Search results for: number of employees
7743 A Case Study of Determining the Times of Overhauls and the Number of Spare Parts for Repairable Items in Rolling Stocks with Simulation
Authors: Ji Young Lee, Jong Woon Kim
Abstract:
It is essential to secure high availability of railway vehicles to realize high quality and efficiency of railway service. Once the availability decreased, planned railway service could not be provided or more cars need to be reserved. additional cars need to be purchased or the frequency of railway service could be decreased. Such situation would be a big loss in terms of quality and cost related to railway service. Therefore, we make various efforts to get high availability of railway vehicles. Because it is a big loss to operators, we make various efforts to get high availability of railway vehicles. To secure high availability, the idle time of the vehicle needs to be reduced and the following methods are applied to railway vehicles. First, through modularization design, exchange time for line replaceable units is reduced which makes railway vehicles could be put into the service quickly. Second, to reduce periodic preventive maintenance time, preventive maintenance with short period would be proceeded test oriented to minimize the maintenance time, and reliability is secured through overhauls for each main component. With such design changes for railway vehicles, modularized components are exchanged first at the time of vehicle failure or overhaul so that vehicles could be put into the service quickly and exchanged components are repaired or overhauled. Therefore, spare components are required for any future failures or overhauls. And, as components are modularized and costs for components are high, it is considerably important to get reasonable quantities of spare components. Especially, when a number of railway vehicles were put into the service simultaneously, the time of overhauls come almost at the same time. Thus, for some vehicles, components need to be exchanged and overhauled before appointed overhaul period so that these components could be secured as spare parts for the next vehicle’s component overhaul. For this reason, components overhaul time and spare parts quantities should be decided at the same time. This study deals with the time of overhauls for repairable components of railway vehicles and the calculation of spare parts quantities in consideration of future failure/overhauls. However, as railway vehicles are used according to the service schedule, maintenance work cannot be proceeded after the service was closed thus it is quite difficult to resolve this situation mathematically. In this study, Simulation software system is used in this study for analyzing the time of overhauls for repairable components of railway vehicles and the spare parts for the railway systems.Keywords: overhaul time, rolling stocks, simulation, spare parts
Procedia PDF Downloads 3377742 Localization Problem in Optical Fiber Sensors
Authors: M. Zyczkowski, P. Markowski, M. Karol
Abstract:
The security industry is making many efforts to lower the costs of system installation. However, the dominant technique is the application of fiber optic sensors. It is necessary to determine the location of the disorder of long optical fiber cables. For a number of years, many research centers developed their own solutions. The article presents the construction of the sensor systems with the possibility of disorder location. We present a methodology for determining location of the disorder. The aim of investigations is to answer the question of which of optical sensor configuration offer the best performance for location of the disorder.Keywords: fiber optic sensor, security sensor, fiber cables, system instillation
Procedia PDF Downloads 6367741 Interaction between Trapezoidal Hill and Subsurface Cavity under SH Wave Incidence
Authors: Yuanrui Xu, Zailin Yang, Yunqiu Song, Guanxixi Jiang
Abstract:
It is an important subject of seismology on the influence of local topography on ground motion during earthquake. In mountainous areas with complex terrain, the construction of the tunnel is often the most effective transportation scheme. In these projects, the local terrain can be simplified into hills with different shapes, and the underground tunnel structure can be regarded as a subsurface cavity. The presence of the subsurface cavity affects the strength of the rock mass and changes the deformation and failure characteristics. Moreover, the scattering of the elastic waves by underground structures usually interacts with local terrains, which leads to a significant influence on the surface displacement of the terrains. Therefore, it is of great practical significance to study the surface displacement of local terrains with underground tunnels in earthquake engineering and seismology. In this work, the region is divided into three regions by the method of region matching. By using the fractional Bessel function and Hankel function, the complex function method, and the wave function expansion method, the wavefield expression of SH waves is introduced. With the help of a constitutive relation between the displacement and the stress components, the hoop stress and radial stress is obtained subsequently. Then, utilizing the continuous condition at different region boundaries, the undetermined coefficients in wave fields are solved by the Fourier series expansion and truncation of the finite term. Finally, the validity of the method is verified, and the surface displacement amplitude is calculated. The surface displacement amplitude curve is discussed in the numerical results. The results show that different parameters, such as radius and buried depth of the tunnel, wave number, and incident angle of the SH wave, have a significant influence on the amplitude of surface displacement. For the underground tunnel, the increase of buried depth will make the response of surface displacement amplitude increases at first and then decreases. However, the increase of radius leads the response of surface displacement amplitude to appear an opposite phenomenon. The increase of SH wave number can enlarge the amplitude of surface displacement, and the change of incident angle can obviously affect the amplitude fluctuation.Keywords: method of region matching, scattering of SH wave, subsurface cavity, trapezoidal hill
