Search results for: data exchange
25892 Enhancing Teachers’ Professional Development Programmes by the Implementation of Flipped Learning Instruction: A Qualitative Study
Authors: Badriah Algarni
Abstract:
The pedagogy of ‘flipped learning’ is a form of blended instruction which is gaining widespread attention throughout the world. However, there is a lack of research concerning teachers’ professional development (TPD) in teachers who use flipping. The aim of this study was, therefore, to identify teachers’ perspectives on their experience of flipped PD. The study used a qualitative approach. Purposive sampling recruited nineteen teachers who participated in semi-structured, in-depth interviews. Thematic analysis was used to analyse the interview data. Overall, the teachers reported feeling more confident in their knowledge and skills after participating in flipped TPD. The analysis of the interview data revealed five overarching themes:1) increased engagement with the content; 2) better use of resources; 3) a social, collaborative environment; 4) exchange of practices and experiences; and 5) valuable online activities. These findings can encourage educators, policymakers, and trainers to consider flipped TPD as a form of PD to promote the building of teachers’ knowledge and stimulate reflective practices to improve teaching and learning practices.Keywords: engagement, flipped learning, teachers’ professional development, collaboration
Procedia PDF Downloads 9625891 Processing Big Data: An Approach Using Feature Selection
Authors: Nikat Parveen, M. Ananthi
Abstract:
Big data is one of the emerging technology, which collects the data from various sensors and those data will be used in many fields. Data retrieval is one of the major issue where there is a need to extract the exact data as per the need. In this paper, large amount of data set is processed by using the feature selection. Feature selection helps to choose the data which are actually needed to process and execute the task. The key value is the one which helps to point out exact data available in the storage space. Here the available data is streamed and R-Center is proposed to achieve this task.Keywords: big data, key value, feature selection, retrieval, performance
Procedia PDF Downloads 34125890 Understanding Magnetic Properties of Cd1-xSnxCr2Se4 Using Local Structure Probes
Authors: P. Suchismita Behera, V. G. Sathe, A. K. Nigam, P. A. Bhobe
Abstract:
Co-existence of long-range ferromagnetism and semi-conductivity with correlated behavior of structural, magnetic, optical and electrical properties in various sites doping at CdCr2Se4 makes it a most promising candidate for spin-based electronic applications and magnetic devices. It orders ferromagnetically below TC = 130 K with a direct band gap of ~ 1.5 eV. The magnetic ordering is believed to result from strong competition between the direct antiferromagnetic Cr-Cr spin couplings and the ferromagnetic Cr-Se-Cr exchange interactions. With an aim of understanding the influence of crystal structure on its magnetic properties without disturbing the magnetic site, we investigated four compositions with 3%, 5%, 7% and 10% of Sn-substitution at Cd-site. Partial substitution of Cd2+ (0.78Å) by small sized nonmagnetic ion, Sn4+ (0.55Å), is expected to bring about local lattice distortion as well as a change in electronic charge distribution. The structural disorder would affect the Cd/Sn – Se bonds thus affecting the Cr-Cr and Cr-Se-Cr bonds. Whereas, the charge imbalance created due to Sn4+ substitution at Cd2+ leads to the possibility of Cr mixed valence state. Our investigation of the local crystal structure using the EXAFS, Raman spectroscopy and magnetic properties using SQUID magnetometry of the Cd1-xSnxCr2Se4 series reflects this premise. All compositions maintain the Fd3m cubic symmetry with tetrahedral distribution of Sn at Cd-site, as confirmed by XRD analysis. Lattice parameters were determined from the Rietveld refinement technique of the XRD data and further confirmed from the EXAFS spectra recorded at Cr K-edge. Presence of five Raman-active phonon vibrational modes viz. (T2g (1), T2g (2), T2g (3), Eg, A1g) in the Raman spectra further confirms the crystal symmetry. Temperature dependence of the Raman data provides interesting insight to the spin– phonon coupling, known to dominate the magneto-capacitive properties in the parent compound. Below the magnetic ordering temperature, the longitudinal damping of Eg mode associated with Se-Cd/Sn-Se bending and T2g (2) mode associated to Cr-Se-Cr interaction, show interesting deviations with respect to increase in Sn substitution. Besides providing the estimate of TC, the magnetic measurements recorded as a function of field provide the values of total magnetic moment for all the studied compositions indicative of formation of multiple Cr valences.Keywords: exchange interactions, EXAFS, ferromagnetism, Raman spectroscopy, spinel chalcogenides
Procedia PDF Downloads 27625889 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 24325888 Effects of Financial and Non-Financial Reports On - Firms Performance
Authors: Vithaya Intaraphimol
Abstract:
This research investigates the effect of financial accounting information and non-financial accounting reports on corporate credibility via strength of board of directors and market environment volatility as moderating effect. Data in this research is collected by questionnaire form non-financial companies listed on the Stock Exchange of Thailand. Multiple regression statistic technique is chosen for analyzing the data. The empirical results find that firms with greater financial accounting information reports and non-financial accounting information reports will gain greater corporate credibility. Therefore, the corporate reporting has the value for the firms. Moreover, the strength of board of directors will positively moderate the financial and non-financial accounting information reports and corporate credibility relationship. Whereas, market environment volatility will negatively moderate the financial and nonfinancial accounting information reports and corporate credibility relationship.Keywords: corporate credibility, financial and non-financial reports, firms performance, economics
Procedia PDF Downloads 45825887 Employee Commitment as a Means of Revitalising the Hospitality Industry post-Covid: Considering the Impact of Psychological Contract and Psychological Capital
Authors: Desere Kokt
Abstract:
