Search results for: Shannon information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14591

Search results for: Shannon information theory

11111 Potentials and Influencing Factors of Dynamic Pricing in Business: Empirical Insights of European Experts

Authors: Christopher Reichstein, Ralf-Christian Härting, Martina Häußler

Abstract:

With a continuously increasing speed of information exchange on the World Wide Web, retailers in the E-Commerce sector are faced with immense possibilities regarding different online purchase processes like dynamic price settings. By use of Dynamic Pricing, retailers are able to set short time price changes in order to optimize producer surplus. The empirical research illustrates the basics of Dynamic Pricing and identifies six influencing factors of Dynamic Pricing. The results of a structural equation modeling approach show five main drivers increasing the potential of dynamic price settings in the E-Commerce. Influencing factors are the knowledge of customers’ individual willingness to pay, rising sales, the possibility of customization, the data volume and the information about competitors’ pricing strategy.

Keywords: e-commerce, empirical research, experts, dynamic pricing (DP), influencing factors, potentials

Procedia PDF Downloads 243
11110 Big Data in Construction Project Management: The Colombian Northeast Case

Authors: Sergio Zabala-Vargas, Miguel Jiménez-Barrera, Luz VArgas-Sánchez

Abstract:

In recent years, information related to project management in organizations has been increasing exponentially. Performance data, management statistics, indicator results have forced the collection, analysis, traceability, and dissemination of project managers to be essential. In this sense, there are current trends to facilitate efficient decision-making in emerging technology projects, such as: Machine Learning, Data Analytics, Data Mining, and Big Data. The latter is the most interesting in this project. This research is part of the thematic line Construction methods and project management. Many authors present the relevance that the use of emerging technologies, such as Big Data, has taken in recent years in project management in the construction sector. The main focus is the optimization of time, scope, budget, and in general mitigating risks. This research was developed in the northeastern region of Colombia-South America. The first phase was aimed at diagnosing the use of emerging technologies (Big-Data) in the construction sector. In Colombia, the construction sector represents more than 50% of the productive system, and more than 2 million people participate in this economic segment. The quantitative approach was used. A survey was applied to a sample of 91 companies in the construction sector. Preliminary results indicate that the use of Big Data and other emerging technologies is very low and also that there is interest in modernizing project management. There is evidence of a correlation between the interest in using new data management technologies and the incorporation of Building Information Modeling BIM. The next phase of the research will allow the generation of guidelines and strategies for the incorporation of technological tools in the construction sector in Colombia.

Keywords: big data, building information modeling, tecnology, project manamegent

Procedia PDF Downloads 116
11109 First-Principles Investigation of the Structural and Electronic Properties of Mg1-xBixO

Authors: G. P. Abdel Rahim, M. María Guadalupe Moreno Armenta, Jairo Arbey Rodriguez

Abstract:

We investigated the structure and electronic properties of the compound Mg1-xBixO with varying concentrations of 0, ¼, ½, and ¾ x bismuth in the the NaCl (rock-salt) and WZ (wurtzite) phases. The calculations were performed using the first-principles pseudo-potential method within the framework of spin density functional theory (DFT). Our calculations predict that for Bi concentrations greater than ~70%, the WZ structure is more favorable than the NaCl one and that for x = 0 (pure MgO), x = 0.25 and x = 0.50 of Bi concentration the NaCl structure is more favorable than the WZ one. For x = 0.75 of Bi, a transition from wurtzite towards NaCl is possible, when the pressure is about 22 GPa. Also It has been observed the crystal lattice constant closely follows Vegard’s law, that the bulk modulus and the cohesion energy decrease with the concentration x of Bi.

Keywords: DFT, Mg1-xBixO, pseudo-potential, rock-salt, wurtzite

Procedia PDF Downloads 509
11108 Principal Component Analysis Applied to the Electric Power Systems – Practical Guide; Practical Guide for Algorithms

Authors: John Morales, Eduardo Orduña

Abstract:

Currently the Principal Component Analysis (PCA) theory has been used to develop algorithms regarding to Electric Power Systems (EPS). In this context, this paper presents a practical tutorial of this technique detailed their concept, on-line and off-line mathematical foundations, which are necessary and desirables in EPS algorithms. Thus, features of their eigenvectors which are very useful to real-time process are explained, showing how it is possible to select these parameters through a direct optimization. On the other hand, in this work in order to show the application of PCA to off-line and on-line signals, an example step to step using Matlab commands is presented. Finally, a list of different approaches using PCA is presented, and some works which could be analyzed using this tutorial are presented.

Keywords: practical guide; on-line; off-line, algorithms, faults

Procedia PDF Downloads 546
11107 The Utilization of Big Data in Knowledge Management Creation

Authors: Daniel Brian Thompson, Subarmaniam Kannan

Abstract:

The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.

