Search results for: challenges of management
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13669

Search results for: challenges of management

9559 The Failure of Democracy in Libya

Authors: Ali Musbah Mohamed Elwahishi

Abstract:

Democracy is demand for the majority of people in the whole world, Specifically in the regions that are still outside the democratic life such as Libya and other Arab countries. Although democracy has spread across the world through three waves of democratization, Libya is still outside the democratic process, even recently its regime has changed. The challenges of democracy in Libya are not new, they represent accumulations over time that impeded to achieve this goal. This paper concludes that the absence of democracy in Libya because of set of factors that include: colonial legacy, oil wealth, the lack of institutions, the lack of political parties, tribal factor and recently the spread of the armed groups. These factors prevented Libya to be democratic state whether during King Idris’, Qaddafi’s or even after Qaddafi rule.

Keywords: the failure of democracy, political transition, the lack of institutions, Libya, Arab countries

Procedia PDF Downloads 453
9558 Comprehensive Interpretation of Leadership from the Narratives in Literature

Authors: Nidhi Kaushal, Sanjit Mishra

Abstract:

Narrative writings in literature are ample source of knowledge and easily understandable. In every old tradition, we found that people learn ethics from oral tales. They had their leaders and lessons of leadership in their stories. In India, we have sufficient amount of stories of leaders. Whether the story is of an ordinary person or a corporate leader of large firm, it always has a unique message of motivation. The objective of this paper is to elaborate the story lines in literature and get the leadership lessons from them, so that we can set up a new concept of leadership based on scholarship of literature. This is our hypothesis that leadership lessons can be learned from the study of literary writings and it can also act an innovative way of learning the management skills through literature. The role of the leader can be familiarly communicated in the form of the tales. Describing a positive psychological narrative from the text is the best way to manifesting an idea into the minds of people. We accomplished this paper that leadership as an attribute can be learned from the folk psychological literary writings.

Keywords: leadership, literature, management, psychology

Procedia PDF Downloads 255
9557 An Academic Theory on a Sustainable Evaluation of Achatina Fulica Within Ethekwini, KwaZulu-Natal

Authors: Sibusiso Trevor Tshabalala, Samuel Lubbe, Vince Vuledzani Ndou

Abstract:

Dependency on chemicals has had many disadvantages in pest management control strategies. Such genetic rodenticide resistance and secondary exposure risk are what is currently being experienced. Emphasis on integrated pest management suggests that to control future pests, early intervention and economic threshold development are key starting points in crop production. The significance of this research project is to help establish a relationship between Giant African Land Snail (Achatina Fulica) solution extract, its shell chemical properties, and farmer’s perceptions of biological control in eThekwini Municipality Agri-hubs. A mixed design approach to collecting data will be explored using a trial layout in the field and through interviews. The experimental area will be explored using a split-plot design that will be replicated and arranged in a randomised complete block design. The split-plot will have 0, 10, 20 and 30 liters of water to one liter of snail solution extract. Plots were 50 m² each with a spacing of 12 m between each plot and a plant spacing of 0.5 m (inter-row) ‘and 0.5 m (intra-row). Trials will be irrigated using sprinkler irrigation, with objective two being added to the mix every 4-5 days. The expected outcome will be improved soil fertility and micro-organisms population proliferation.

Keywords: giant african land snail, integrated pest management, photosynthesis, genetic rodenticide resistance, control future pests, shell chemical properties

Procedia PDF Downloads 86
9556 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 154
9555 Classifying ERP Implementation’s Risks in Banking Sectors Based on Different Implementation Phases

Authors: Farnaz Farzadnia, Ahmad Alibabaei

Abstract:

Enterprise Resource Planning (ERP) systems are considered as complicated information systems. Many organizations failed implementing ERP systems because it is a very difficult, time-consuming and expensive process. Enterprise resource planning system is appropriate for organizations in all economic sectors. As banking is currently considered a non-typical area for ERP usage, there are very little studies on ERP implementation in banking. This paper presents a general risks taxonomy. In this research, after identifying implementation risks, a process quality management method has been applied to identify relations between risks of implementation ERP in banking sectors and implementation phases. Oracle application implementation method titled as AIM used in this research for classifying the risks. These findings will help managers to develop better strategies for supervising and controlling ERP implementation projects.