Procedia PDF Downloads 1337740 An Alternative Concept of Green Screen Keying
Authors: Jin Zhi
Abstract:
This study focuses on a green screen keying method developed especially for film visual effects. There are a series of ways of using existing tools for creating mattes from green or blue screen plates. However, it is still a time-consuming process, and the results vary especially when it comes to retaining tiny details, such as hair and fur. This paper introduces an alternative concept and method for retaining edge details of characters on a green screen plate, also, a number of connected mathematical equations are explored. At the end of this study, a simplified process of applying this method in real productions is also introduced.Keywords: green screen, visual effects, compositing, matte
Procedia PDF Downloads 4047739 The Impact of Facebook Brand Pages Engagement on Consumers Purchase Behaviour
Authors: Sudarsan Jayasingh, R. Venkatesh
Abstract:
Increasing number of customers gets connected to social networking sites, such as Facebook and Twitter to details about the brand communications. This survey, based on a convenience sample, aimed to find the reason for the participants to like Facebook fan pages, how often they visit and interact with the pages that they like, and how is it related with their purchase behaviour. 104 respondents completed the online survey. Overall, the study aimed at determining whether or not creating and maintaining a Facebook fan page is a beneficial tool for brands to communicate with their consumer base.Keywords: facebook brand pages, social media, consumer engagement, digital engagement, purchase behaviour
Procedia PDF Downloads 3187738 Stability Analysis of Rabies Model with Vaccination Effect and Culling in Dogs
Authors: Eti Dwi Wiraningsih, Folashade Agusto, Lina Aryati, Syamsuddin Toaha, Suzanne Lenhart, Widodo, Willy Govaerts
Abstract:
This paper considers a deterministic model for the transmission dynamics of rabies virus in the wild dogs-domestic dogs-human zoonotic cycle. The effect of vaccination and culling in dogs is considered on the model, then the stability was analysed to get basic reproduction number. We use the next generation matrix method and Routh-Hurwitz test to analyze the stability of the Disease-Free Equilibrium and Endemic Equilibrium of this model.Keywords: stability analysis, rabies model, vaccination effect, culling in dogs
Procedia PDF Downloads 6307737 Enhancing Cloud Computing with Security Trust Model
Authors: John Ayoade
Abstract:
Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.Keywords: cloud computing, trust, security, certificate authority, PKI
Procedia PDF Downloads 4847736 Price Control: A Comprehensive Step to Control Corruption in the Society
Authors: Muhammad Zia Ullah Baig, Atiq Uz Zama
Abstract:
The motivation of the project is to facilitate the governance body, as well as the common man in his/her daily life consuming product rates, to easily monitor the expense, to control the budget with the help of single SMS (message), e-mail facility, and to manage governance body by task management system. The system will also be capable of finding irregularities being done by the concerned department in mitigating the complaints generated by the customer and also provide a solution to overcome problems. We are building a system that easily controls the price control system of any country, we will feeling proud to give this system free of cost to Indian Government also. The system is able to easily manage and control the price control department of government all over the country. Price control department run in different cities under City District Government, so the system easily run in different cities with different SMS Code and decentralize Database ensure the non-functional requirement of system (scalability, reliability, availability, security, safety). The customer request for the government official price list with respect to his/her city SMS code (price list of all city available on website or application), the server will forward the price list through a SMS, if the product is not available according to the price list the customer generate a complaint through an SMS or using website/smartphone application, complaint is registered in complaint database and forward to inspection department when the complaint is entertained, the inspection department will forward a message about the complaint to customer. Inspection department physically checks the seller who does not follow the price list, but the major issue of the system is corruption, may be inspection officer will take a bribe and resolve the complaint (complaint is fake) in that case the customer will not use the system. The major issue of the system is to distinguish the fake and real complain and fight for corruption in the department. To counter the corruption, our strategy is to rank the complain if the same type of complaint is generated the complaint is in high rank and the higher authority will also notify about that complain, now the higher authority of department have reviewed the complaint and its history, the officer who resolve that complaint in past and the action against the complaint, these data will help in decision-making process, if the complaint was resolved because the officer takes bribe, the higher authority will take action against that officer. When the price of any good is decided the market/former representative is also there, with the mutual understanding of both party the price is decided, the system facilitate the decision-making process. The system shows the price history of any goods, inflation rate, available supply, demand, and the gap between supply and demand, these data will help to allot for the decision-making process.Keywords: price control, goods, government, inspection, department, customer, employees