Keywords: big data, knowledge management, data driven, knowledge creation

Procedia PDF Downloads 97
11106 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 278
11105 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 486
11104 Theoretical Investigation of Electronic, Structural and Thermoelectric Properties of Mg₂SiSn (110) Surface

Authors: M. Ramesh, Manish K. Niranjan

Abstract:

The electronic, structural and thermoelectric properties of Mg₂SiSn (110) surface are investigated within the framework of first principle density functional theory and semi classical Boltzmann approach. In particular, directional dependent thermoelectric properties such as electrical conductivity, thermal conductivity, Seebeck coefficient and figure of merit are explored. The (110)-oriented Mg₂SiSn surface exhibits narrow indirect band gap of ~0.17 eV. The thermoelectric properties are found to be significant along the y-axis at 300 K and along x-axis at 500 K. The figure of merit (ZT) for hole carrier concentration is found to be significantly large having magnitude 0.83 (along x-axis) at 500 K and 0.26 (y-axis) at 300 K. Our results suggest that Mg₂SiSn (110) surface is promising for various thermoelectric applications due to its overall good thermoelectric properties.

Keywords: thermoelectric, surface science, semiconducting silicide, first principles calculations

Procedia PDF Downloads 213
11103 A Study on the Difficulties and Countermeasures of Uyghur Students’ English Learning in Hotan District, Xinjiang

Authors: Tingting Zou

Abstract:

This paper firstly presents an overview of the situation of Xinjiang and Hotan, and describes the current status and features of Uyghur students’ English education. Then it summarizes the research on the theories of Third Language Acquisition and Foreign Language Learning Motivation at home and abroad. Further, through the data collected by the questionnaire, the paper points out the three main problems and causes of Uyghur students’ English learning in Hotan, Xinjiang. Finally, the paper draws a conclusion and puts forward some suggestions on how to improve their English learning quality based on the theory of Foreign Language Learning Motivation.

Keywords: countermeasures and difficulties, English learning, Hotan Xinjiang, Uyghur students

Procedia PDF Downloads 74
11102 Ontologies for Social Media Digital Evidence

Authors: Edlira Kalemi, Sule Yildirim-Yayilgan

Abstract:

Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.

Keywords: criminal digital evidence, social media, ontologies, reasoning

Procedia PDF Downloads 377
11101 Electability of Stable Insiders’ Coalition Governments

Authors: Tryphon Kollintzas, Lambros Pechlivanos

Abstract:

In this paper, we formulate a general equilibrium theory that explains the existence and stability of democratically elected governments that support certain groups of individuals in society (insiders) to the detriment of everybody else (outsiders), even if the latter constitute a majority. The vehicle is a dynamic general equilibrium model, where insiders get monopoly rents and outsiders get less than what they would have gotten under a common good regime. We construct such political economy equilibria, and we identify the conditions under which such political regimes (coalitions of insiders): (a) can safeguard against opportunistic behavior (i.e., do not fall from within) and (b) may come to power in the first place (i.e., manage to get elected). To that end, we highlight the role of perception manipulation and self-serving bias as a gluing device to garner an electable coalition.

Keywords: insiders, coalition governments, stability, electability, politico-economic equilibrium, perceptions manipulation

Procedia PDF Downloads 44
11100 Adoption of Electronic Logistics Management Information System for Life-Saving Maternal, Neonatal and Child Health Medicines: A Bangladesh Perspective

Authors: Mohammad Julhas Sujan, Md. Ferdous Alam

Abstract:

Maternal, neonatal, and child health (MNCH) holds one of the prime focuses in Bangladesh’s national healthcare system. To save the lives of mothers and children, knowing the stock of MNCH medicines in different healthcare facilities and when to replenish them are essential. A robust information system not only facilitates efficient management of the essential MNCH medicines but also helps effective allocation of scarce resources. In Bangladesh, Supply chain management of the 25-essential life-saving medicines are currently tracked and monitored via an electronic logistics management information system (eLMIS). Our aim was to conduct a cross-sectional study with a year (2020) worth of data from 24 districts of Bangladesh to evaluate how eLMIS is helping the Government and other stakeholders in efficient supply chain management. Data were collected from 4711 healthcare facilities ranging from primary to secondary levels within a district. About 90% (4143) are community clinics which are considered primary health care facilities in Bangladesh. After eLMIS implementation, the average reporting rate across the districts has been increased (> 97%). The month of stock (MOS) of zinc is an average 6 months compared to Inj. Magnesium Sulphate which will take 2.5 years to consume according to the current average monthly consumption (AMC). Due to first approaching expiry, Tab. Misoprostol, 7.1% Chlorhexidine and Inj. Oxytocin may become unusable. Moreover, Inj. Oxytocin is temperature sensitive and may reduce its efficacy if it is stocked for a longer period. In contrast, Zinc should be sufficiently stocked to prevent sporadic stockouts. To understand how data are collected, transmitted, processed, and aggregated for MNCH medicines in a faster and timely manner, an electronic logistics management information system (eLMIS) is necessary. We recommend the use of such a system in developing countries like Bangladesh for efficient supply chain management of essential MNCH medicines.