Keywords: AIM implementation, bank, enterprise resource planning, risk, process quality management method

Procedia PDF Downloads 524
9554 Increasing Value Added and Competitive Advantage by Technology Adoption

Authors: Fidiana Suwitho

Abstract:

Research and community service is one of important lecturer assignment in Indonesia. This article was made to meet those needs by assisting home industry entrepreneurs of various chips in Banyuwangi. Community service in this scheme are intended to increase the revenue of craftsmen of chips by improving value added of chips through food engineering technology. Ibu Anisa has produced various kinds of chips that are breadfruit chips, banana chips, yam chips, and cassava chips. In business development, Ibu Anisa facing various problems both in terms of production and management aspects. The process of production and management and marketing are still conventional so that increased demand cannot be offset by production capacity. A researcher team of STIESIA has assist partners in the processing stage, from manually to the technologically. This activity has a positive impact to However, this process has not been reached on sustainable marketing aspect, which is where the partners are still difficult to reach a wider market because of limited access.

Keywords: food engineering technology, value added of chips, community service

Procedia PDF Downloads 260
9553 Outreach Intervention Addressing Crack Cocaine Addiction in Users with Co-Occurring Opioid Use Disorder

Authors: Louise Penzenstadler, Tiphaine Robet, Radu Iuga, Daniele Zullino

Abstract:

Context: The outpatient clinic of the psychiatric addiction service of Geneva University Hospital has been providing support to individuals affected by various narcotics for 30 years. However, the increasing consumption of crack cocaine in Geneva has presented a new challenge for the healthcare system. Research Aim: The aim of this research is to evaluate the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder. Methodology: The research utilizes a combination of quantitative and qualitative retrospective data analysis to evaluate the effectiveness of the outreach intervention. Findings: The data collected from October 2023 to December 2023 show that the outreach program successfully made 1,071 contacts with drug users and led to 15 new requests for care and enrollment in treatment. Patients expressed high satisfaction with the intervention, citing easy and rapid access to treatment and social support. Theoretical Importance: This research contributes to the understanding of the challenges and specific needs of a complex group of drug users who face severe health problems. It highlights the importance of outreach interventions in establishing trust, connecting users with care, and facilitating medication-assisted treatment for opioid addiction. Data Collection: Data was collected through the outreach program's interactions with drug users, including street outreach interventions and presence at locations frequented by users. Patient satisfaction surveys were also utilized. Analysis Procedures: The collected data was analyzed using both quantitative and qualitative methods. The quantitative analysis involved examining the number of contacts made, new requests for care, and treatment enrollment. The qualitative analysis focused on patient satisfaction and their perceptions of the intervention. Questions Addressed: The research addresses the following questions: What is the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder? How effective is the outreach program in connecting drug users with care and initiating medication-assisted treatment? Conclusion: The outreach program has proven to be an effective intervention in establishing trust with crack users, connecting them with care, and initiating medication-assisted treatment for opioid addiction. It has also highlighted the importance of addressing the specific challenges faced by this group of drug users.

Keywords: crack addiction, outreach treatment, peer intervention, polydrug use

Procedia PDF Downloads 48
9552 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 150
9551 Benefits of Monitoring Acid Sulfate Potential of Coffee Rock (Indurated Sand) across Entire Dredge Cycle in South East Queensland

Authors: S. Albert, R. Cossu, A. Grinham, C. Heatherington, C. Wilson

Abstract:

Shipping trends suggest increasing vessel size and draught visiting Australian ports highlighting potential challenges to port infrastructure and requiring optimization of shipping channels to ensure safe passage for vessels. The Port of Brisbane in Queensland, Australia has an 80 km long access shipping channel which vessels must transit 15 km of relatively shallow coffee rock (generic class of indurated sands where sand grains are bound within an organic clay matrix) outcrops towards the northern passage in Moreton Bay. This represents a risk to shipping channel deepening and maintenance programs as the dredgeability of this material is more challenging due to its high cohesive strength compared with the surrounding marine sands and potential higher acid sulfate risk. In situ assessment of acid sulfate sediment for dredge spoil control is an important tool in mitigating ecological harm. The coffee rock in an anoxic undisturbed state does not pose any acid sulfate risk, however when disturbed via dredging it’s vital to ensure that any present iron sulfides are either insignificant or neutralized. To better understand the potential risk we examined the reduction potential of coffee rock across the entire dredge cycle in order to accurately portray the true outcome of disturbed acid sulfate sediment in dredging operations in Moreton Bay. In December 2014 a dredge trial was undertaken with a trailing suction hopper dredger. In situ samples were collected prior to dredging revealed acid sulfate potential above threshold guidelines which could lead to expensive dredge spoil management. However, potential acid sulfate risk was then monitored in the hopper and subsequent discharge, both showing a significant reduction in acid sulfate potential had occurred. Additionally, the acid neutralizing capacity significantly increased due to the inclusion of shell fragments (calcium carbonate) from the dredge target areas. This clearly demonstrates the importance of assessing potential acid sulfate risk across the entire dredging cycle and highlights the need to carefully evaluate sources of acidity.

Keywords: acid sulfate, coffee rock, indurated sand, dredging, maintenance dredging

Procedia PDF Downloads 353
9550 Challenges for Competency-Based Learning Design in Primary School Mathematics in Mozambique

Authors: Satoshi Kusaka

Abstract:

The term ‘competency’ is attracting considerable scholarly attention worldwide with the advance of globalization in the 21st century and with the arrival of a knowledge-based society. In the current world environment, familiarity with varied disciplines is regarded to be vital for personal success. The idea of a competency-based educational system was mooted by the ‘Definition and Selection of Competencies (DeSeCo)’ project that was conducted by the Organization for Economic Cooperation and Development (OECD). Further, attention to this topic is not limited to developed countries; it can also be observed in developing countries. For instance, the importance of a competency-based curriculum was mentioned in the ‘2013 Harmonized Curriculum Framework for the East African Community’, which recommends key competencies that should be developed in primary schools. The introduction of such curricula and the reviews of programs are actively being executed, primarily in the East African Community but also in neighboring nations. Taking Mozambique as a case in point, the present paper examines the conception of ‘competency’ as a target of frontline education in developing countries. It also aims to discover the manner in which the syllabus, textbooks and lessons, among other things, in primary-level math education are developed and to determine the challenges faced in the process. This study employs the perspective of competency-based education design to analyze how the term ‘competency’ is defined in the primary-level math syllabus, how it is reflected in the textbooks, and how the lessons are actually developed. ‘Practical competency’ is mentioned in the syllabus, and the description of the term lays emphasis on learners' ability to interactively apply socio-cultural and technical tools, which is one of the key competencies that are advocated in OECD's ‘Definition and Selection of Competencies’ project. However, most of the content of the textbooks pertains to ‘basic academic ability’, and in actual classroom practice, teachers often impart lessons straight from the textbooks. It is clear that the aptitude of teachers and their classroom routines are greatly dependent on the cultivation of their own ‘practical competency’ as it is defined in the syllabus. In other words, there is great divergence between the ‘syllabus’, which is the intended curriculum, and the content of the ‘textbooks’. In fact, the material in the textbooks should serve as the bridge between the syllabus, which forms the guideline, and the lessons, which represent the ‘implemented curriculum’. Moreover, the results obtained from this investigation reveal that the problem can only be resolved through the cultivation of ‘practical competency’ in teachers, which is currently not sufficient.

Keywords: competency, curriculum, mathematics education, Mozambique

Procedia PDF Downloads 173
9549 The Russian Preposition 'за': A Cognitive Linguistic Approach

Authors: M. Kalyuga

Abstract:

Prepositions have long been considered to be one of the major challenges for second language learners, since they have multiple uses that differ greatly from one language to another. The traditional approach to second language teaching supplies students with a list of uses of a preposition that they have to memorise and no explanation is provided. Contrary to the traditional grammar approach, the cognitive linguistic approach offers an explanation for the use of prepositions and provides strategies to comprehend and learn prepositions that would be otherwise seem obscure. The present paper demonstrates the use of the cognitive approach for the explanation of prepositions through the example of the Russian preposition 'за'. The paper demonstrates how various spatial and non-spatial uses of this preposition are linked together through metaphorical and metonymical mapping. The diversity of expressions with за is explained by the range of spatial scenes this preposition is associated with.

