews, observation, document review and surveys. The findings indicate that digital maturity is connected to cultural shift and 11 relevant elements of digital culture are identified which have to be considered. Based on these 11 core elements, five focus areas that need to be regarded in the design of a strategy that uses ideation and innovation to facilitate the cultural shift are identified. These are: Focus topics, rewards and communication, structure and frequency, regions and new online formats.

Keywords: digital transformation, innovation management, ideation strategy, creativity culture, change

Procedia PDF Downloads 198
740 Net Interest Margin of Cooperative Banks in Low Interest Rate Environment

Authors: Karolína Vozková, Matěj Kuc

Abstract:

This paper deals with the impact of decrease in interest rates on the performance of commercial and cooperative banks in the Eurozone measured by net interest margin. The analysis was performed on balanced dataset of 268 commercial and 726 cooperative banks spanning the 2008-2015 period. We employed Fixed Effects estimation panel method. As expected, we found a negative relationship between market rates and net interest margin. Our results suggest that the impact of negative interest income differs across individual banking business models. More precisely, those cooperative banks were much more hit by the decrease of market interest rates which might be due to their ownership structure and more restrictive business regulation.

Keywords: cooperative banks, performance, negative interest rates, risk management

Procedia PDF Downloads 182
739 The Influence of Applying Mechanical Chest Compression Systems on the Effectiveness of Cardiopulmonary Resuscitation in Out-of-Hospital Cardiac Arrest

Authors: Slawomir Pilip, Michal Wasilewski, Daniel Celinski, Leszek Szpakowski, Grzegorz Michalak

Abstract:

The aim of the study was to evaluate the effectiveness of cardiopulmonary resuscitation taken by Medical Emergency Teams (MET) at the place of an accident including the usage of mechanical chest compression systems. In the period of January-May 2017, there were 137 cases of a sudden cardiac arrest in a chosen region of Eastern Poland with 360.000 inhabitants. Medical records and questionnaires filled by METs were analysed to prove the effectiveness of cardiopulmonary resuscitations that were considered to be effective when an early indication of spontaneous circulation was provided and the patient was taken to hospital. A chest compression system used by METs was applied in 60 cases (Lucas3 - 34 patients; Auto Pulse - 24 patients). The effectiveness of cardiopulmonary resuscitation among patients who were employed a chest compression system was much higher (43,3%) than the manual cardiac massage (36,4%). Thus, the usage of Lucas3 chest compression system resulted in 47% while Auto Pulse was 33,3%. The average ambulance arrival time could have had a significant impact on the subsequent effectiveness of cardiopulmonary resuscitation in these cases. Ambulances equipped with Lucas3 reached the destination within 8 minutes, and those with Auto Pulse needed 12,1 minutes. Moreover, taking effective basic life support (BLS) by bystanders before the ambulance arrival was much more frequent for ambulances with Lucas3 than Auto Pulse. Therefore, the percentage of BLS among the group of patients who were employed Lucas3 by METs was 26,5%, and 20,8% for Auto Pulse. The total percentage of taking BLS by bystanders before the ambulance arrival resulted in 25% of patients who were later applied a chest compression system by METs. Not only was shockable cardiac rhythm obtained in 47% of these cases, but an early indication of spontaneous circulation was also provided in all these patients. Both Lucas3 and Auto Pulse were evaluated to be significantly useful in improving the effectiveness of cardiopulmonary resuscitation by 97% of Medical Emergency Teams. Therefore, implementation of chest compression systems essentially makes the cardiopulmonary resuscitation even more effective. The ambulance arrival time, taking successful BLS by bystanders before the ambulance arrival and the presence of shockable cardiac rhythm determine an early indication of spontaneous circulation among patients after a sudden cardiac arrest.