Procedia PDF Downloads 4127735 Cultural Identity and Differentiation: Linguistic Landscape in Multilingual Tourist Community of Hangzhou
Authors: Qianqian Chen
Abstract:
The article intends to design a new research perspective on a linguistic landscape with the research background on multilingual urban tourism by analyzing the collected data, including a number of surveys on current urban tourism and the possibility of internationalization. The language usage analysis focuses on terms of English, Japanese and Spanish, which is based on the previous investigations. The analysis highlights the fact that contemporary tourism management and planning emphasizes cultural memories and heritage, and the combination between culture and tourism recalls the importance of "re-humanity" inhuman activities.Keywords: multilingualism, culture, linguistic landscape, Hangzhou
Procedia PDF Downloads 1527734 DOS and DDOS Attacks
Authors: Amin Hamrahi, Niloofar Moghaddam
Abstract:
Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.Keywords: denial of service, distributed denial of service, traffic, flooding
Procedia PDF Downloads 3927733 Corporate Life Cycle and Corporate Social Responsibility Performance: Empirical Evidence from Pharmaceutical Industry in China
Authors: Jing (Claire) LI
Abstract:
The topic of corporate social responsibility (CSR) is significant for pharmaceutical companies in China at this current stage. This is because, as a rapid growth industry in China in recent years, the pharmaceutical industry in China has been undergone continuous and terrible incidents relating to CSR. However, there is limited research and practice of CSR in Chinese pharmaceutical companies. Also, there is an urgent call for more research in an international context to understand the implications of corporate life cycle on CSR performance. To respond to the research need and research call, this study examines the relationship between corporate life cycle and CSR performance of Chinese listed companies in pharmaceutical industry. This research studies Chinese listed companies in pharmaceutical industry for the period of 2010-2017, where the data is available in database. Following the literature, this study divides CSR performance with regards to CSR dimensions, including shareholders, creditors, employees, customers, suppliers, the government, and the society. This study uses CSR scores of HEXUN database and financial measures of these CSR dimensions to measure the CSR performance. This study performed regression analysis to examine the relationship between corporate life cycle stages and CSR performance with regards to CSR dimensions for pharmaceutical listed companies in China. Using cash flow pattern as proxy of corporate life cycle to classify corporate life cycle stages, this study found that most (least) pharmaceutical companies in China are in maturity (decline) stage. This study found that CSR performance for most dimensions are highest (lowest) in maturity (decline) stage as well. Among these CSR dimensions, performing responsibilities for shareholder is the most important among all CSR responsibilities for pharmaceutical companies. This study is the first to provide important empirical evidence from Chinese pharmaceutical industry on the association between life cycle and CSR performance, supporting that corporate life cycle is a key factor in CSR performance. The study expands corporate life cycle and CSR literatures and has both empirical and theoretical contributions to the literature. From perspective of empirical contributions, the findings contribute to the argument that whether there is a relationship between CSR performance and various corporate life cycle stages in the literature. This study also provides empirical evidence that companies in different corporate life cycles have difference in CSR performance. From perspective of theoretical contributions, this study relates CSR and stakeholders to corporate life cycle stages and complements the corporate life cycle and CSR literature. This study has important implications for managers and policy makers. First, the results will be helpful for managers to have an understanding in the essence of CSR, and their company’s current and future CSR focus over corporate life cycle. This study provides a reference for their actions and may help them make more wise resources allocation decisions of CSR investment. Second, policy makers (in the government, stock exchanges, and securities commission) may consider corporate life cycle as an important factor in formulating future regulations for companies. Future research can explore the "process-based" differences in CSR performance and more industries.Keywords: China, corporate life cycle, corporate social responsibility, pharmaceutical industry
Procedia PDF Downloads 1057732 Lessons from Nature: Defensive Designs for the Built Environment
Authors: Rebecca A. Deek
Abstract:
There is evidence that erratic and extreme weather is becoming a common occurrence, and even predictions that this will become even more frequent and more severe. It also appears that the severity of earthquakes is intensifying. Some observers believe that human conduct has given reasons for such change; others attribute this to environmental and geological cycles. However, as some physicists, environmental scientists, politicians, and others continue to debate the connection between weather events, seismic activities, and climate change, other scientists, engineers, and urban planners are exploring how can our habitat become more responsive and resilient to such phenomena. There are a number of recent instances of nature’s destructive events that provide basis for the development of defensive measures.Keywords: biomimicry, natural disasters, protection of human lives, resilient infrastructures
Procedia PDF Downloads 5087731 Improved Wi-Fi Backscatter System for Multi-to-Multi Communication
Authors: Chang-Bin Ha, Yong-Jun Kim, Dong-Hyun Ha, Hyoung-Kyu Song