Keywords: language teaching, Russian, preposition 'за', cognitive approach

Procedia PDF Downloads 436
9548 Managing a Cross-Disciplinary Research Project in a University: The Case of LEARNIT

Authors: Yulia Stukalina

Abstract:

This paper explores the main issues related to implementing a cross-disciplinary research project (LEARNIT) based on collaboration between universities from three European countries. The paper discusses the importance of using the holistic approach to managing scientific projects with due account for the complicated nature of the educational environment of a modern university. To illustrate this approach, the author describes some actions to be taken for supporting different focus areas of LEARNIT project, in the process using integrated tangible, non-tangible, and semi-tangible resources of the partner university. The methodology of the paper is based on the academic literature and research papers analysis within management discipline. The analysis reported in the paper is also based on the author’s professional experience in the area of managing international research projects in a university.

Keywords: LEARNIT, focus area, project management, resources

Procedia PDF Downloads 260
9547 Assessment of Trust in Virtual Teams of College Students in Egypt

Authors: Bashayer Alsana

Abstract:

Emerging technologies present human interaction with new challenges. Individuals are required to interact and collaborate to achieve mutual gain. Accomplishing shared goals requires all parties involved to trust others commitment to fulfill their specified obligations. Trust is harder to establish when groups work virtually and members transcend time, space, and culture. This paper identifies the importance of trust in virtual groups of students at Cairo University by exposing them to electronic projects on which they collaborate.Students respond to a survey to assess their range of trust within their teams and how the outcome is affected. Gender differences and other demographic factors are analyzed to understand results and rates of trust. The paper concludes with summarizing factors influencing trust development and possible implications.

Keywords: students, teams, trust, virtual

Procedia PDF Downloads 248
9546 Using Business Interactive Games to Improve Management Skills

Authors: Nuno Biga

Abstract:

Continuous processes’ improvement is a permanent challenge for managers of any organization. Lean management means that efficiency gains can be obtained through a systematic framework able to explore synergies between processes, eliminate waste of time, and other resources. Leaderships in organizations determine the efficiency of the teams through their influence on collaborators, their motivation, and consolidation of ownership (group) feeling. The “organization health” depends on the leadership style, which is directly influenced by the intrinsic characteristics of each personality and leadership ability (leadership competencies). Therefore, it’s important that managers can correct in advance any deviation from expected leadership exercises. Top management teams must assume themselves as regulatory agents of leadership within the organization, ensuring monitoring of actions and the alignment of managers in accordance with the humanist standards anchored in a visible Code of Ethics and Conduct. This article is built around an innovative model of “Business Interactive Games” (BI GAMES) that simulates a real-life management environment. It shows that the strategic management of operations depends on a complex set of endogenous and exogenous variables to the intervening agents that require specific skills and a set of critical processes to monitor. BI GAMES are designed for each management reality and have already been applied successfully in several contexts over the last five years comprising the educational and enterprise ones. Results from these experiences are used to demonstrate how serious games in working living labs contributed to improve the organizational environment by focusing on the evaluation of players’ (agents’) skills, empower its capabilities, and the critical factors that create value in each context. The implementation of the BI GAMES simulator highlights that leadership skills are decisive for the performance of teams, regardless of the sector of activity and the specificities of each organization whose operation is intended to simulate. The players in the BI GAMES can be managers or employees of different roles in the organization or students in the learning context. They interact with each other and are asked to decide/make choices in the presence of several options for the follow-up operation, for example, when the costs and benefits are not fully known but depend on the actions of external parties (e.g., subcontracted enterprises and actions of regulatory bodies). Each team must evaluate resources used/needed in each operation, identify bottlenecks in the system of operations, assess the performance of the system through a set of key performance indicators, and set a coherent strategy to improve efficiency. Through the gamification and the serious games approach, organizational managers will be able to confront the scientific approach in strategic decision-making versus their real-life approach based on experiences undertaken. Considering that each BI GAME’s team has a leader (chosen by draw), the performance of this player has a direct impact on the results obtained. Leadership skills are thus put to the test during the simulation of the functioning of each organization, allowing conclusions to be drawn at the end of the simulation, including its discussion amongst participants.