Keywords: cardiac arrest, effectiveness, mechanical chest compression systems, resuscitation

Procedia PDF Downloads 250
738 Case of an Engineering Design Class in Architectural Engineering

Authors: Myunghoun Jang

Abstract:

Most engineering colleges in South Korea have engineering design classes in order to develop and enhance a student's creativity and problem-solving ability. Many cases about engineering design class are shown in journals and magazines, but a case lasting many years is few. The engineering design class in the Department of Architectural Engineering, Jeju National University was open in 2009 and continues to this year. 3-5 teams in every year set up their problems found their solutions and produced good results. Three of the results obtained patents. The class also provides students with opportunities to improve communication skill because they have many discussions in solving their problems.

Keywords: engineering design, architectural engineering, team-based learning, construction safety

Procedia PDF Downloads 236
737 Questioning the Predominant Feminism in Ahalya, a Short Film by Sujoy Ghosh

Authors: Somya Sharma

Abstract:

Ahalya, the critically acclaimed short film, is known to demolish the gender constructs of the age old myth of Ahalya. The paper tries to crack the overt meaning of the short film by reading between the dialogues and deconstructing the idea of the pseudo feminism in the short film Ahalya by Sujoy Ghosh. The film, by subverting the role of male character by making it seem submissive as compared to the female character's role seems to be just a surface level reading of the text. It seems that Sujoy Ghosh has played not just with changing the paradigm, but also trying to alter the history by doing so. The age old myth of putting Ahalya as a part of the five virgins (panchkanya) of Hindu mythology is explored in the paper. God's manoeuvre cannot be questioned and the two male characters tend to again shape the deed and the life of the female character, Ahalya. It is of importance to note that even in the 21st century, progressive actors like Radhika Apte fail to acknowledge the politics of altering history, not in a progressive way. The film blinds the viewer in the first watch to fall for the female strength and ownership of her sexuality, which is reflected in the opening scene itself where she opens the gate for the police man Indra Sen (representing God Indra who seduced her) who is charmed by her white dress. White, in Hindu mythology, stands for mourning, and this can be a hint towards the prophecy of what is about to come. Ahalya, bold, strong, and confident in this scene seems to be in total ownership of her sexual identity. Further, as the film progresses, control of Ahalya over her acts becomes even more dominant. In the myth of Ahalya, Gautama Maharishi, her husband, who wins her by Brahma's courtesy, curses her for her infidelity. She is then turned into a stone because of the curse and is redeemed when Lord Rama's foot brushes the stone. In the film, it is with the help of Ahalya that Goutam Sadhu turns Indra Sen into a stone doll. Ahalya is seen as a seductress who bewitches Indra Sen, and because the latter falls for the trap laid by the husband wife duo, he is turned into a doll. The attempt made by the paper is to read Ahalya as a character of the stand in wife who is yet again a pawn in the play of Goutama's revenge from Indra (who in the myth is able to escape from any curse or punishment for the act). The paper, therefore, reverts the idea which has till now been signified by the film and attempts to study the feminism this film appropriates. It is essential to break down the structure formed by such overt transgressing films in order to provide a real outlook of how feminism is twisted and moulded according to a man’s wishes.

Keywords: deconstructing, Hindu mythology, Panchkanya, predominant feminism, seductress, stone doll

Procedia PDF Downloads 254
736 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 121
735 Exploring Stakeholders’ Perceptions of the Implementation of the Door-to-Door Vaccination Campaign for the Oral Polio Vaccine (NOPV2) In Uganda: A Qualitative Study

Authors: Elizabeth B. Katana, Brenda N. Simbwa, Josephine Namayanja, Bob O. Amodan, Edirisa J. Nsubuga, Eva A. O. Laker

Abstract:

Background: Understanding stakeholders’ perceptions towards the implementation of a mass vaccination campaign is important to ensure the design of better strategies to address challenges. We explored stakeholders’ perceptions of the implementation of a nationwide door-to-door mass vaccination campaign for the oral polio vaccine (nOPV2) in Uganda for the two rounds that occurred in January and November 2022. Methods: A qualitative study was conducted among stakeholders who participated in the campaign implementation from 8 districts in Uganda using random sampling. We conducted 46 In-depth interviews lasting 30 – 40 minutes with 6 national/central supervisors, 12 district, 14 sub-county, and 14 parish-level supervisors. Stakeholders were asked about their experiences in the campaign implementation, including challenges faced and their opinions of the campaign impact and use of the door-to-door strategy. Data were analyzed thematically in line with the major campaign activities. Results: Most of the stakeholders were primarily concerned about poor planning, inadequate training of vaccination teams, community resistance including schools, challenges with recruitment and teaming of vaccinators, poor and delayed payments, lack of logistics and motivation for vaccination teams, the timing of the activities and implementing amidst COVID-19 and Ebola. The stakeholders believed that the first round was not well planned and implemented, while the second round was leveraged in their previous experiences. On the other hand, some positive experiences were noted with regard to communication, advocacy and mobilization, vaccine delivery and distribution, district readiness assessments, and cold chain management. Conclusion: This study identified many challenges that were faced in the implementation of the door-to-door mass campaign for nOPV2 in Uganda. This study identified that more needs to be done to improve door-to-door mass campaigns with a focus on motivating the implementers. These findings highlight the need for conducting performance reviews, improved planning, especially routine updates and verification of target populations and training in microplanning, and adequate mapping of community resistance to inform the implementation of future mass campaigns.

Keywords: mass polio vaccination campaigns, door-to-door strategy, stakeholders' perceptions, implementation challenges

Procedia PDF Downloads 73
734 Computer Fraud from the Perspective of Iran's Law and International Documents

Authors: Babak Pourghahramani

Abstract:

One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents.

Keywords: fraud, cyber fraud, computer fraud, classic fraud, computer crime

Procedia PDF Downloads 332
733 A Basic Metric Model: Foundation for an Evidence-Based HRM System

Authors: K. M. Anusha, R. Krishnaveni

Abstract:

Crossing a decade of the 21st century, the paradigm of human resources can be seen evolving with the strategic gene induced into it. There seems to be a radical shift descending as the corporate sector calls on its HR team to become strategic rather than administrative. This transferal eventually requires the metrics employed by these HR teams not to be just operationally reactive but to be aligned to an evidence-based strategic thinking. Realizing the growing need for a prescriptive metric model for effective HR analytics, this study has designed a conceptual framework for a basic metric model that can assist IT-HRM professionals to transition to a practice of evidence-based decision-making to enhance organizational performance.

Keywords: metric model, evidence based HR, HR analytics, strategic HR practices, IT sector

Procedia PDF Downloads 404
732 Foreign Seeds on Chinese Soil: Public Bonds in Qing China, 1894-1911

Authors: Dan Li, Hao Tang

Abstract:

The idea of “public bonds” was foreign to Qing China because it went against the traditional political ideology that supported that the emperor had absolute ownership over the nation. When a new fiscal crisis emerged out of the First Sino-Japanese War in 1894, the Qing rulers had no better option than to issue domestic bonds. This article documents the processes of issuance, distribution, and reimbursement for a total of three bonds issued by the Qing. These processes reveal how a well-established Western fiscal instrument could be extremely awkward and difficult to implant in China—a culturally, politically, and institutionally different society. Our paper sheds light on why Qing China failed to rise as a modern fiscal state.

Keywords: public bond, Qing China, fiscal crisis, fiscal state, the first Sino-Japanese war

Procedia PDF Downloads 163
731 Promoting Non-Formal Learning Mobility in the Field of Youth

Authors: Juha Kettunen

Abstract:

The purpose of this study is to develop a framework for the assessment of research and development projects. The assessment map is developed in this study based on the strategy map of the balanced scorecard approach. The assessment map is applied in a project that aims to reduce the inequality and risk of exclusion of young people from disadvantaged social groups. The assessment map denotes that not only funding but also necessary skills and qualifications should be carefully assessed in the implementation of the project plans so as to achieve the objectives of projects and the desired impact. The results of this study are useful for those who want to develop the implementation of the Erasmus+ Programme and the project teams of research and development projects.