Keywords: adaption, eLMIS, MNCH, live-saving medicines

Procedia PDF Downloads 146
11099 The Gaze; Objectification of the Surrogate Mother in Cross-Border Surrogacy: An Empirical Study Applied to Surrogacy Facilitators

Authors: Yingyi Luo

Abstract:

Cross-border surrogacy is seen by many as a market in which women are bought and sold commodities at risk of trafficking. A surrogate can be framed as either a fully acknowledged subject, with whom intended parents engage in cross-border surrogacy—or as a tool utilized by intended parents and surrogacy facilitators in the furtherance of their own objectives. In order to identify which frame prevails, this paper applies subjectivity theory to an empirical study of cross-border surrogacy facilitated by facilitators in Australia analysing interviews with surrogate agents, counsellors and lawyers, and observations at trade show. The aim of the paper is to advance understanding of the dynamics of the relationship between intended parents, surrogates, and surrogacy facilitators by collecting new data and applying unique framework. As dominant players, surrogacy facilitators have a significant impact on determining the nature of cross-border surrogacy. However, little is known concerning the manner in which facilitators influence the inter-subjectivity between surrogate mothers and intended parents. Thus, this paper intends to identify how facilitators depict surrogate mothers, the degree to which their perspectives bear upon both the subjectivity of the surrogate mother and the relationship of intended parents with surrogate mothers. For the purpose of introducing and developing this framework in the context of cross-border surrogacy, this paper borrows from the work of theorists not often mentioned in bioethics, including Jacques Lacan, Marco Cavallaro, Michel Foucault, and others. It also applies the concept of 'the gaze' along with the dynamic of 'self' and 'other' to the cross-border surrogacy arrangement. Applying the concept of the gaze can provide a new way to interpret the power dynamic that plays out among surrogacy facilitators, intended parents, and surrogates within the commercial surrogacy arrangement and how the subjectivity is produced through the power. Viewing the relationships between the players in cross-border surrogacy through the lens of gaze theory, this paper finds that, in cross-border surrogacy, due to the structural power imbalance, affluent intended parents and surrogacy facilitators are possessors of the gaze, while surrogate mothers are under the thrall of the gaze. Specifically, facilitators frame surrogate mothers' reproductive abilities as commodities that intended parents can purchase to fulfil their urgent need to have children and experience full subjectivity, and they take a cut of the money that paid by intended parents. Therefore, commodification of the body results in degrading a surrogate mother (the object), reifying her as no more than a walking womb (the other), a process which is highly detrimental to the self of surrogate mothers. This relationship, formalized through contractual means, allows intended parents and facilitators to take advantage of surrogate mothers in the furtherance of their own objectives. This argument is enriched by new data from interviews and observations that provide nuance to this understanding of inter-subjectivity.

Keywords: cross-border surrogacy, facilitators, self, surrogate mothers

Procedia PDF Downloads 121
11098 Unveiling Adorno’s Concern for Revolutionary Praxis and Its Enduring Significance: A Philosophical Analysis of His Writings on Sociology and Philosophy

Authors: Marie-Josee Lavallee

Abstract:

Adorno’s reputation as an abstract and pessimistic thinker who indulged in a critic of capitalist society and culture without bothering himself with opening prospects for change, and who has no interest in political activism, recently begun to be questioned. This paper, which has a twofold objective, will push revisionist readings a step further by putting forward the thesis that revolutionary praxis has been an enduring concern for Adorno, surfacing throughout his entire work. On the other hand, it will hold that his understanding of the relationships between theory and praxis, which will be explained by referring to Ernst Bloch’s distinction between the warm and cold currents of Marxism, can help to interpret the paralysis of revolutionary practice in our own time under a new light. Philosophy and its tasks have been an enduring topic of Adorno’s work from the 1930s to Negativ Dialektik. The writings in which he develops these ideas stand among his most obscure and abstract so that their strong ties to the political have remained mainly overlooked. Adorno’s undertaking of criticizing and ‘redeeming’ philosophy and metaphysics is inseparable from a care for retrieving the capacity to act in the world and to change it. Philosophical problems are immanent to sociological problems, and vice versa, he underlines in his Metaphysik. Begriff and Problem. The issue of truth cannot be severed from the contingent context of a given idea. As a critical undertaking extracting its contents from reality, which is what philosophy should be from Adorno's perspective, the latter has the potential to fully reveal the reification of the individual and consciousness resulting from capitalist economic and cultural domination, thus opening the way to resistance and revolutionary change. While this project, according to his usual method, is sketched mainly in negative terms, it also exhibits positive contours which depict a socialist society. Only in the latter could human suffering end, and mutilated individuals experiment with reconciliation in an authentic way. That Adorno’s continuous plea for philosophy’s self-critic and renewal hides an enduring concern for revolutionary praxis emerges clearly from a careful philosophical analysis of his writings on philosophy and a selection of his sociological work, coupled with references to his correspondences. This study points to the necessity of a serious re-evaluation of Adorno’s relationship to the political, which will impact on the interpretation of his whole oeuvre, is much needed. In the second place, Adorno's dialectical conception of theory and praxis is enlightening for our own time, since it suggests that we are experiencing a phase of creative latency rather an insurmountable impasse.