Hospitality establishments worldwide are bearing the brunt of the effects of Covid-19. As the hospitality industry is looking to recover, emphasis is placed on rejuvenating the industry. This is especially pertinent for economic development in areas of high unemployment, such as the Free State province of South Africa. The province is not a main tourist area and thus depends on the influx of tourists. The province has great scenic beauty with many accommodation establishments that provide job opportunities to the local population. The two main economic hubs of the Free State province namely Bloemfontein and Clarens, were the focus of the investigation. The emphasis was on graded accommodation establishments as they must adhere to the quality principles of the Tourism Grading Council of South Africa (TGCSA) to obtain star grading. The hospitality industry is known for being labour intensive, and employees need to be available to cater for the needs of paying customers. This is referred to as ‘emotional labour’ and implies that employees need to manage their feelings and emotions as part of performing their jobs. The focus of this study was thus on psychological factors related to working in the hospitality industry – specifically psychological contract and psychological capital and its impact on the commitment of employees in graded accommodation establishments. Employee commitment can be explained as a psychological state that binds the individual to the organisation and involves a set of psychological relationships that include affective (emotions), normative (perceived obligation) and continuance (staying with the organisation) dimensions. Psychological contract refers to the reciprocal beliefs and expectations between the employer and the employee and consists of transactional and rational contracts. Transactional contracts are associated with the economic exchange, and contractional issues related to the employment contract and rational contracts relate to the social exchange between the employee and the organisation. Psychological capital refers to an individual’s positive psychology state of development that is characterised by self-efficiency (having confidence in doing one’s job), optimism (being positive and persevering towards achieving one’s goals), hope (expectations for goals to succeed) and resilience (bouncing back to attain success when beset by problems and adversity). The study employed a quantitative research approach, and a structured questionnaire was used to gather data from respondents. The study was conducted during the Covid-19 pandemic, which hampered the data gathering efforts of the researchers. Many accommodation establishments were either closed or temporarily closed, which meant that data gathering was an intensive and laborious process. The main researcher travelled to the various establishments to collect the data. Nine hospitality establishments participated in the study, and around 150 employees were targeted for data collection. Ninety-two (92) questionnaires were completed, which represents a response rate of 61%. Data were analysed using descriptive and inferential statistics, and partial least squares structural equation modelling (PLS-SEM) was applied to examine the relationship between the variables.Keywords: employee commitment, hospitality industry, psychological contract, psychological capital
Procedia PDF Downloads 10725886 Tritium Activities in Romania, Potential Support for Development of ITER Project
Authors: Gheorghe Ionita, Sebastian Brad, Ioan Stefanescu
Abstract:
In any fusion device, tritium plays a key role both as a fuel component and, due to its radioactivity and easy incorporation, as tritiated water (HTO). As for the ITER project, to reduce the constant potential of tritium emission, there will be implemented a Water Detritiation System (WDS) and an Isotopic Separation System (ISS). In the same time, during operation of fission CANDU reactors, the tritium content increases in the heavy water used as moderator and cooling agent (due to neutron activation) and it has to be reduced, too. In Romania, at the National Institute for Cryogenics and Isotopic Technologies (ICIT Rm-Valcea), there is an Experimental Pilot Plant for Tritium Removal (Exp. TRF), with the aim of providing technical data on the design and operation of an industrial plant for heavy water depreciation of CANDU reactors from Cernavoda NPP. The selected technology is based on the catalyzed isotopic exchange process between deuterium and liquid water (LPCE) combined with the cryogenic distillation process (CD). This paper presents an updated review of activities in the field carried out in Romania after the year 2000 and in particular those related to the development and operation of Tritium Removal Experimental Pilot Plant. It is also presented a comparison between the experimental pilot plant and industrial plant to be implemented at Cernavoda NPP. The similarities between the experimental pilot plant from ICIT Rm-Valcea and water depreciation and isotopic separation systems from ITER are also presented and discussed. Many aspects or 'opened issues' relating to WDS and ISS could be checked and clarified by a special research program, developed within ExpTRF. By these achievements and results, ICIT Rm - Valcea has proved its expertise and capability concerning tritium management therefore its competence may be used within ITER project.Keywords: ITER project, heavy water detritiation, tritium removal, isotopic exchange
Procedia PDF Downloads 41325885 Adsorptive Desulfurization of Using Cu(I) – Y Zeolite via π-Complexation
Authors: Moshe Mello, Hilary Rutto, Tumisang Seodigeng, Itumeleng Kohitlhetse
Abstract:
The accelerating requirement to reach 0% sulfur content in liquid fuels demand researchers to seek efficient alternative technologies to challenge the predicament. In this current study, the adsorption capabilities of modified Cu(I)-Y zeolite were tested for the removal of organosulfur compounds (OSC) present in tire pyrolytic oil (TPO). The π-complexation-based adsorbent was obtained by ion exchanging Y-zeolite with Cu+ cation using liquid phase ion exchange (LPIE). Preparation of the adsorbent involved firstly ion exchange between Na-Y zeolite with a Cu(NO₃)₂ aqueous solution of 0.5M for 48 hours followed by reduction of Cu²⁺ to Cu+. Fixed-bed breakthrough studies for TPO in comparison with model diesel comprising of sulfur compounds such as thiophene, benzothiophenes (BT), and dibenzothiophenes (DBT) showed that modified Cu(I)-Y zeolite is an effective adsorbent for removal of OSC in liquid fuels. The effect of operating conditions such as adsorbent dosage and reaction time were studied to optimize the adsorptive desulfurization process. For model diesel fuel, the selectivity for adsorption of sulfur compounds followed the order DBT> BT> Thiophene. The Cu(I)-Y zeolite is fully regeneratable and this is achieved by a simple procedure of blowing the adsorbent with air at 350 °C, followed by reactivation at 450 °C in a rich helium surrounding.Keywords: adsorption, desulfurization, TPO, zeolite