Keywords: business interactive games, gamification, management empowerment skills, simulation living labs

Procedia PDF Downloads 95
9545 Intelligent IT Infrastructure in the Gas and Oil Industry

Authors: Ahmad Fahad Alotaibi, Khalid Hamed Hajri, Humoud Hudiban Rashidi

Abstract:

Intelligent information technology infrastructure is considered one of the enablers to enhance digital transformation in the gas and oil fields to optimize IT infrastructure reliability by supporting operations and maintenance in a safe and secure method to optimize resources. Smart IT buildings, communication rooms and shelters with intelligent technologies can strengthen the performance and profitability of gas and oil companies by ensuring business continuity. This paper describes the advantages of deploying intelligent IT infrastructure in the oil and gas industry by illustrating its positive impacts on some development aspects, for instance, operations, maintenance, safety, security and resource optimization. Moreover, it highlights the challenges and difficulties of providing smart IT services in a remote area and proposes solutions to overcome such difficulties.

Keywords: intelligent IT infrastructure, remote areas, oil and gas field, digitalization

Procedia PDF Downloads 45
9544 Accounting Quality and The Adoption of IFRS: Evidence from China

Authors: Khaldoon G. Albitar, Hassan Y. Kikhia, Jin P. Zhang

Abstract:

Since 2007, all companies listed on both Shanghai Stock Exchange and Shenzhen Stock Exchange are required to prepare their consolidated financial statements in accordance with International Financial Reporting Standards (IFRS). This study investigates the impact of adopting IFRS on accounting quality for a sample of listed on Chinese companies during the period 2003-2013 with sample of 10846 observations over a four-year period before and a five-year period after the adoption of IFRS. This study tests whether the level of earnings management is significantly lower after the adoption of IFRS, and reported earnings is more value relevant during the IFRS period by using the Ohlson model and Jones model, as modified by Dechow. The empirical results show that accounting quality improved with lower earnings management and higher value relevant after the adoption of IFRS in China. The current study contributes to the literature on IFRS adoption and earning quality in two ways. First, As most of the existing studies on earnings quality and IFRS have been conducted on data from the U.S and European countries, this study fills a gap in the existing literature by studying the effect of adoption of IFRS on earnings quality in an emerging market. Second, the findings of our study have important implications for policymakers, auditors, multinational firms, and users of financial reports. As the rapid growth of China's economy gains global recognition, the Chinese stock market is capturing the attention of international investor.

Keywords: international financial reporting standards (ifrs), accounting quality, earnings management, value relevance, china

Procedia PDF Downloads 317
9543 Development of Risk Management System for Urban Railroad Underground Structures and Surrounding Ground

Authors: Y. K. Park, B. K. Kim, J. W. Lee, S. J. Lee

Abstract:

To assess the risk of the underground structures and surrounding ground, we collect basic data by the engineering method of measurement, exploration and surveys and, derive the risk through proper analysis and each assessment for urban railroad underground structures and surrounding ground including station inflow. Basic data are obtained by the fiber-optic sensors, MEMS sensors, water quantity/quality sensors, tunnel scanner, ground penetrating radar, light weight deflectometer, and are evaluated if they are more than the proper value or not. Based on these data, we analyze the risk level of urban railroad underground structures and surrounding ground. And we develop the risk management system to manage efficiently these data and to support a convenient interface environment at input/output of data.

Keywords: urban railroad, underground structures, ground subsidence, station inflow, risk

Procedia PDF Downloads 322
9542 Signature Verification System for a Banking Business Process Management

Authors: A. Rahaf, S. Liyakathunsia

Abstract:

In today’s world, unprecedented operational pressure is faced by banks that test the efficiency, effectiveness, and agility of their business processes. In a typical banking process, a person’s authorization is usually based on his signature on most all of the transactions. Signature verification is considered as one of the highly significant information needed for any bank document processing. Banks usually use Signature Verification to authenticate the identity of individuals. In this paper, a business process model has been proposed in order to increase the quality of the verification process and to reduce time and needed resources. In order to understand the current process, a survey has been conducted and distributed among bank employees. After analyzing the survey, a process model has been created using Bizagi modeler which helps in simulating the process after assigning time and cost of it. The outcomes show that the automation of signature verification process is highly recommended for a banking business process.