Abstract:
The conventional Wi-Fi back scatter system can only process one-to-one communication between the Wi-Fi reader and the Wi-Fi tag. For improvement of throughput of the conventional system, this paper proposes the multi-to-multi communication system. In the proposed system, the interference by the multi-to-multi communication is effectively cancelled by the orthogonal multiple access based on the identification code of the tag. Although the overhead is generated by the procedure for the multi-to-multi communication, because the procedure is processed by the Wi-Fi protocol, the overhead is insignificant for the entire communication procedure. From the numerical results, it is confirmed that the proposed system has nearly proportional increased throughput in according to the number of the tag that simultaneously participates in communication.Keywords: backscatter, multi-to-multi communication, orthogonality, Wi-Fi
Procedia PDF Downloads 5107730 Operating Model of Obstructive Sleep Apnea Patients in North Karelia Central Hospital
Authors: L. Korpinen, T. Kava, I. Salmi
Abstract:
This study aimed to describe the operating model of obstructive sleep apnea. Due to the large number of patients, the role of nurses in the diagnosis and treatment of sleep apnea was important. Pulmonary physicians met only a minority of the patients. The sleep apnea study in 2018 included about 800 patients, of which about 28% were normal and 180 patients were classified as severe (apnea-hypopnea index [AHI] over 30). The operating model has proven to be workable and appropriate. The patients understand well that they may not be referred to a pulmonary doctor. However, specialized medical follow-up on professional drivers continues every year.Keywords: sleep, apnea patient, operating model, hospital
Procedia PDF Downloads 1327729 Survey: Topology Hiding in Multipath Routing Protocol in MANET
Authors: Akshay Suhas Phalke, Manohar S. Chaudhari
Abstract:
In this paper, we have discussed the multipath routing with its variants. Our purpose is to discuss the different types of the multipath routing mechanism. Here we also put the taxonomy of the multipath routing. Multipath routing is used for the alternate path routing, reliable transmission of data and for better utilization of network resources. We also discussed the multipath routing for topology hiding such as TOHIP. In multipath routing, different parameters such as energy efficiency, packet delivery ratio, shortest path routing, fault tolerance play an important role. We have discussed a number of multipath routing protocol based on different parameters lastly.Keywords: multi-path routing, WSN, topology, fault detection, trust
Procedia PDF Downloads 3547728 International Retirement Migration of Westerners to Thailand: Well-Being and Future Migration Plans
Authors: Kanokwan Tangchitnusorn, Patcharawalai Wongboonsin
Abstract:
Following the ‘Golden Age of Welfare’ which enabled post-war prosperity to European citizens in 1950s, the world has witnessed the increasing mobility across borders of older citizens of First World countries. Then, in 1990s, the international retirement migration (IRM) of older persons has become a prominent trend, in which, it requires the integration of several fields of knowledge to explain, i.e. migration studies, tourism studies, as well as, social gerontology. However, while the studies of the IRM to developed destinations in Europe (e.g. Spain, Malta, Portugal, Italy), and the IRM to developing countries like Mexico, Panama, and Morocco have been largely studied in recent decades due to their massive migration volume, the study of the IRM to remoter destinations has been far more relatively sparse and incomplete. Developing countries in Southeast Asia have noticed the increasing number of retired expats, particularly to Thailand, where the number of foreigners applying for retirement visa increased from 10,709 in 2005 to 60,046 in 2014. Additionally, it was evident that the majority of Thailand’s retirement visa applicants were Westerners, i.e. citizens of the United Kingdom, the United States, Germany, and the Nordic countries, respectively. As such trend just becoming popular in Thailand in recent decades, little is known about the IRM populations, their well-being, and their future migration plans. This study aimed to examine the subjective wellbeing or the self-evaluations of own well-being among Western retirees in Thailand, as well as, their future migration plans as whether they planned to stay here for life or otherwise. The author employed a mixed method to obtain both quantitative and qualitative data during October 2015 – May 2016, including 330 self-administered questionnaires (246 online and 84 hard-copied responses), and 21 in-depth interviews of the Western residents in Nan (2), Pattaya (4), and Chiang Mai (15). As derived from the integration of previous subjective well-being measurements (i.e. Personal Wellbeing Index (PWI), Global AgeWatch Index, and OECD guideline on measuring subjective wellbeing), this study would measure the subjective well-being of Western retirees in Thailand in 7 dimensions, including standard of living, health status, personal relationships, social connections, environmental quality, personal security and local infrastructure.Keywords: international retirement migration, ageing, mobility, wellbeing, Western, Thailand
Procedia PDF Downloads 3447727 Detecting Tomato Flowers in Greenhouses Using Computer Vision
Authors: Dor Oppenheim, Yael Edan, Guy Shani
Abstract:
This paper presents an image analysis algorithm to detect and count yellow tomato flowers in a greenhouse with uneven illumination conditions, complex growth conditions and different flower sizes. The algorithm is designed to be employed on a drone that flies in greenhouses to accomplish several tasks such as pollination and yield estimation. Detecting the flowers can provide useful information for the farmer, such as the number of flowers in a row, and the number of flowers that were pollinated since the last visit to the row. The developed algorithm is designed to handle the real world difficulties in a greenhouse which include varying lighting conditions, shadowing, and occlusion, while considering the computational limitations of the simple processor in the drone. The algorithm identifies flowers using an adaptive global threshold, segmentation over the HSV color space, and morphological cues. The adaptive threshold divides the images into darker and lighter images. Then, segmentation on the hue, saturation and volume is performed accordingly, and classification is done according to size and location of the flowers. 1069 images of greenhouse tomato flowers were acquired in a commercial greenhouse in Israel, using two different RGB Cameras – an LG G4 smartphone and a Canon PowerShot A590. The images were acquired from multiple angles and distances and were sampled manually at various periods along the day to obtain varying lighting conditions. Ground truth was created by manually tagging approximately 25,000 individual flowers in the images. Sensitivity analyses on the acquisition angle of the images, periods throughout the day, different cameras and thresholding types were performed. Precision, recall and their derived F1 score were calculated. Results indicate better performance for the view angle facing the flowers than any other angle. Acquiring images in the afternoon resulted with the best precision and recall results. Applying a global adaptive threshold improved the median F1 score by 3%. Results showed no difference between the two cameras used. Using hue values of 0.12-0.18 in the segmentation process provided the best results in precision and recall, and the best F1 score. The precision and recall average for all the images when using these values was 74% and 75% respectively with an F1 score of 0.73. Further analysis showed a 5% increase in precision and recall when analyzing images acquired in the afternoon and from the front viewpoint.Keywords: agricultural engineering, image processing, computer vision, flower detection
Procedia PDF Downloads 3297726 Generating Links That Are Both Quasi-Alternating and Almost Alternating
Authors: Hamid Abchir, Mohammed Sabak2
Abstract:
We construct an infinite family of links which are both almost alternating and quasi-alternating from a given either almost alternating diagram representing a quasi-alternating link, or connected and reduced alternating tangle diagram. To do that we use what we call a dealternator extension which consists in replacing the dealternator by a rational tangle extending it. We note that all non-alternating and quasi-alternating Montesinos links can be obtained in that way. We check that all the obtained quasi-alternating links satisfy Conjecture 3.1 of Qazaqzeh et al. (JKTR 22 (6), 2013), that is the crossing number of a quasi-alternating link is less than or equal to its determinant. We also prove that the converse of Theorem 3.3 of Qazaqzeh et al. (JKTR 24 (1), 2015) is false.Keywords: quasi-alternating links, almost alternating links, tangles, determinants
Procedia PDF Downloads 1607725 Nanofiltration Membranes with Deposyted Polyelectrolytes: Caracterisation and Antifouling Potential
Authors: Viktor Kochkodan
Abstract:
The main problem arising upon water treatment and desalination using pressure driven membrane processes such as microfiltration, ultrafiltration, nanofiltration and reverse osmosis is membrane fouling that seriously hampers the application of the membrane technologies. One of the main approaches to mitigate membrane fouling is to minimize adhesion interactions between a foulant and a membrane and the surface coating of the membranes with polyelectrolytes seems to be a simple and flexible technique to improve the membrane fouling resistance. In this study composite polyamide membranes NF-90, NF-270, and BW-30 were modified using electrostatic deposition of polyelectrolyte multilayers made from various polycationic and polyanionic polymers of different molecular weights. Different anionic polyelectrolytes such as: poly(sodium 4-styrene sulfonate), poly(vinyl sulfonic acid, sodium salt), poly(4-styrene sulfonic acid-co-maleic acid) sodium salt, poly(acrylic acid) sodium salt (PA) and cationic polyelectrolytes such as poly(diallyldimethylammonium chloride), poly(ethylenimine) and poly(hexamethylene biguanide were used for membrane modification. An effect of deposition time and a number of polyelectrolyte layers on the membrane modification has been evaluated. It was found that degree of membrane modification depends on chemical nature and molecular weight of polyelectrolytes used. The surface morphology of the prepared composite membranes was studied using atomic force microscopy. It was shown that the surface membrane roughness decreases significantly as a number of the polyelectrolyte layers on the membrane surface increases. This smoothening of the membrane surface might contribute to the reduction of membrane fouling as lower roughness most often associated with a decrease in surface fouling. Zeta potentials and water contact angles on the membrane surface before and after modification have also been evaluated to provide addition information regarding membrane fouling issues. It was shown that the surface charge of the membranes modified with polyelectrolytes could be switched between positive and negative after coating with a cationic or an anionic polyelectrolyte. On the other hand, the water contact angle was strongly affected when the outermost polyelectrolyte layer was changed. Finally, a distinct difference in the performance of the noncoated membranes and the polyelectrolyte modified membranes was found during treatment of seawater in the non-continuous regime. A possible mechanism of the higher fouling resistance of the modified membranes has been discussed.Keywords: contact angle, membrane fouling, polyelectrolytes, surface modification
Procedia PDF Downloads 2517724 Extracting Attributes for Twitter Hashtag Communities
Authors: Ashwaq Alsulami, Jianhua Shao
Abstract:
Various organisations often need to understand discussions on social media, such as what trending topics are and characteristics of the people engaged in the discussion. A number of approaches have been proposed to extract attributes that would characterise a discussion group. However, these approaches are largely based on supervised learning, and as such they require a large amount of labelled data. We propose an approach in this paper that does not require labelled data, but rely on lexical sources to detect meaningful attributes for online discussion groups. Our findings show an acceptable level of accuracy in detecting attributes for Twitter discussion groups.Keywords: attributed community, attribute detection, community, social network
Procedia PDF Downloads 1627723 The Relationship between Facebook, Religiosity and Academic Performance
Authors: Nooraisah Katmon, Hartini Jaafar, Hazianti Abdul Halim, Jessnor Elmy Mat Jizat
Abstract:
Our study empirically examines the effect of student activities on Facebook and religion on academic performance. We extend prior research in this area in a number of ways. First, given the paucity of the research in this area particularly from the Asian context, we provide the evidence from developing country like Malaysia. Second, our sample drawn from Sultan Idris Education University in Malaysia, where graduates from these universities are unique since they are expected to be able to work in both education and industry environment, and presumed to play significant roles in shaping the development of future student’s intellectual at the Malaysian secondary school and Malaysian economy in general. Third, we control for religiosity aspect when examining the association between Facebook and academic performance, something that has been predominantly neglected by the prior studies. Fourth, unlike prior studies that circulating around the Christian sphere in measuring religiosity, we provide evidence from the Islamic perspective where the act of worships and practices are much more comprehensive rather than the Christian counterparts. Fifth, we examine whether Facebook activities and religiosity are complementary or substitutive each other in improving student’s academic performance. Our sample comprise of 60 undergraduates. Our result exhibit that students with high number of friends on facebook and frequent engagement on facebook activities, such as sharing links, send message, posting photo, tagging video as well as spending long hours on facebook generally are associated with lower academic performance. Our results also reported that student’s engagement in religious activities promotes better academic performance. When we examine the potential interaction effect between facebook and religiosity, our result revealed that religiosity is effective in reducing student’s interest on facebook, hence lead to better academic achievement. In other words, religious student will be less interested in joining activities on facebook and make them more perform than their counterparts. Our findings from this study should be able to assist the university management in shaping university policies and curriculum to regulate and manage student’s activities in order to enhance overall student’s quality. Moreover, the findings from this study are also of use to the policy maker such as Malaysian Communication and Multimedia Commissions to regulate the policy on the student’s access and activities on facebook.Keywords: facebook, religiosity, academic performance, effect of student activities
Procedia PDF Downloads 3037722 Children’s Experience of the Built Environment in the Initial Stages of a Settlement Formation: Case Study of Shahid-Keshvari New Settlement, Isfahan, Iran
Authors: Hassan Sheikh, Mehdi Nilipour, Amiraslan Fila
Abstract:
Many conventional town planning processes do little to give children and young people a voice on what is important about the urban environment. As a result of paying little attention to the children, their physical, social and mental needs are hardly met in urban environments. Therefore, urban spaces are impotent to attract children, while their recreational space has been confined to home or virtual spaces. Since children are just taking the first steps to learn the world beyond house borders, their living environment will profoundly influence almost all aspects of their lives. This puts a great deal of responsibility on the shoulders of planners, who need to balance a number of different issues in urban design to make places more child-friendly. The main purpose of present research is to analyze and plan a child-friendly environment in an on-going urban settlement development for the benefit of all residents. Assessing children’s needs and regard them in development strategies and policies will help to “plan for children”. Following this purpose, based on child-friendly environment studies, indicators of child-friendly environments were collected. Then three distinct characteristics of case study, which are being under-construction, lack of social ties between dwellers and high-rise building, determined seven indicators included basic services, Urban and environmental qualities, Family, kin, peers and community, Sense of belonging and continuity, participation, Safety, security and freedom of movement and human scale. With the survey, Informal observation and participation in small communities, essential data has been collected and analyzed by SPSS software. The field study is Shahid-Keshvari town in Isfahan, Iran. Eighty-six middle childhood, children (ages 8-13) participated. The results show Children's satisfaction is correlated with basic services and the quality of the environment, social environment and the safety and security. The considerable number of children and youth (55%) like to live somewhere other than the town. Satisfaction and sense of belonging and continuity have a strong inverse correlation with age. In other words, as age increases, satisfaction and consequently a sense of belonging will be reduced; thus children and youth consider their future somewhere out of the town. The main