Procedia PDF Downloads 11525884 Stock Prediction and Portfolio Optimization Thesis
Authors: Deniz Peksen
Abstract:
This thesis aims to predict trend movement of closing price of stock and to maximize portfolio by utilizing the predictions. In this context, the study aims to define a stock portfolio strategy from models created by using Logistic Regression, Gradient Boosting and Random Forest. Recently, predicting the trend of stock price has gained a significance role in making buy and sell decisions and generating returns with investment strategies formed by machine learning basis decisions. There are plenty of studies in the literature on the prediction of stock prices in capital markets using machine learning methods but most of them focus on closing prices instead of the direction of price trend. Our study differs from literature in terms of target definition. Ours is a classification problem which is focusing on the market trend in next 20 trading days. To predict trend direction, fourteen years of data were used for training. Following three years were used for validation. Finally, last three years were used for testing. Training data are between 2002-06-18 and 2016-12-30 Validation data are between 2017-01-02 and 2019-12-31 Testing data are between 2020-01-02 and 2022-03-17 We determine Hold Stock Portfolio, Best Stock Portfolio and USD-TRY Exchange rate as benchmarks which we should outperform. We compared our machine learning basis portfolio return on test data with return of Hold Stock Portfolio, Best Stock Portfolio and USD-TRY Exchange rate. We assessed our model performance with the help of roc-auc score and lift charts. We use logistic regression, Gradient Boosting and Random Forest with grid search approach to fine-tune hyper-parameters. As a result of the empirical study, the existence of uptrend and downtrend of five stocks could not be predicted by the models. When we use these predictions to define buy and sell decisions in order to generate model-based-portfolio, model-based-portfolio fails in test dataset. It was found that Model-based buy and sell decisions generated a stock portfolio strategy whose returns can not outperform non-model portfolio strategies on test dataset. We found that any effort for predicting the trend which is formulated on stock price is a challenge. We found same results as Random Walk Theory claims which says that stock price or price changes are unpredictable. Our model iterations failed on test dataset. Although, we built up several good models on validation dataset, we failed on test dataset. We implemented Random Forest, Gradient Boosting and Logistic Regression. We discovered that complex models did not provide advantage or additional performance while comparing them with Logistic Regression. More complexity did not lead us to reach better performance. Using a complex model is not an answer to figure out the stock-related prediction problem. Our approach was to predict the trend instead of the price. This approach converted our problem into classification. However, this label approach does not lead us to solve the stock prediction problem and deny or refute the accuracy of the Random Walk Theory for the stock price.Keywords: stock prediction, portfolio optimization, data science, machine learning
Procedia PDF Downloads 8125883 The Charge Exchange and Mixture Formation Model in the ASz-62IR Radial Aircraft Engine
Authors: Pawel Magryta, Tytus Tulwin, Paweł Karpiński
Abstract:
The ASz62IR engine is a radial aircraft engine with 9 cylinders. This object is produced by the Polish company WSK "PZL-KALISZ" S.A. This is engine is currently being developed by the above company and Lublin University of Technology. In order to provide an effective work of the technological development of this unit it was decided to made the simulation model. The model of ASz-62IR was developed with AVL BOOST software which is a tool dedicated to the one-dimensional modeling of internal combustion engines. This model can be used to calculate parameters of an air and fuel flow in an intake system including charging devices as well as combustion and exhaust flow to the environment. The main purpose of this model is the analysis of the charge exchange and mixture formation in this engine. For this purpose, the model consists of elements such: as air inlet, throttle system, compressor connector, charging compressor, inlet pipes and injectors, outlet pipes, fuel injection and model of fuel mixing and evaporation. The model of charge exchange and mixture formation was based on the model of mass flow rate in intake and exhaust pipes, and also on the calculation of gas properties values like gas constant or thermal capacity. This model was based on the equations to describe isentropic flow. The energy equation to describe flow under steady conditions was transformed into the mass flow equation. In the model the flow coefficient μσ was used, that varies with the stroke/valve opening and was determined in a steady flow state. The geometry of the inlet channels and other key components was mapped with reference to the technical documentation of the engine and empirical measurements of the structure elements. The volume of elements on the charge flow path between the air inlet and the exhaust outlet was measured by the CAD mapping of the structure. Taken from the technical documentation, the original characteristics of the compressor engine was entered into the model. Additionally, the model uses a general model for the transport of chemical compounds of the mixture. There are 7 compounds used, i.e. fuel, O2, N2, CO2, H2O, CO, H2. A gasoline fuel of a calorific value of 43.5 MJ/kg and an air mass fraction for stoichiometric mixture of 14.5 were used. Indirect injection into the intake manifold is used in this model. The model assumes the following simplifications: the mixture is homogenous at the beginning of combustion, accordingly, mixture stoichiometric coefficient A/F remains constant during combustion, combusted and non-combusted charges show identical pressures and temperatures although their compositions change. As a result of the simulation studies based on the model described above, the basic parameters of combustion process, charge exchange, mixture formation in cylinders were obtained. The AVL Boost software is very useful for the piston engine performance simulations. This work has been financed by the Polish National Centre for Research and Development, INNOLOT, under Grant Agreement No. INNOLOT/I/1/NCBR/2013.Keywords: aviation propulsion, AVL Boost, engine model, charge exchange, mixture formation