Keywords: business process management, process modeling, quality, Signature Verification

Procedia PDF Downloads 407
9541 Ways Management of Foods Not Served to Consumers in Food Service Sector

Authors: Marzena Tomaszewska, Beata Bilska, Danuta Kolozyn-Krajewska

Abstract:

Food loss and food waste are a global problem of the modern economy. The research undertaken aimed to analyze how food is handled in catering establishments when it comes to food waste and to demonstrate main ways of management with foods/dishes not served to consumers. A survey study was conducted from January to June 2019. The selection of catering establishments participating in the study was deliberate. The study included establishments located only in Mazowieckie Voivodeship (Poland). 42 completed questionnaires were collected. In some questions, answers were based on a 5-point scale of 1 to 5 (from 'always'/'every day' to 'never'). The survey also included closed questions with a suggested cafeteria of answers. The respondents stated that in their workplaces, dishes served cold and hot ready meals are discarded every day or almost every day (23.7% and 20.5% of answers respectively). A procedure most frequently used for dealing with dishes not served to consumers on a given day is their storage at a cool temperature until the following day. In the research, 1/5 of respondents admitted that consumers 'always' or 'usually' leave uneaten meals on their plates, and over 41% 'sometimes' do so. It was found additionally that food not used in food service sector is most often thrown into a public container for rubbish. Most often thrown into the public container (with communal trash) were: expired products (80.0%), plate waste (80.0%), and inedible products (fruit and vegetable peels, egg shells) (77.5%). Most frequently into the container dedicated only for food waste were thrown out used deep-frying oil (62.5%). 10% of respondents indicated that inedible products in their workplaces is allocate for animal feeds. Food waste in the food service sector still remains an insufficiently studied issue, as owners of these objects are often unwilling to disclose data pertaining to the subject. Incorrect ways of management with foods not served to consumers were observed. There is the need to develop the educational activities for employees and management in the context of food waste management in the food service sector. This publication has been developed under the contract with the National Center for Research and Development No Gospostrateg1/385753/1/NCBR/2018 for carrying out and funding of a project implemented as part of the 'The social and economic development of Poland in the conditions of globalizing markets - GOSPOSTRATEG' program entitled 'Developing a system for monitoring wasted food and an effective program to rationalize losses and reduce food wastage' (acronym PROM).

Keywords: food waste, inedible products, plate waste, used deep-frying oil

Procedia PDF Downloads 102
9540 Consonant Harmony and the Challenges of Articulation and Perception

Authors: Froogh Shooshtaryzadeh, Pramod Pandey

Abstract:

The present study investigates place and manner harmony in typically developing (TD) children and children with phonological disorder (PD) who are acquiring Farsi as their first language. Five TD and five PD children are examined regarding their place and manner harmony patterns. Data is collected through a Picture-Naming Task using 132 pictures of different items designed to elicit the production of 132 different words. The examination of the data has indicated some similarities and differences in harmony patterns in PD and TD children. Moreover, the results of this study on the place and manner harmony have illustrated some differences with the results of the preceding studies on languages other than Farsi. The results of this study are discussed and compared with results from other studies. Optimality Theory is employed to explain some of the findings of this study.

Keywords: place harmony, manner harmony, phonological development, Farsi

Procedia PDF Downloads 296
9539 Home Legacy Device Output Estimation Using Temperature and Humidity Information by Adaptive Neural Fuzzy Inference System

Authors: Sung Hyun Yoo, In Hwan Choi, Jun Ho Jung, Choon Ki Ahn, Myo Taeg Lim

Abstract:

Home energy management system (HEMS) has been issued to reduce the power consumption. The HEMS performs electric power control for the indoor electric device. However, HEMS commonly treats the smart devices. In this paper, we suggest the output estimation of home legacy device using the artificial neural fuzzy inference system (ANFIS). This paper discusses the overview and the architecture of the system. In addition, accurate performance of the output estimation using the ANFIS inference system is shown via a numerical example.