Keywords: non-formal learning, youth work, social inclusion, innovation

Procedia PDF Downloads 296
730 Vehicle to Grid Potential for Solar Powered Electric Vehicle

Authors: Marcin Kowalski, Tomasz Wiktor, Piotr Ladonski, Krzysztof Bortnowski, Szymon Przybyl, Mateusz Grzesiak

Abstract:

This paper provides a detailed overview of the so-called smart grid or vehicle-to-grid idea, including a description of our way of implementation. The primary targets of this paper are technical students, young constructors, visionaries, however more experienced designers may find useful ideas for developing their vehicles. The publication will also be useful for home-grown builders who want to save on electricity. This article as well summarizes the advantages and disadvantages of V2G solution and might be helpful for students teams planning to participate in Bridgestone World Solar Challenge.

Keywords: solar powered vehicle, vehicle to grid, electric car, v2g, bridgestone world solar challenge

Procedia PDF Downloads 202
729 Toward an Appropriate Index for Corporate Governance

Authors: Bita Mashayekhi, Farzaneh Jalali, Alemeh Yazdanian

Abstract:

This study contributes to identifying the corporate governance indices in previous researches by using content analysis on relevant papers published in 20 top accounting journals according to Google Scholar ranking, dated from 1990 to 2016. For this purpose, 65 papers are scrutinized deeply, and the concepts of corporate governance are coded and categorized. Then extracted indices are clustered into 10 and 51 categories and subcategories, respectively; and their frequencies are determined. Results show that the board of directors’ characteristics is employed more frequently in reviewed papers, and the board of directors’ independency is the most frequent index within the 97 percent of our sample. Duality, board size, and ownership structure have more frequencies in comparison with other extracted corporate governance indices.

Keywords: corporate governance, content analysis, corporate governance index, top accounting journals

Procedia PDF Downloads 354
728 Human Capital Divergence and Team Performance: A Study of Major League Baseball Teams

Authors: Yu-Chen Wei

Abstract:

The relationship between organizational human capital and organizational effectiveness have been a common topic of interest to organization researchers. Much of this research has concluded that higher human capital can predict greater organizational outcomes. Whereas human capital research has traditionally focused on organizations, the current study turns to the team level human capital. In addition, there are no known empirical studies assessing the effect of human capital divergence on team performance. Team human capital refers to the sum of knowledge, ability, and experience embedded in team members. Team human capital divergence is defined as the variation of human capital within a team. This study is among the first to assess the role of human capital divergence as a moderator of the effect of team human capital on team performance. From the traditional perspective, team human capital represents the collective ability to solve problems and reducing operational risk of all team members. Hence, the higher team human capital, the higher the team performance. This study further employs social learning theory to explain the relationship between team human capital and team performance. According to this theory, the individuals will look for progress by way of learning from teammates in their teams. They expect to have upper human capital, in turn, to achieve high productivity, obtain great rewards and career success eventually. Therefore, the individual can have more chances to improve his or her capability by learning from peers of the team if the team members have higher average human capital. As a consequence, all team members can develop a quick and effective learning path in their work environment, and in turn enhance their knowledge, skill, and experience, leads to higher team performance. This is the first argument of this study. Furthermore, the current study argues that human capital divergence is negative to a team development. For the individuals with lower human capital in the team, they always feel the pressure from their outstanding colleagues. Under the pressure, they cannot give full play to their own jobs and lose more and more confidence. For the smart guys in the team, they are reluctant to be colleagues with the teammates who are not as intelligent as them. Besides, they may have lower motivation to move forward because they are prominent enough compared with their teammates. Therefore, human capital divergence will moderate the relationship between team human capital and team performance. These two arguments were tested in 510 team-seasons drawn from major league baseball (1998–2014). Results demonstrate that there is a positive relationship between team human capital and team performance which is consistent with previous research. In addition, the variation of human capital within a team weakens the above relationships. That is to say, an individual working with teammates who are comparable to them can produce better performance than working with people who are either too smart or too stupid to them.