Procedia PDF Downloads 33925882 Value in Exchange: The Importance of Users Interaction as the Center of User Experiences
Authors: Ramlan Jantan, Norfadilah Kamaruddin, Shahriman Zainal Abidin
Abstract:
In this era of technology, the co-creation method has become a new development trend. In this light, most design businesses have currently transformed their development strategy from being goods-dominant into service-dominant where more attention is given to the end-users and their roles in the development process. As a result, the conventional development process has been replaced with a more cooperative one. Consequently, numerous studies have been conducted to explore the extension of co-creation method in the design development process and most studies have focused on issues found during the production process. In the meantime, this study aims to investigate potential values established during the pre-production process, which is also known as the ‘circumstances value creation’. User involvement is questioned and crucially debate at the entry level of pre-production process in value in-exchange jointly spheres; thus user experiences took place. Thus, this paper proposed a potential framework of the co-creation method for Malaysian interactive product development. The framework is formulated from both parties involved: the users and designers. The framework will clearly give an explanation of the value of the co-creation method, and it could assist relevant design industries/companies in developing a blueprint for the design process. This paper further contributes to the literature on the co-creation of value and digital ecosystems.Keywords: co-creation method, co-creation framework, co-creation, co-production
Procedia PDF Downloads 17825881 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 46925880 Analyzing Data Protection in the Era of Big Data under the Framework of Virtual Property Layer Theory
Authors: Xiaochen Mu
Abstract:
Data rights confirmation, as a key legal issue in the development of the digital economy, is undergoing a transition from a traditional rights paradigm to a more complex private-economic paradigm. In this process, data rights confirmation has evolved from a simple claim of rights to a complex structure encompassing multiple dimensions of personality rights and property rights. Current data rights confirmation practices are primarily reflected in two models: holistic rights confirmation and process rights confirmation. The holistic rights confirmation model continues the traditional "one object, one right" theory, while the process rights confirmation model, through contractual relationships in the data processing process, recognizes rights that are more adaptable to the needs of data circulation and value release. In the design of the data property rights system, there is a hierarchical characteristic aimed at decoupling from raw data to data applications through horizontal stratification and vertical staging. This design not only respects the ownership rights of data originators but also, based on the usufructuary rights of enterprises, constructs a corresponding rights system for different stages of data processing activities. The subjects of data property rights include both data originators, such as users, and data producers, such as enterprises, who enjoy different rights at different stages of data processing. The intellectual property rights system, with the mission of incentivizing innovation and promoting the advancement of science, culture, and the arts, provides a complete set of mechanisms for protecting innovative results. However, unlike traditional private property rights, the granting of intellectual property rights is not an end in itself; the purpose of the intellectual property system is to balance the exclusive rights of the rights holders with the prosperity and long-term development of society's public learning and the entire field of science, culture, and the arts. Therefore, the intellectual property granting mechanism provides both protection and limitations for the rights holder. This perfectly aligns with the dual attributes of data. In terms of achieving the protection of data property rights, the granting of intellectual property rights is an important institutional choice that can enhance the effectiveness of the data property exchange mechanism. Although this is not the only path, the granting of data property rights within the framework of the intellectual property rights system helps to establish fundamental legal relationships and rights confirmation mechanisms and is more compatible with the classification and grading system of data. The modernity of the intellectual property rights system allows it to adapt to the needs of big data technology development through special clauses or industry guidelines, thus promoting the comprehensive advancement of data intellectual property rights legislation. This paper analyzes data protection under the virtual property layer theory and two-fold virtual property rights system. Based on the “bundle of right” theory, this paper establishes specific three-level data rights. This paper analyzes the cases: Google v. Vidal-Hall, Halliday v Creation Consumer Finance, Douglas v Hello Limited, Campbell v MGN and Imerman v Tchenquiz. This paper concluded that recognizing property rights over personal data and protecting data under the framework of intellectual property will be beneficial to establish the tort of misuse of personal information.Keywords: data protection, property rights, intellectual property, Big data
Procedia PDF Downloads 4125879 Experimental Investigation of Proton Exchange Membrane Fuel Cells Operated with Nano Fiber and Nano Fiber/Nano Particle
Authors: Kevser Dincer, Basma Waisi, M. Ozan Ozdemir, Ugur Pasaogullari, Jeffrey McCutcheon
Abstract:
Nanofibers are defined as fibers with diameters less than 100 nanometers. They can be produced by interfacial polymerization, electrospinning and electrostatic spinning. In this study, behaviours of activated carbon nano fiber (ACNF), carbon nano-fiber (CNF), Polyacrylonitrile/carbon nanotube (PAN/CNT), Polyvinyl alcohol/nano silver (PVA/Ag) in PEM fuel cells are investigated experimentally. This material was used as gas diffusion layer (GDL) in PEM fuel cells. When the performances of these cells are compared to each other at 5x5 cm2 cell, it is found that the PVA/Ag exhibits the best performance among all. In this work, nano fiber and nano fiber/nano particles electrical conductivities have been studied to understand their effects on PEM fuel cell performance. According to the experimental results, the maximum electrical conductivity performance of the fuel cell with nanofiber was found to be at PVA/Ag. The electrical conductivities of CNF, ACNF, PAN/CNT are lower for PEM. The resistance of cell with PVA/Ag is lower than the resistance of cell with PAN/CNT, ACNF, CNF.Keywords: proton exchange membrane fuel cells, electrospinning, carbon nano fiber, activate carbon nano-fiber, PVA fiber, PAN fiber, carbon nanotube, nano particle nanocomposites