reason for dissatisfaction was the basic services and social environment. More than half of children (55%) expressed their wish to develop basic services in terms of availability, hierarchy, and quality. Among all recreational places, children showed more interest to the parks. About three-quarters (76%) considered building a park as a crucial item for residents. The significant number of children (54%) want to have a relationship with more friends. This could be due to the serious shortage of the leisure spaces such as parks or playgrounds. Also, the space around the house or space between the apartments has not been designed for play or children’s activities. Moreover, the presence of strangers and construction workers have a negative impact on children's sense of peace and security; 60% of children are afraid of theft and 36% of children found strangers as a menace. The analysis of children’s issues and suggestions provides an insight to plan and design of child-friendly environment in new towns.Keywords: child-friendly city (CFC), child-friendly environment, child participation, under-construction environment, Isfahan Shahid-Keshvari Town
Procedia PDF Downloads 3757721 Ultrastructural Characterization of Lipid Droplets of Rat Hepatocytes after Whole Body 60-Cobalt Gamma Radiation
Authors: Ivna Mororó, Lise P. Labéjof, Stephanie Ribeiro, Kely Almeida
Abstract:
Lipid droplets (LDs) are normally presented in greater or lesser number in the cytoplasm of almost all eukaryotic and some prokaryotic cells. They are independent organelles composed of a lipid ester core and a surface phospholipid monolayer. As a lipid storage form, they provide an available source of energy for the cell. Recently it was demonstrated that they play an important role in other many cellular processes. Among the many unresolved questions about them, it is not even known how LDs is formed, how lipids are recruited to LDs and how they interact with the other organelles. Excess fat in the organism is pathological and often associated with the development of some genetic, hormonal or behavioral diseases. The formation and accumulation of lipid droplets in the cytoplasm can be increased by exogenous physical or chemical agents. It is well known that ionizing radiation affects lipid metabolism resulting in increased lipogenesis in cells, but the details of this process are unknown. To better understand the mode of formation of LDs in liver cells, we investigate their ultrastructural morphology after irradiation. For that, Wistar rats were exposed to whole body gamma radiation from 60-cobalt at various single doses. Samples of the livers were processed for analysis under a conventional transmission electron microscope. We found that when compared to controls, morphological changes in liver cells were evident at the higher doses of radiation used. It was detected a great number of lipid droplets of different sizes and homogeneous content and some of them merged each other. In some cells, it was observed diffused LDs, not limited by a monolayer of phospholipids. This finding suggests that the phospholipid monolayer of the LDs was disrupted by ionizing radiation exposure that promotes lipid peroxydation of endo membranes. Thus the absence of the phospholipid monolayer may prevent the realization of some cellular activities as follow: - lipid exocytosis which requires the merging of LDs membrane with the plasma membrane; - the interaction of LDs with other membrane-bound organelles such as the endoplasmic reticulum (ER), the golgi and mitochondria and; - lipolysis of lipid esters contained in the LDs which requires the presence of enzymes located in membrane-bound organelles as ER. All these impediments can contribute to lipid accumulation in the cytoplasm and the development of diseases such as liver steatosis, cirrhosis and cancer.Keywords: radiobiology, hepatocytes, lipid metabolism, transmission electron microscopy
Procedia PDF Downloads 3147720 The Role and Challenges of Social Workers in Child Protection: The Case of Indonesia
Authors: B. Rusyidi
Abstract:
Since 2009, the Indonesian Ministry of Social Affairs has been implementing Program Kesejahteraan Sosial Anak (PKSA) (Child Welfare Program) a conditional cash transfer program that targets neglected children, children with disabilities, street children, children in conflict with the law, and children in need of special protection, all from poor households. PKSA integrates three elements: Transfer of cash, care and social services through social workers, and institutional childcare assistance. This qualitative study analyzed the roles and the challenges of social workers in implementing PKSA and lays out recommendations to inform policy changes. Data were collected in late 2014 from national and local government and non-government child welfare agencies, social workers, and childcare institution representatives through interviews and Focused Group Discussions (FGDs). Field work took place in six districts in the provinces of Jakarta, Central Java and South Sulawesi. The study found that the social workers’ role was significant in facilitating cash transfer, providing education and guidance, and linking children and families to basic social services. This improved utilization of basic social services enhanced children and families’ behaviors and contributed to the well being of the children. However, only a small number of childcare institutions have social workers, leaving many children and families without care and social service linkages, depriving them of rehabilitative components to help them regain their social functions. Some social workers reported their struggles with heavy workloads, lack of professional competencies and training, limited job security, and inadequate professional acknowledgment from other professions. Parts of those challenges were due to the centralized nature of the program and the lack of shared vision and commitment about the child protection system among related government agencies both at the national and local levels. The study highlights the necessity to implement an integrated child protection system, decentralize the PKSA program, and increase the number, competence, case management, and management and monitoring of social workers. The most recent progress of the program and its impacts on social workers are also discussed.Keywords: child protection, conditional cash transfer, program decentralization, social worker, working conditions