Keywords: Frankfurt school, philosophy and revolution, revolutionary praxis, Theodor W. Adorno

Procedia PDF Downloads 107
11097 Primary and Secondary Big Bangs Theory of Creation of Universe

Authors: Shyam Sunder Gupta

Abstract:

For creation of Universe, theory of Big Bang , from Singularity is most acceptable theory, but has limitations as it does not answer ; how Singularity gets created and what causes Big Bang ?Further , Universe is composed of 95% Dark Energy and Dark Matter and balance 5% is visible part of Universe , but no explanation . Recently, it has been reported that there could be very large number of Universes, but only , a stipulation. This research which is based on Bhagvat Puran, a Vedic Scripture answers all questions. There is a Unique Energy Field which is eternal and infinite. The carrier Particles of Unique Energy are Paramanus; God Particles. Paramanus are Fundamental Particles and combination of these particles create bigger particles from which Universe gets created. For creation to initiate, Unique Energy gets represented in three phases; Positive Male Energy, Neutral Energy(creates Eternal Time)and Negative Female Energy. Positive Male Energy further expands in three forms of Creative Energies (CE1,CE2andCE3)and 16 principles get created, namely, Energy of Activation , Energy of Action, Energy of Darkness, Pradhan ( Equilibrium state of three energies ) , Prakriti(Non-equilibrium state of three energies, creating modes of Activation, Action and Darkness),Mahat-tattva ( consists of three modes , dominant in Mode of Darkness), Time, Energy of Consciousness, Ego Energy(consists of three modes , very strongly dominated by Mode of Darkness),Energy of Intellect, Mind Energy , Sky( creates Space and Sound Energy),Air(creates gaseous substances), Fire( creates different forms of energies like thermal, light, electrical etc.), Water( creates liquid substances)and Earth(creates solid substances). CE1 Energy creates Infinite number of Singularities from seven principles, Pradhan , Mahat-tattva, Sky , Air, Fire, Water and Earth . CE1 Energy gets divided as CE2 and enters along with other 9 principles , in each of Singularity and Primary Big Bang takes and infinite number of Universes get created. Each Universe has seven coverings of 7 principles and each layer is 10 times thicker than previous layer. By Energy CE2 , space in Universe under the coverings is divided in two parts , upper part and lower part. Upper part is occupied by Dark Energy which is created from Mode of Darkness in Ego Energy which keeps getting converted in Dark Matter and forms Invisible part of Universe. In the lower part , process of evolution gets initiated and seeds of 24 elements , Consciousness , Ego, Intellect, Mind, 5 Fundamental Elements( space, Air, Fire, Water Earth, which create non-living matter ),5 senses which receive inputs( eyes, nose, ears, tongue , skin), 5 Working Senses (Smell, Taste, Sight, Touch and Hearing);5 elements of Action( Organs of procreation , excretion, locomotion , speech and acquisition ), get created . In EC2 Energy, Singularity gets created which gets exploded by force of Energy of Action ,and Secondary Big Bang takes place and Visible Universe gets created in the shape of Bud of Flower Lotus . Within the Visible part of Universe, a small part gets created , Phenomenal Universe. Diameter of Sun and planetary system ,at the time of formation ,is 6.4 billion km, which is close to reported value . There are 5 different orbits , with reference to our Solar System. Moon around earth takes one month,, earth around sun one year, sun around Milk way one cosmic year(322.58 million years), Milky way around Universe 4.32 billion years and universe around center of universe 311.04 trillion years. Universe creation is a cyclic process with cycle time of 622.08 trillion years.In summary, Universe consists of 4 parts; covering of 7 layers, Dark Energy and Dark Matter, Visible and Phenomenal universe.