Procedia PDF Downloads 39225878 Electronic Data Interchange (EDI) in the Supply Chain: Impact on Customer Satisfaction
Authors: Hicham Amine, Abdelouahab Mesnaoui
Abstract:
Electronic data interchange EDI is the computer-to-computer exchange of structured business information. This information typically takes the form of standardized electronic business documents, such as invoices, purchase orders, bills of lading, and so on. The purpose of this study is to identify the impact EDI might have on supply chain and typically on customer satisfaction keeping in mind the constraints the organization might face. This study included 139 subject matter experts (SMEs) who participated by responding to a survey that was distributed. 85% responded that they are extremely for the implementation while 10% were neutral and 5% were against the implementation. From the quality assurance department, we have got 75% from the clients agreed to move on with the change whereas 10% stayed neutral and finally 15% were against the change. From the legal department where 80% of the answers were for the implementation and 10% of the participants stayed neutral whereas the last 10% were against it. The survey consisted of 40% male and 60% female (sex-ratio (F/M=1,5), who had chosen to participate. Our survey also contained 3 categories in terms of technical background where 80% are from technical background and 15% were from nontechnical background and 5% had some average technical background. This study examines the impact of EDI on customer satisfaction which is the primary hypothesis and justifies the importance of the implementation which enhances the customer satisfaction.Keywords: electronic data interchange, supply chain, subject matter experts, customer satisfaction
Procedia PDF Downloads 34025877 Computational Insight into a Mechanistic Overview of Water Exchange Kinetics and Thermodynamic Stabilities of Bis and Tris-Aquated Complexes of Lanthanides
Authors: Niharika Keot, Manabendra Sarma
Abstract:
A thorough investigation of Ln3+ complexes with more than one inner-sphere water molecule is crucial for designing high relaxivity contrast agents (CAs) used in magnetic resonance imaging (MRI). This study accomplished a comparative stability analysis of two hexadentate (H3cbda and H3dpaa) and two heptadentate (H4peada and H3tpaa) ligands with Ln3+ ions. The higher stability of the hexadentate H3cbda and heptadentate H4peada ligands has been confirmed by the binding affinity and Gibbs free energy analysis in aqueous solution. In addition, energy decomposition analysis (EDA) reveals the higher binding affinity of the peada4− ligand than the cbda3− ligand towards Ln3+ ions due to the higher charge density of the peada4− ligand. Moreover, a mechanistic overview of water exchange kinetics has been carried out based on the strength of the metal–water bond. The strength of the metal–water bond follows the trend Gd–O47 (w) > Gd–O39 (w) > Gd–O36 (w) in the case of the tris-aquated [Gd(cbda)(H2O)3] and Gd–O43 (w) > Gd–O40 (w) for the bis-aquated [Gd(peada)(H2O)2]− complex, which was confirmed by bond length, electron density (ρ), and electron localization function (ELF) at the corresponding bond critical points. Our analysis also predicts that the activation energy barrier decreases with the decrease in bond strength; hence kex increases. The 17O and 1H hyperfine coupling constant values of all the coordinated water molecules were different, calculated by using the second-order Douglas–Kroll–Hess (DKH2) approach. Furthermore, the ionic nature of the bonding in the metal–ligand (M–L) bond was confirmed by the Quantum Theory of Atoms-In-Molecules (QTAIM) and ELF along with energy decomposition analysis (EDA). We hope that the results can be used as a basis for the design of highly efficient Gd(III)-based high relaxivity MRI contrast agents for medical applications.Keywords: MRI contrast agents, lanthanide chemistry, thermodynamic stability, water exchange kinetics
Procedia PDF Downloads 8425876 Effect of Sustainability Accounting Disclosure on Financial Performance of Listed Brewery Firms in Nigeria
Authors: Patricia Chinyere Oranefo
Abstract:
This study examined the effect of sustainability accounting disclosure on financial performance of listed Brewery firms in Nigeria. The dearth of empirical evidence and literature on “governance disclosure” as one of the explanatory variables of sustainability accounting reporting were the major motivation for this study. The main objective was to ascertain the effect of sustainability accounting disclosure on financial performance of listed Brewery firms in Nigeria. An ex–post facto research design approach was adopted for the study. The population of this study comprises of five (5) Brewery firms quoted on the floor of the Nigeria exchange group (NSX) and the sample size of four (4) listed firms was drawn using purposive sampling method. Secondary data were carefully sourced from the financial statement/annual reports and sustainability reports from 2012 to 2021 of the Brewery firms quoted on the Nigeria exchange group (NSX). Panel regression analysis by aid of E-views 10.0 software was used to test for statistical significance of the effect of sustainability accounting disclosure on financial performance of listed Brewery firms in Nigeria. The results showed that economic sustainability disclosure indexes do not significantly affect return on asset of listed Brewery firms in Nigeria. The findings further revealed that environmental sustainability disclosure indexes do not significantly affect return on equity of listed Brewery firms in Nigeria. More so, results showed that Social Sustainability disclosure indexes significantly affect Net Profit Margin of listed Brewery firms in Nigeria. Finally, the result established also that governance sustainability disclosure indexes do not significantly affect Earnings per share of listed Brewery firms in Nigeria. Consequent upon the findings, this study recommended among others; that managers of Brewers in Nigeria should improve and sustain full disclosure practices on economic, environmental, social and governance disclosures following the guidelines of the Global Reporting Index (GRI) as they are capable of exerting significant effect on financial performance of firms in Nigeria.Keywords: sustainability, accounting, disclosure, financial performance