Procedia PDF Downloads 2187719 Network Security Attacks and Defences
Authors: Ranbir Singh, Deepinder Kaur
Abstract:
Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.Keywords: network security, attacks, denial, authenticating
Procedia PDF Downloads 4047718 Cars Redistribution Optimization Problem in the Free-Float Car-Sharing
Authors: Amine Ait-Ouahmed, Didier Josselin, Fen Zhou
Abstract:
Free-Float car-sharing is an one-way car-sharing service where cars are available anytime and anywhere in the streets such that no dedicated stations are needed. This means that after driving a car you can park it anywhere. This car-sharing system creates an imbalance car distribution in the cites which can be regulated by staff agents through the redistribution of cars. In this paper, we aim to solve the car-reservation and agents traveling problem so that the number of successful cars’ reservations could be maximized. Beside, we also tend to minimize the distance traveled by agents for cars redistribution. To this end, we present a mixed integer linear programming formulation for the car-sharing problem.Keywords: one-way car-sharing, vehicle redistribution, car reservation, linear programming
Procedia PDF Downloads 3487717 Optimization of Robot Motion Planning Using Biogeography Based Optimization (Bbo)
Authors: Jaber Nikpouri, Arsalan Amralizadeh
Abstract:
In robotics manipulators, the trajectory should be optimum, thus the torque of the robot can be minimized in order to save power. This paper includes an optimal path planning scheme for a robotic manipulator. Recently, techniques based on metaheuristics of natural computing, mainly evolutionary algorithms (EA), have been successfully applied to a large number of robotic applications. In this paper, the improved BBO algorithm is used to minimize the objective function in the presence of different obstacles. The simulation represents that the proposed optimal path planning method has satisfactory performance.Keywords: biogeography-based optimization, path planning, obstacle detection, robotic manipulator
Procedia PDF Downloads 3027716 Exploration of Probiotics and Anti-Microbial Agents in Fermented Milk from Pakistani Camel spp. Breeds
Authors: Deeba N. Baig, Ateeqa Ijaz, Saloome Rafiq
Abstract:
Camel is a religious and culturally significant animal in Asian and African regions. In Pakistan Dromedary and Bactrian are common camel breeds. Other than the transportation use, it is a pivotal source of milk and meat. The quality of its milk and meat is predominantly dependent on the geographical location and variety of vegetation available for the diet. Camel milk (CM) is highly nutritious because of its reduced cholesterol and sugar contents along with enhanced minerals and vitamins level. The absence of beta-lactoglobulin (like human milk), makes CM a safer alternative for infants and children having Cow Milk Allergy (CMA). In addition to this, it has a unique probiotic profile both in raw and fermented form. Number of Lactic acid bacteria (LAB) including lactococcus, lactobacillus, enterococcus, streptococcus, weissella, pediococcus and many other bacteria have been detected. From these LAB Lactobacilli, Bifidobacterium and Enterococcus are widely used commercially for fermentation purpose. CM has high therapeutic value as its effectiveness is known against various ailments like fever, arthritis, asthma, gastritis, hepatitis, Jaundice, constipation, postpartum care of women, anti-venom, dropsy etc. It also has anti-diabetic, anti-microbial, antitumor potential along with its robust efficacy in the treatment of auto-immune disorders. Recently, the role of CM has been explored in brain-gut axis for the therapeutics of neurodevelopmental disorders. In this connection, a lot of grey area was available to explore the probiotics and therapeutics latent in the CM available in Pakistan. Thus, current study was designed to explore the predominant probiotic flora and antimicrobial potential of CM from different local breeds of Pakistan. The probiotics have been identified through biochemical, physiological and ribo-typing methods. In addition to this, bacteriocins (antimicrobial-agents) were screened through PCR-based approach. Results of this study revealed that CM from different breeds of camel depicted a number of similar probiotic candidates along with the range of limited variability. However, the nucleotide sequence analysis of selected anti-listerial bacteriocins exposed least variability. As a conclusion, the CM has sufficient probiotic availability and significant anti-microbial potential.Keywords: bacteriocins, camel milk, probiotics potential, therapeutics
Procedia PDF Downloads 1347715 An Artificial Neural Network Model Based Study of Seismic Wave
Authors: Hemant Kumar, Nilendu Das
Abstract:
A study based on ANN structure gives us the information to predict the size of the future in realizing a past event. ANN, IMD (Indian meteorological department) data and remote sensing were used to enable a number of parameters for calculating the size that may occur in the future. A threshold selected specifically above the high-frequency harvest reached the area during the selected seismic activity. In the field of human and local biodiversity it remains to obtain the right parameter compared to the frequency of impact. But during the study the assumption is that predicting seismic activity is a difficult process, not because of the parameters involved here, which can be analyzed and funded in research activity.Keywords: ANN, Bayesion class, earthquakes, IMD
Procedia PDF Downloads 1257714 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19
Procedia PDF Downloads 68