Keywords: big bang, creation, dark energy, dark matter, singularity, universe

Procedia PDF Downloads 69
11096 Rashba Spin Orbit Interaction Effect on Multiphoton Optical Transitions in a Quantum Dot for Bioimaging

Authors: Pradip Kumar Jha, Manoj Kumar

Abstract:

We demonstrate in this work the effect of Rashba spin orbit interaction on multiphoton optical transitions of a quantum dot in the presence of THz laser field and external static magnetic field. This combination is solved by accurate non-perturbative Floquet theory. Investigations are made for the optical response of intraband transition between the various states of the conduction band with spin flipping. Enhancement and power broadening observed for excited states probabilities with increase of external fields are directly linked to the emission spectra of QD and will be useful for making future bioimaging devices.

Keywords: bioimaging, multiphoton processes, spin orbit interaction, quantum dot

Procedia PDF Downloads 461
11095 Environmental Impact Assessments in Peru: Tools for Violence

Authors: Nadia Degregori

Abstract:

This paper focuses on Peru’s Environmental Impact Assessment’s communication and participation mechanisms, whose rationale is to prevent conflictive situations by –supposedly- providing high-quality information about mining projects and their impacts to affected stakeholders. It is argued that, in fact, these mechanisms enhance citizens’ feelings of fear and/or mistrust towards mining projects and the companies behind them because their design follows a top-down perspective that limits “participation” to a passive reception of information, and which does not address power unbalances between communities and companies or government. As well, the paper contends that this way of managing the social aspects of Environmental Impact Assessments in Peru leads stakeholders who possess less power (typically communities) to incline towards maintaining the status quo and avoiding negotiations with either the central government or mining companies as a defence mechanism for avoiding a bad negotiation.

Keywords: community relations, environmental impact assessments, governance and participation, mining, Peru

Procedia PDF Downloads 413
11094 Overall Determinants of Foreign Direct Investment Inflows in Kenya

Authors: George Ogono Muok, N. Obange, S. A. Odhiambo

Abstract:

Empirical literature on the determinants of foreign direct investments (FDI) flows is extensive but controversial over some determinants of FDI in-flows in developing countries. The objective of this study therefore was to investigate the overall determinants of FDI inflows in Kenya. Dynamic macroeconomic theory and correlational study design provided theoretical framework for specification of a time series model. The study used data observed from 1970 to 2015 in World Development Indicators (WDI) data bank. The results show that annual growth rate of GDP, inflation rates and external debt as a proportion of GDP are significant determinants of FDI inflows in Kenya and are therefore important macroeconomic parameters for policy formulation for promotion of FDI inflows in Kenya.

Keywords: determinants of foreign, direct, investment inflows in, Kenya, Africa

Procedia PDF Downloads 266
11093 Examination of Relationship between Internet Addiction and Cyber Bullying in Adolescents

Authors: Adem Peker, Yüksel Eroğlu, İsmail Ay

Abstract:

As the information and communication technologies have become embedded in everyday life of adolescents, both their possible benefits and risks to adolescents are being identified. The information and communication technologies provide opportunities for adolescents to connect with peers and to access to information. However, as with other social connections, users of information and communication devices have the potential to meet and interact with in harmful ways. One emerging example of such interaction is cyber bullying. Cyber bullying occurs when someone uses the information and communication technologies to harass or embarrass another person. Cyber bullying can take the form of malicious text messages and e-mails, spreading rumours, and excluding people from online groups. Cyber bullying has been linked to psychological problems for cyber bullies and victims. Therefore, it is important to determine how internet addiction contributes to cyber bullying. Building on this question, this study takes a closer look at the relationship between internet addiction and cyber bullying. For this purpose, in this study, based on descriptive relational model, it was hypothesized that loss of control, excessive desire to stay online, and negativity in social relationships, which are dimensions of internet addiction, would be associated positively with cyber bullying and victimization. Participants were 383 high school students (176 girls and 207 boys; mean age, 15.7 years). Internet addiction was measured by using Internet Addiction Scale. The Cyber Victim and Bullying Scale was utilized to measure cyber bullying and victimization. The scales were administered to the students in groups in the classrooms. In this study, stepwise regression analyses were utilized to examine the relationships between dimensions of internet addiction and cyber bullying and victimization. Before applying stepwise regression analysis, assumptions of regression were verified. According to stepwise regression analysis, cyber bullying was predicted by loss of control (β=.26, p<.001) and negativity in social relationships (β=.13, p<.001). These variables accounted for 9 % of the total variance, with the loss of control explaining the higher percentage (8 %). On the other hand, cyber victimization was predicted by loss of control (β=.19, p<.001) and negativity in social relationships (β=.12, p<.001). These variables altogether accounted for 8 % of the variance in cyber victimization, with the best predictor loss of control (7 % of the total variance). The results of this study demonstrated that, as expected, loss of control and negativity in social relationships predicted cyber bullying and victimization positively. However, excessive desire to stay online did not emerge a significant predictor of both cyberbullying and victimization. Consequently, this study would enhance our understanding of the predictors of cyber bullying and victimization since the results proposed that internet addiction is related with cyber bullying and victimization.