Procedia PDF Downloads 6125875 Re-Constructing the Research Design: Dealing with Problems and Re-Establishing the Method in User-Centered Research
Authors: Kerem Rızvanoğlu, Serhat Güney, Emre Kızılkaya, Betül Aydoğan, Ayşegül Boyalı, Onurcan Güden
Abstract:
This study addresses the re-construction and implementation process of the methodological framework developed to evaluate how locative media applications accompany the urban experiences of international students coming to Istanbul with exchange programs in 2022. The research design was built on a three-stage model. The research team conducted a qualitative questionnaire in the first stage to gain exploratory data. These data were then used to form three persona groups representing the sample by applying cluster analysis. In the second phase, a semi-structured digital diary study was carried out on a gamified task list with a sample selected from the persona groups. This stage proved to be the most difficult to obtaining valid data from the participant group. The research team re-evaluated the design of this second phase to reach the participants who will perform the tasks given by the research team while sharing their momentary city experiences, to ensure the daily data flow for two weeks, and to increase the quality of the obtained data. The final stage, which follows to elaborate on the findings, is the “Walk & Talk,” which is completed with face-to-face and in-depth interviews. It has been seen that the multiple methods used in the research process contribute to the depth and data diversity of the research conducted in the context of urban experience and locative technologies. In addition, by adapting the research design to the experiences of the users included in the sample, the differences and similarities between the initial research design and the research applied are shown.Keywords: digital diary study, gamification, multi-model research, persona analysis, research design for urban experience, user-centered research, “Walk & Talk”
Procedia PDF Downloads 17125874 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 38525873 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption
Authors: Koyangbo Guere Monguia Michel Alex Emmanuel
Abstract:
In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization
Procedia PDF Downloads 36025872 A Review of Existing Turnover Intention Theories
Authors: Pauline E. Ngo-Henha
Abstract:
Existing turnover intention theories are reviewed in this paper. This review was conducted with the help of the search keyword “turnover intention theories” in Google Scholar during the month of July 2017. These theories include: The Theory of Organizational Equilibrium (TOE), Social Exchange Theory, Job Embeddedness Theory, Herzberg’s Two-Factor Theory, the Resource-Based View, Equity Theory, Human Capital Theory, and the Expectancy Theory. One of the limitations of this review paper is that data were only collected from Google Scholar where many papers were sometimes not freely accessible. However, this paper attempts to contribute to the research in clarifying the distinction between theories and models in the context of turnover intention.Keywords: Literature Review, Theory, Turnover, Turnover intention
Procedia PDF Downloads 46025871 Production Process for Diesel Fuel Components Polyoxymethylene Dimethyl Ethers from Methanol and Formaldehyde Solution
Authors: Xiangjun Li, Huaiyuan Tian, Wujie Zhang, Dianhua Liu
Abstract:
Polyoxymethylene dimethyl ethers (PODEn) as clean diesel additive can improve the combustion efficiency and quality of diesel fuel and alleviate the problem of atmospheric pollution. Considering synthetic routes, PODE production from methanol and formaldehyde is regarded as the most economical and promising synthetic route. However, methanol used for synthesizing PODE can produce water, which causes the loss of active center of catalyst and hydrolysis of PODEn in the production process. Macroporous strong acidic cation exchange resin catalyst was prepared, which has comparative advantages over other common solid acid catalysts in terms of stability and catalytic efficiency for synthesizing PODE. Catalytic reactions were carried out under 353 K, 1 MPa and 3mL·gcat-1·h-1 in a fixed bed reactor. Methanol conversion and PODE3-6 selectivity reached 49.91% and 23.43%, respectively. Catalyst lifetime evaluation showed that resin catalyst retained its catalytic activity for 20 days without significant changes and catalytic activity of completely deactivated resin catalyst can basically return to previous level by simple acid regeneration. The acid exchange capacities of original and deactivated catalyst were 2.5191 and 0.0979 mmol·g-1, respectively, while regenerated catalyst reached 2.0430 mmol·g-1, indicating that the main reason for resin catalyst deactivation is that Brønsted acid sites of original resin catalyst were temporarily replaced by non-hydrogen ion cations. A separation process consisting of extraction and distillation for PODE3-6 product was designed for separation of water and unreacted formaldehyde from reactive mixture and purification of PODE3-6, respectively. The concentration of PODE3-6 in final product can reach up to 97%. These results indicate that the scale-up production of PODE3-6 from methanol and formaldehyde solution is feasible.Keywords: inactivation, polyoxymethylene dimethyl ethers, separation process, sulfonic cation exchange resin
Procedia PDF Downloads 13925870 Synthesis of Iron-Modified Montmorillonite as Filler for Electrospun Nanocomposite Fibers
Authors: Khryslyn Araño, Dela Cruz, Michael Leo, Dela Pena, Eden May, Leslie Joy Diaz
Abstract:
Montmorillonite (MMT) is a very abundant clay mineral and is versatile such that it can be chemically or physically altered by changing the ions between the sheets of its layered structure. This clay mineral can be prepared into functional nanoparticles that can be used as fillers in other nanomaterials such as nanofibers to achieve special properties. In this study, two types of iron-modified MMT, Iron-MMT (FeMMT) and Zero Valent Iron-MMT (ZVIMMT) were synthesized via ion exchange technique. The modified clay was incorporated in polymer nanofibers which were produced using a process called electrospinning. ICP analysis confirmed that clay modification was successful where there is an observed decrease in the concentration of Na and an increase in the concentration of Fe after ion exchange. XRD analysis also confirmed that modification took place because of the changes in the d-spacing of Na-MMT from 11.5 Å to 13.6 Å and 12.6 Å after synthesis of FeMMT and ZVIMMT, respectively. SEM images of the electrospun nanofibers revealed that the ZVIMMT-filled fibers have a smaller average diameter than the FeMMT-filled fibers because of the lower resistance of the suspensions of the former to the elongation force from the applied electric field. The resistance to the electric field was measured by getting the bulk voltage of the suspensions.Keywords: electrospinning, nanofibers, montmorillonite, materials science