Keywords: artificial neural fuzzy inference system (ANFIS), home energy management system (HEMS), smart device, legacy device

Procedia PDF Downloads 528
9538 Studying the Impact of Farmers Field School on Vegetable Production in Peshawar District of Khyber Pakhtunkhwa Province of Pakistan

Authors: Muhammad Zafarullah Khan, Sumeera Abbasi

Abstract:

The Farmers Field School (FFS) learning approach aims to improve knowledge of the farmers through integrated crop management and provide leadership in their decision making process. The study was conducted to assess the impact of FFS on vegetables production before and after FFS intervention in four villages of district Peshawar in cropping season 2012, by interviewing 80 FFS respondents, twenty from each selected village. It was observed from the study results that all the respondents were satisfied from the impact of FFS and they informed an increased in production in vegetables. It was further observed that after the implementation of FFS the sowing seed rate of tomato and cucumber were decreased from 0.185kg/kanal to 0.100 kg/ kanal and 0.120kg/kanal to 0.010kg/kanal where as the production of tomato and cucumber were increased from 8158.75kgs/kanal to 10302. 5kgs/kanal and 3230kgs/kanal to 5340kgs/kanal, respectively. The cost of agriculture inputs per kanal including seed cost, crop management, Farm Yard Manure, and weedicides in case of tomato were reduced by Rs.28, Rs. 3170, Rs.658and Rs 205 whereas in cucumber reduced by Rs.35, Rs.570, Rs 80 and Rs.430 respectively. Only fertilizers cost was increased by Rs. 2200 in case of tomato and Rs 465 in case of cucumber. Overall the cost was reduced to Rs 545 in tomato and Rs 490 in cucumber production.FFS provided a healthy vegetables and also reduced input cost by adopting integrated crop management. Therefore the promotion of FFS is needed to be planned for farmers to reduce cost of production, so that the more farmers should be benefited.

Keywords: impact, farmer field schools, vegetable production, Peshawar Khyber Pakhtunkhwa

Procedia PDF Downloads 244
9537 Case Study Analysis of 2017 European Railway Traffic Management Incident: The Application of System for Investigation of Railway Interfaces Methodology

Authors: Sanjeev Kumar Appicharla

Abstract:

This paper presents the results of the modelling and analysis of the European Railway Traffic Management (ERTMS) safety-critical incident to raise awareness of biases in the systems engineering process on the Cambrian Railway in the UK using the RAIB 17/2019 as a primary input. The RAIB, the UK independent accident investigator, published the Report- RAIB 17/2019 giving the details of their investigation of the focal event in the form of immediate cause, causal factors, and underlying factors and recommendations to prevent a repeat of the safety-critical incident on the Cambrian Line. The Systems for Investigation of Railway Interfaces (SIRI) is the methodology used to model and analyze the safety-critical incident. The SIRI methodology uses the Swiss Cheese Model to model the incident and identify latent failure conditions (potentially less than adequate conditions) by means of the management oversight and risk tree technique. The benefits of the systems for investigation of railway interfaces methodology (SIRI) are threefold: first is that it incorporates the “Heuristics and Biases” approach advanced by 2002 Nobel laureate in Economic Sciences, Prof Daniel Kahneman, in the management oversight and risk tree technique to identify systematic errors. Civil engineering and programme management railway professionals are aware of the role “optimism bias” plays in programme cost overruns and are aware of bow tie (fault and event tree) model-based safety risk modelling techniques. However, the role of systematic errors due to “Heuristics and Biases” is not appreciated as yet. This overcomes the problems of omission of human and organizational factors from accident analysis. Second, the scope of the investigation includes all levels of the socio-technical system, including government, regulatory, railway safety bodies, duty holders, signaling firms and transport planners, and front-line staff such that lessons are learned at the decision making and implementation level as well. Third, the author’s past accident case studies are supplemented with research pieces of evidence drawn from the practitioner's and academic researchers’ publications as well. This is to discuss the role of system thinking to improve the decision-making and risk management processes and practices in the IEC 15288 systems engineering standard and in the industrial context such as the GB railways and artificial intelligence (AI) contexts as well.