Keywords: cyber bullying, internet addiction, adolescents, regression

Procedia PDF Downloads 298
11092 Corporate Social Responsibility, Earnings, and Tax Avoidance: Evidence from Indonesia

Authors: Cahyaningsih Cahyaningsih, Fu'ad Rakhman

Abstract:

This study examines empirically the association between corporate social responsibility (CSR) and tax avoidance. This study also investigates the effect of earnings on the relation between CSR and tax avoidance. Effective tax rate (ETR) and cash effective tax rate (CETR) were used to measure tax avoidance. Corporate social responsibility fund (CSRF) and corporate social responsibility disclosure (CSRD) were used as proxies for CSR. Test was conducted for public firms which were listed in the Indonesia Stock Exchange during the period of 2011-2014. Based on slack resource theory, this study finds that the relation between CSR and tax avoidance is moderated by earnings.

Keywords: corporate social responsibility disclosure, corporate social responsibility fund, earnings, tax avoidance

Procedia PDF Downloads 258
11091 Framework for Government ICT Projects

Authors: Manal Rayes

Abstract:

In its efforts to utilize the information and communication technology to enhance the quality of public service delivery, national and local governments around the world are competing to introduce more ICT applications as tools to automate processes related to law enforcement or policy execution, increase citizen orientation, trust, and satisfaction, and create one-stop-shops for public services. In its implementation, e-Government ICTs need to maintain transparency, participation, and collaboration. Due to this diverse of mixed goals and requirements, e-Government systems need to be designed based on special design considerations in order to eliminate the risks of failure to compliance to government regulations, citizen dissatisfaction, or market repulsion. In this article we suggest a framework with guidelines for designing government information systems that takes into consideration the special requirements of the public sector. Then we introduce two case studies and show how applying those guidelines would result in a more solid system design.

Keywords: e-government, framework, guidelines, system design

Procedia PDF Downloads 348
11090 Capture Zone of a Well Field in an Aquifer Bounded by Two Parallel Streams

Authors: S. Nagheli, N. Samani, D. A. Barry

Abstract:

In this paper, the velocity potential and stream function of capture zone for a well field in an aquifer bounded by two parallel streams with or without a uniform regional flow of any directions are presented. The well field includes any number of extraction or injection wells or a combination of both types with any pumping rates. To delineate the capture envelope, the potential and streamlines equations are derived by conformal mapping method. This method can help us to release constrains of other methods. The equations can be applied as useful tools to design in-situ groundwater remediation systems, to evaluate the surface–subsurface water interaction and to manage the water resources.

Keywords: complex potential, conformal mapping, image well theory, Laplace’s equation, superposition principle

Procedia PDF Downloads 413
11089 Modeling Aerosol Formation in an Electrically Heated Tobacco Product

Authors: Markus Nordlund, Arkadiusz K. Kuczaj

Abstract:

Philip Morris International (PMI) is developing a range of novel tobacco products with the potential to reduce individual risk and population harm in comparison to smoking cigarettes. One of these products is the Tobacco Heating System 2.2 (THS 2.2), (named as the Electrically Heated Tobacco System (EHTS) in this paper), already commercialized in a number of countries (e.g., Japan, Italy, Switzerland, Russia, Portugal and Romania). During use, the patented EHTS heats a specifically designed tobacco product (Electrically Heated Tobacco Product (EHTP)) when inserted into a Holder (heating device). The EHTP contains tobacco material in the form of a porous plug that undergoes a controlled heating process to release chemical compounds into vapors, from which an aerosol is formed during cooling. The aim of this work was to investigate the aerosol formation characteristics for realistic operating conditions of the EHTS as well as for relevant gas mixture compositions measured in the EHTP aerosol consisting mostly of water, glycerol and nicotine, but also other compounds at much lower concentrations. The nucleation process taking place in the EHTP during use when operated in the Holder has therefore been modeled numerically using an extended Classical Nucleation Theory (CNT) for multicomponent gas mixtures. Results from the performed simulations demonstrate that aerosol droplets are formed only in the presence of an aerosol former being mainly glycerol. Minor compounds in the gas mixture were not able to reach a supersaturated state alone and therefore could not generate aerosol droplets from the multicomponent gas mixture at the operating conditions simulated. For the analytically characterized aerosol composition and estimated operating conditions of the EHTS and EHTP, glycerol was shown to be the main aerosol former triggering the nucleation process in the EHTP. This implies that according to the CNT, an aerosol former, such as glycerol needs to be present in the gas mixture for an aerosol to form under the tested operating conditions. To assess if these conclusions are sensitive to the initial amount of the minor compounds and to include and represent the total mass of the aerosol collected during the analytical aerosol characterization, simulations were carried out with initial masses of the minor compounds increased by as much as a factor of 500. Despite this extreme condition, no aerosol droplets were generated when glycerol, nicotine and water were treated as inert species and therefore not actively contributing to the nucleation process. This implies that according to the CNT, an aerosol cannot be generated without the help of an aerosol former, from the multicomponent gas mixtures at the compositions and operating conditions estimated for the EHTP, even if all minor compounds are released or generated in a single puff.