Keywords: human capital divergence, team human capital, team performance, team level research

Procedia PDF Downloads 241
727 Local Binary Patterns-Based Statistical Data Analysis for Accurate Soccer Match Prediction

Authors: Mohammad Ghahramani, Fahimeh Saei Manesh

Abstract:

Winning a soccer game is based on thorough and deep analysis of the ongoing match. On the other hand, giant gambling companies are in vital need of such analysis to reduce their loss against their customers. In this research work, we perform deep, real-time analysis on every soccer match around the world that distinguishes our work from others by focusing on particular seasons, teams and partial analytics. Our contributions are presented in the platform called “Analyst Masters.” First, we introduce various sources of information available for soccer analysis for teams around the world that helped us record live statistical data and information from more than 50,000 soccer matches a year. Our second and main contribution is to introduce our proposed in-play performance evaluation. The third contribution is developing new features from stable soccer matches. The statistics of soccer matches and their odds before and in-play are considered in the image format versus time including the halftime. Local Binary patterns, (LBP) is then employed to extract features from the image. Our analyses reveal incredibly interesting features and rules if a soccer match has reached enough stability. For example, our “8-minute rule” implies if 'Team A' scores a goal and can maintain the result for at least 8 minutes then the match would end in their favor in a stable match. We could also make accurate predictions before the match of scoring less/more than 2.5 goals. We benefit from the Gradient Boosting Trees, GBT, to extract highly related features. Once the features are selected from this pool of data, the Decision trees decide if the match is stable. A stable match is then passed to a post-processing stage to check its properties such as betters’ and punters’ behavior and its statistical data to issue the prediction. The proposed method was trained using 140,000 soccer matches and tested on more than 100,000 samples achieving 98% accuracy to select stable matches. Our database from 240,000 matches shows that one can get over 20% betting profit per month using Analyst Masters. Such consistent profit outperforms human experts and shows the inefficiency of the betting market. Top soccer tipsters achieve 50% accuracy and 8% monthly profit in average only on regional matches. Both our collected database of more than 240,000 soccer matches from 2012 and our algorithm would greatly benefit coaches and punters to get accurate analysis.

Keywords: soccer, analytics, machine learning, database

Procedia PDF Downloads 239
726 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 133
725 Developing API Economy: Associating Value to APIs and Microservices in an Enterprise

Authors: Mujahid Sultan

Abstract:

The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. Management, orchestration, and monetization of microservices have created an API economy in the modern enterprise. There are two approaches to API design, code first and design first. Design first is gaining popularity in the industry as this allows capturing the API needs from the stakeholders rather than the development teams guesstimating the needs and associating a monetary value with the APIs and microservices. In this publication, we describe an approach to organizing and creating stakeholder needs and requirements for designing microservices and APIs.

Keywords: requirements engineering, enterprise architecture, APIs, microservices, DevOps, continuous delivery, continuous integration, stakeholder viewpoints

Procedia PDF Downloads 193
724 Disparities in Language Competence and Conflict: The Moderating Role of Cultural Intelligence in Intercultural Interactions

Authors: Catherine Peyrols Wu

Abstract:

Intercultural interactions are becoming increasingly common in organizations and life. These interactions are often the stage of miscommunication and conflict. In management research, these problems are commonly attributed to cultural differences in values and interactional norms. As a result, the notion that intercultural competence can minimize these challenges is widely accepted. Cultural differences, however, are not the only source of a challenge during intercultural interactions. The need to rely on a lingua franca – or common language between people who have different mother tongues – is another important one. In theory, a lingua franca can improve communication and ease coordination. In practice however, disparities in people’s ability and confidence to communicate in the language can exacerbate tensions and generate inefficiencies. In this study, we draw on power theory to develop a model of disparities in language competence and conflict in a multicultural work context. Specifically, we hypothesized that differences in language competence between interaction partners would be positively related to conflict such that people would report greater conflict with partners who have more dissimilar levels of language competence and lesser conflict with partners with more similar levels of language competence. Furthermore, we proposed that cultural intelligence (CQ) an intercultural competence that denotes an individual’s capability to be effective in intercultural situations, would weaken the relationship between disparities in language competence and conflict such that people would report less conflict with partners who have more dissimilar levels of language competence when the interaction partner has high CQ and more conflict when the partner has low CQ. We tested this model with a sample of 135 undergraduate students working in multicultural teams for 13 weeks. We used a round-robin design to examine conflict in 646 dyads nested within 21 teams. Results of analyses using social relations modeling provided support for our hypotheses. Specifically, we found that in intercultural dyads with large disparities in language competence, partners with the lowest level of language competence would report higher levels of interpersonal conflict. However, this relationship disappeared when the partner with higher language competence was also high in CQ. These findings suggest that communication in a lingua franca can be a source of conflict in intercultural collaboration when partners differ in their level of language competence and that CQ can alleviate these effects during collaboration with partners who have relatively lower levels of language competence. Theoretically, this study underscores the benefits of CQ as a complement to language competence for intercultural effectiveness. Practically, these results further attest to the benefits of investing resources to develop language competence and CQ in employees engaged in multicultural work.

Keywords: cultural intelligence, intercultural interactions, language competence, multicultural teamwork

Procedia PDF Downloads 166
723 Mapping the Early History of Common Law Education in England, 1292-1500

Authors: Malcolm Richardson, Gabriele Richardson

Abstract:

This paper illustrates how historical problems can be studied successfully using GIS even in cases in which data, in the modern sense, is fragmentary. The overall problem under investigation is how early (1300-1500) English schools of Common Law moved from apprenticeship training in random individual London inns run in part by clerks of the royal chancery to become what is widely called 'the Third University of England,' a recognized system of independent but connected legal inns. This paper focuses on the preparatory legal inns, called the Inns of Chancery, rather than the senior (and still existing) Inns of Court. The immediate problem studied in this paper is how the junior legal inns were organized, staffed, and located from 1292 to about 1500, and what maps tell us about the role of the chancery clerks as managers of legal inns. The authors first uncovered the names of all chancery clerks of the period, most of them unrecorded in histories, from archival sources in the National Archives, Kew. Then they matched the names with London property leases. Using ArcGIS, the legal inns and their owners were plotted on a series of maps covering the period 1292 to 1500. The results show a distinct pattern of ownership of the legal inns and suggest a narrative that would help explain why the Inns of Chancery became serious centers of learning during the fifteenth century. In brief, lower-ranking chancery clerks, always looking for sources of income, discovered by 1370 that legal inns could be a source of income. Since chancery clerks were intimately involved with writs and other legal forms, and since the chancery itself had a long-standing training system, these clerks opened their own legal inns to train fledgling lawyers, estate managers, and scriveners. The maps clearly show growth patterns of ownership by the chancery clerks for both legal inns and other London properties in the areas of Holborn and The Strand between 1450 and 1417. However, the maps also show that a royal ordinance of 1417 forbidding chancery clerks to live with lawyers, law students, and other non-chancery personnel had an immediate effect, and properties in that area of London leased by chancery clerks simply stop after 1417. The long-term importance of the patterns shown in the maps is that while the presence of chancery clerks in the legal inns likely created a more coherent education system, their removal forced the legal profession, suddenly without a hostelry managerial class, to professionalize the inns and legal education themselves. Given the number and social status of members of the legal inns, the effect on English education was to free legal education from the limits of chancery clerk education (the clerks were not practicing common lawyers) and to enable it to become broader in theory and practice, in fact, a kind of 'finishing school' for the governing (if not noble) class.

Keywords: GIS, law, London, education

Procedia PDF Downloads 176