Procedia PDF Downloads 34525869 Between Leader-Member Exchange and Toxic Leadership: A Theoretical Review
Authors: Aldila Dyas Nurfitri
Abstract:
Nowadays, leadership has became the one of main issues in forming organization groups even countries. The concept of a social contract between the leaders and subordinates become one of the explanations for the leadership process. The interests of the two parties are not always the same, but they must work together to achieve both goals. Based on the concept at the previous it comes “The Leader Member Exchange Theory”—well known as LMX Theory, which assumes that leadership is a process of social interaction interplay between the leaders and their subordinates. High-quality LMX relationships characterized by a high carrying capacity, informal supervision, confidence, and power negotiation enabled, whereas low-quality LMX relationships are described by low support, large formal supervision, less or no participation of subordinates in decision-making, and less confidence as well as the attention of the leader Application of formal supervision system in a low LMX behavior was in line with strict controls on toxic leadership model. Leaders must be able to feel toxic control all aspects of the organization every time. Leaders with this leadership model does not give autonomy to the staff. This behavior causes stagnation and make a resistant organizational culture in an organization. In Indonesia, the pattern of toxic leadership later evolved into a dysfunctional system that is growing rapidly. One consequence is the emergence of corrupt behavior. According to Kellerman, corruption is defined as a pattern and some subordinates behave lie, cheat or steal to a degree that goes beyond the norm, they put self-interest than the common good.According to the corruption data in Indonesia based on the results of ICW research on 2012 showed that the local government sector ranked first with 177 cases. Followed by state or local enterprises as much as 41 cases. LMX is defined as the quality of the relationship between superiors and subordinates are implications for the effectiveness and progress of the organization. The assumption of this theory that leadership as a process of social interaction interplay between the leaders and his followers are characterized by a number of dimensions, such as affection, loyalty, contribution, and professional respect. Meanwhile, the toxic leadership is dysfunctional leadership in organization that is led by someone with the traits are not able to adjust, do not have integrity, malevolent, evil, and full of discontent marked by a number of characteristics, such as self-centeredness, exploiting others, controlling behavior, disrespecting others, suppress innovation and creativity of employees, and inadequate emotional intelligence. The leaders with some characteristics, such as high self-centeredness, exploiting others, controlling behavior, and disrespecting others, tends to describe a low LMX relationships directly with subordinates compared with low self-centeredness, exploiting others, controlling behavior, and disrespecting others. While suppress innovation and creativity of employees aspect and inadequate emotional intelligence, tend not to give direct effect to the low quality of LMX.Keywords: leader-member exchange, toxic leadership, leadership
Procedia PDF Downloads 48825868 Artificial Seed Production in Stipagrostis pennata
Authors: Masoumeh Asadi Aghbolaghi, Beata Dedicova, Farzad Sharifzadeh, Mansoor Omidi, Ulrika Egertsdotter
Abstract:
Stipagrostis pennata is one of the valuable fodder plants and is very resistant to drought, due to the low capacity of seed production, the use of asexual reproduction methods, including somatic embryogenesis and artificial seed, can increase its reproduction on a large scale. This study was conducted in order to obtain optimal treatments for the production of artificial seeds of this plant through the somatic embryo encapsulating. Embryonic calluses were encapsulated using sodium alginate and calcium chloride and then sowed in a germination medium. The experiment was conducted as a factorial based on a completely randomized design with three replications. The treatments include three concentrations of sodium alginate (1.5, 2.5, and 3.5 percent), two ion exchange times (20 and 30 minutes,) and two artificial seed germination media (hormone free MS and MS containing zeatin riboside and L-proline). Germination percentage and number of days until the beginning of germination were investigated. The highest percentage of artificial seed germination was obtained when 2.5% sodium alginate was used for 30 minutes (ion exchange time) and the seeds were placed on the germination medium containing zeatin riboside and L-proline.Keywords: somatic embryogenesis, Stipagrostis pennata, synthetic seed, tissue culture
Procedia PDF Downloads 10025867 Applications of Big Data in Education
Authors: Faisal Kalota
Abstract:
Big Data and analytics have gained a huge momentum in recent years. Big Data feeds into the field of Learning Analytics (LA) that may allow academic institutions to better understand the learners’ needs and proactively address them. Hence, it is important to have an understanding of Big Data and its applications. The purpose of this descriptive paper is to provide an overview of Big Data, the technologies used in Big Data, and some of the applications of Big Data in education. Additionally, it discusses some of the concerns related to Big Data and current research trends. While Big Data can provide big benefits, it is important that institutions understand their own needs, infrastructure, resources, and limitation before jumping on the Big Data bandwagon.Keywords: big data, learning analytics, analytics, big data in education, Hadoop
Procedia PDF Downloads 42725866 Social Media and Internet Celebrity for Social Commerce Intentional and Behavioral Recommendations
Authors: Shu-Hsien Liao, Yao-Hsuan Yang
Abstract:
Social media is a virtual community and online platform that people use to create, share, and exchange opinions/experiences. Internet celebrities are people who become famous on the Internet, increasing their popularity through their social networking or video websites. Social commerce (s-ecommerce) is the combination of social relations and commercial transaction activities. The combination of social media and Internet celebrities is an emerging model for the development of s-ecommerce. With recent advances in system sciences, recommendation systems are gradually moving to develop intentional and behavioral recommendations. This background leads to the research issues regarding digital and social media in enterprises. Thus, this study implements data mining analytics, including clustering analysis and association rules, to investigate Taiwanese users (n=2,102) to investigate social media and Internet celebrities’ preferences to find knowledge profiles/patterns/rules for s-ecommerce intentional and behavioral recommendations.Keywords: social media, internet celebrity, social commerce (s-ecommerce), data mining analytics, intentional and behavioral recommendations
Procedia PDF Downloads 3325865 Pollution Assessment and Potential Ecological Risk of Some Traces Metals in the Surface Sediments of the Gulf of Tunis, North Tunisia
Authors: Haïfa Ben Mna, Ayed Added
Abstract:
To evaluate the trace metals contamination status in the Gulf of Tunis, forty one sediment samples were analyzed using different approaches. According to certain contamination and ecological risk indices (Contamination Factor, Geoaccumulation index and Ecological risk index), Hg has the highest contamination level while pollution by Ni, Pb, Cd and Cr was absent. The highest concentrations of trace metals were found in sediments collected from the offshore and coastal areas located opposite the main exchange points with the gulf particularly, the Mejerda and Meliane Rivers, the Khalij Channel, Ghar El Melh and El Malah lagoons, Tunis Lake and Sebkhat Ariana. However, further ecological indices (Potential ecological risk index, Toxic unit and Mean effect-range median quotient) and comparison with sediment quality guidelines suggest that in addition to Mercury, Cr, Pb and Ni concentrations are detrimental to biota in both the offshore and areas near to the exchange points with the gulf. Moreover, in these areas the results from sequential extraction and individual contamination factor calculation pointed to the mobility and bioavailability of Cr, Pb and Ni.Keywords: sediment, trace metals, contamination assessment, ecological risk, Tunis gulf
Procedia PDF Downloads 8425864 Exchanging Radiology Reporting System with Electronic Health Record: Designing a Conceptual Model
Authors: Azadeh Bashiri
Abstract:
Introduction: In order to better designing of electronic health record system in Iran, integration of health information systems based on a common language must be done to interpret and exchange this information with this system is required. Background: This study, provides a conceptual model of radiology reporting system using unified modeling language. The proposed model can solve the problem of integration this information system with electronic health record system. By using this model and design its service based, easily connect to electronic health record in Iran and facilitate transfer radiology report data. Methods: This is a cross-sectional study that was conducted in 2013. The student community was 22 experts that working at the Imaging Center in Imam Khomeini Hospital in Tehran and the sample was accorded with the community. Research tool was a questionnaire that prepared by the researcher to determine the information requirements. Content validity and test-retest method was used to measure validity and reliability of questioner respectively. Data analyzed with average index, using SPSS. Also, Visual Paradigm software was used to design a conceptual model. Result: Based on the requirements assessment of experts and related texts, administrative, demographic and clinical data and radiological examination results and if the anesthesia procedure performed, anesthesia data suggested as minimum data set for radiology report and based it class diagram designed. Also by identifying radiology reporting system process, use case was drawn. Conclusion: According to the application of radiology reports in electronic health record system for diagnosing and managing of clinical problem of the patient, provide the conceptual Model for radiology reporting system; in order to systematically design it, the problem of data sharing between these systems and electronic health records system would eliminate.Keywords: structured radiology report, information needs, minimum data set, electronic health record system in Iran
Procedia PDF Downloads 25425863 Sexting Phenomenon in Educational Settings: A Data Mining Approach
Authors: Koutsopoulou Ioanna, Gkintoni Evgenia, Halkiopoulos Constantinos, Antonopoulou Hera
Abstract:
Recent advances in Internet Computer Technology (ICT) and the ever-increasing use of technological equipment amongst adolescents and young adults along with unattended access to the internet and social media and uncontrolled use of smart phones and PCs have caused social problems like sexting to emerge. The main purpose of the present article is first to present an analytic theoretical framework of sexting as a recent social phenomenon based on studies that have been conducted the last decade or so; and second to investigate Greek students’ and also social network users, sexting perceptions and to record how often social media users exchange sexual messages and to retrace demographic variables predictors. Data from 1,000 students were collected and analyzed and all statistical analysis was done by the software package WEKA. The results indicate among others, that the use of data mining methods is an important tool to draw conclusions that could affect decision and policy making especially in the field and related social topics of educational psychology. To sum up, sexting lurks many risks for adolescents and young adults students in Greece and needs to be better addressed in relevance to the stakeholders as well as society in general. Furthermore, policy makers, legislation makers and authorities will have to take action to protect minors. Prevention strategies based on Greek cultural specificities are being proposed. This social problem has raised concerns in recent years and will most likely escalate concerns in global communities in the future.Keywords: educational ethics, sexting, Greek sexters, sex education, data mining
Procedia PDF Downloads 182