Keywords: aerosol, classical nucleation theory (CNT), electrically heated tobacco product (EHTP), electrically heated tobacco system (EHTS), modeling, multicomponent, nucleation

Procedia PDF Downloads 256
11088 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 397
11087 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards

Authors: Nadezhda Kvatashidze, Elena Kharabadze

Abstract:

It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.

Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value

Procedia PDF Downloads 301
11086 Environmental and Health Risks Associated with Dental Waste Management: A Review

Authors: Y. Y. Babanyara, B. A. Gana, T. Garba, M. A. Batari

Abstract:

Proper management of dental waste is a crucial issue for maintaining human health and the environment. The waste generated in the dental clinics has the potential for spreading infections and causing diseases, so improper disposal of these dental wastes can cause harm to the dentist, the people in immediate vicinity of the dentist, waste handlers, general public and the environment through production of toxins or as by-products of the destruction process. Staff that provide dental healthcare ought to be aware of the proper handling and the system of management of dental waste used by different dental hospitals. The method of investigation adopted in the paper involved a desk study in which documents and records relating to dental waste handling were studied to obtain background information on existing dental waste management in Nigeria other countries of the world are also mentioned as examples. Additionally, information on generation, handling, segregation, risk associated during handling and treatment of dental medical waste were sought in order to determine the best method for safe disposal. This article provides dentists with the information they need to properly dispose of mercury and amalgam waste, and provides suggestions for managing the other wastes that result from the day-to-day activities of a dental office such as: used X-ray fixers and developers; cleaners for X-ray developer systems; lead foils, shields and aprons; chemiclave/chemical sterilant solutions; disinfectants, cleaners, and other chemicals; and, general office waste. Additionally, this study may be beneficial for authorities and researchers of developing countries to work towards improving their present dental waste management system.

Keywords: clinic, dental, disposal, environment, waste management

Procedia PDF Downloads 305
11085 Facilitating Knowledge Transfer for New Product Development in Portfolio Entrepreneurship: A Case Study of a Sodium-Ion Battery Start-up in China

Authors: Guohong Wang, Hao Huang, Rui Xing, Liyan Tang, Yu Wang

Abstract:

Start-ups are consistently under pressure to overcome liabilities of newness and smallness. They must focus on assembling resource and engaging constant renewal and repeated entrepreneurial activities to survive and grow. As an important form of resource, knowledge is constantly vital to start-ups, which will help start-ups with developing new product in hence forming competitive advantage. However, significant knowledge is usually needed to be identified and exploited from external entities, which makes it difficult to achieve knowledge transfer; with limited resources, it can be quite challenging for start-ups balancing the exploration and exploitation of knowledge. The research on knowledge transfer has become a relatively well-developed domain by indicating that knowledge transfer can be achieved through plenty of patterns, yet it is still under-explored that what processes and organizational practices help start-ups facilitating knowledge transfer for new product in the context portfolio entrepreneurship. Resource orchestration theory emphasizes the initiative and active management of company or the manager to explain the fulfillment of resource utility, which will help understand the process of managing knowledge as a certain kind of resource in start-ups. Drawing on the resource orchestration theory, this research aims to explore how knowledge transfer can be facilitated through resource orchestration. A qualitative single-case study of a sodium-ion battery new venture was conducted. The case company is sampled deliberately from representative industrial agglomeration areas in Liaoning Province, China. It is found that distinctive resource orchestration sub-processes are leveraged to facilitate knowledge transfer: (i) resource structuring makes knowledge available across the portfolio; (ii) resource bundling makes combines internal and external knowledge to form new knowledge; and (iii) resource harmonizing balances specific knowledge configurations across the portfolio. Meanwhile, by purposefully reallocating knowledge configurations to new product development in a certain new venture (exploration) and gradually adjusting knowledge configurations to being applied to existing products across the portfolio (exploitation), resource orchestration processes as a whole make exploration and exploitation of knowledge balanced. This study contributes to the knowledge management literature through proposing a resource orchestration view and depicting how knowledge transfer can be facilitated through different resource orchestration processes and mechanisms. In addition, by revealing the balancing process of exploration and exploitation of knowledge, and laying stress on the significance of the idea of making exploration and exploitation of knowledge balanced in the context of portfolio entrepreneurship, this study also adds specific efforts to entrepreneurship and strategy management literature.

Keywords: exploration and exploitation, knowledge transfer, new product development, portfolio entrepreneur, resource orchestration

Procedia PDF Downloads 114
11084 Fake News Domination and Threats on Democratic Systems

Authors: Laura Irimies, Cosmin Irimies

Abstract:

The public space all over the world is currently confronted with the aggressive assault of fake news that have lately impacted public agenda setting, collective decisions and social attitudes. Top leaders constantly call out most mainstream news as “fake news” and the public opinion get more confused. "Fake news" are generally defined as false, often sensational, information disseminated under the guise of news reporting and has been declared the word of the year 2017 by Collins Dictionary and it also has been one of the most debated socio-political topics of recent years. Websites which, deliberately or not, publish misleading information are often shared on social media where they essentially increase their reach and influence. According to international reports, the exposure to fake news is an undeniable reality all over the world as the exposure to completely invented information goes up to the 31 percent in the US, and it is even bigger in Eastern Europe countries, such as Hungary (42%) and Romania (38%) or in Mediterranean countries, such as Greece (44%) or Turkey (49%), and lower in Northern and Western Europe countries – Germany (9%), Denmark (9%) or Holland (10%). While the study of fake news (mechanism and effects) is still in its infancy, it has become truly relevant as the phenomenon seems to have a growing impact on democratic systems. Studies conducted by the European Commission show that 83% of respondents out of a total of 26,576 interviewees consider the existence of news that misrepresent reality as a threat for democracy. Studies recently conducted at Arizona State University show that people with higher education can more easily spot fake headlines, but over 30 percent of them can still be trapped by fake information. If we were to refer only to some of the most recent situations in Romania, fake news issues and hidden agenda suspicions related to the massive and extremely violent public demonstrations held on August 10th, 2018 with a strong participation of the Romanian diaspora have been massively reflected by the international media and generated serious debates within the European Commission. Considering the above framework, the study raises four main research questions: 1. Is fake news a problem or just a natural consequence of mainstream media decline and the abundance of sources of information? 2. What are the implications for democracy? 3. Can fake news be controlled without restricting fundamental human rights? 4. How could the public be properly educated to detect fake news? The research uses mostly qualitative but also quantitative methods, content analysis of studies, websites and media content, official reports and interviews. The study will prove the real threat fake news represent and also the need for proper media literacy education and will draw basic guidelines for developing a new and essential skill: that of detecting fake in news in a society overwhelmed by sources of information that constantly roll massive amounts of information increasing the risk of misinformation and leading to inadequate public decisions that could affect democratic stability.

Keywords: agenda setting democracy, fake news, journalism, media literacy

Procedia PDF Downloads 104
11083 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 132
11082 ICT for Smart Appliances: Current Technology and Identification of Future ICT Trend

Authors: Abubakar Uba Ibrahim, Ibrahim Haruna Shanono

Abstract:

Smart metering and demand response are gaining ground in industrial and residential applications. Smart Appliances have been given concern towards achieving Smart home. The success of Smart grid development relies on the successful implementation of Information and Communication Technology (ICT) in power sector. Smart Appliances have been the technology under development and many new contributions to its realization have been reported in the last few years. The role of ICT here is to capture data in real time, thereby allowing bi-directional flow of information/data between producing and utilization point; that lead a way for the attainment of Smart appliances where home appliances can communicate between themselves and provide a self-control (switch on and off) using the signal (information) obtained from the grid. This paper depicts the background on ICT for smart appliances paying a particular attention to the current technology and identifying the future ICT trends for load monitoring through which smart appliances can be achieved to facilitate an efficient smart home system which promote demand response program. This paper grouped and reviewed the recent contributions, in order to establish the current state of the art and trends of the technology, so that the reader can be provided with a comprehensive and insightful review of where ICT for smart appliances stands and is heading to. The paper also presents a brief overview of communication types, and then narrowed the discussion to the load monitoring (Non-intrusive Appliances Load Monitoring ‘NALM’). Finally, some future trends and challenges in the further development of the ICT framework are discussed to motivate future contributions that address open problems and explore new possibilities.

Keywords: communication technology between appliances, demand response, load monitoring, smart appliances, smart grid

Procedia PDF Downloads 596