Keywords: accident analysis, AI algorithm internal audit, bounded rationality, Byzantine failures, heuristics and biases approach

Procedia PDF Downloads 179
9536 Prosperous Digital Image Watermarking Approach by Using DCT-DWT

Authors: Prabhakar C. Dhavale, Meenakshi M. Pawar

Abstract:

In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacks

Keywords: watermarking, digital, DCT-DWT, security

Procedia PDF Downloads 411
9535 Analysis of Behavior and Determinants of Cost Stickiness in Manufacturing Companies in Indonesia

Authors: Farizy Yunaz, Catur Sasongko

Abstract:

This research aims to provide the empirical evidence regarding cost stickiness behavior and its determinants on listed manufacturing companies. Hypothesis testing is performed using pooled least square method. The result concludes that there is cost stickiness behavior in selling, general and administrative costs. In term of determinants, firm-specific adjustment costs measured by asset intensity and employee intensity have significant positive impact on the level of cost stickiness. Meanwhile, earnings target and leverage have significant negative impact on the level of cost stickiness. However, the management empire building incentives measured by free cash flow has no significant positive impact.

Keywords: adjustment cost, cost behavior, cost stickiness, earnings target, leverage, management empire building incentive

Procedia PDF Downloads 345
9534 Project Time and Quality Management during Construction

Authors: Nahed Al-Hajeri

Abstract:

Time and cost is an integral part of every construction plan and can affect each party’s contractual obligations. The performance of both time and cost are usually important to the client and contractor during the project. Almost all construction projects are experiencing time overrun. These time overruns always contributed as expensive to both client and contractor. Construction of any project inside the gathering centers involves complex management skills related to work force, materials, plant, machineries, new technologies etc. It also involves many agencies interdependent on each other like the vendors, structural and functional designers including various types of specialized engineers and it includes support of contractors and specialized contractors. This paper mainly highlights the types of construction delays due to which project suffer time and cost overrun. This paper also speaks about the delay causes and factors that contribute to the construction sequence delay for the oil and gas projects. Construction delay is supposed to be one of the repeated problems in the construction projects and it has an opposing effect on project success in terms of time, cost and quality. Some effective methods are identified to minimize delays in construction projects such as: 1. Site management and supervision, 2. Effective strategic planning, 3. Clear information and communication channel. Our research paper studies the types of delay with some real examples with statistic results and suggests solutions to overcome this problem.

Keywords: non-compensable delay, delays caused by force majeure, compensable delay, delays caused by the owner or the owner’s representative, non-excusable delay, delay caused by the contractor or the contractor’s representative, concurrent delay, delays resulting from two separate causes at the same time

Procedia PDF Downloads 232
9533 The Increasing Importance of the Role of AI in Higher Education

Authors: Joshefina Bengoechea Fernandez, Alex Bell

Abstract:

In its 2021 guidance for policy makers, the UNESCO has proposed 4 areas where AI can be applied in educational settings: These are: 1) Education management and delivery; 2) Learning and assessment; 3) Empowering teachers and facilitating teaching, and 4) Providing lifelong learning possibilities (UNESCO, 2021). Like with wblockchain technologies, AI will automate the management of educational institutions. These include, but are not limited to admissions, timetables, attendance, and homework monitoring. Furthermore, AI will be used to select relevant learning content across learning platforms for each student, based on his or her personalized needs. A problem educators face is the “one-size-fits-all” approach that does not work with a diverse student population. The purpose of this paper is to illustrate if the implementation of Technology is the solution to the Problems faced in Higher Education. The paper builds upon a constructivist approach, combining a literature review and research on key publications and academic reports.

Keywords: artificial intelligence, learning platforms, students personalised needs, life- long learning, privacy, ethics

Procedia PDF Downloads 85
9532 Co-Creating Value between Public Financial Management Institutions: An Integrated Approach towards Financial Sustainability

Authors: Pascal Horni, Sandro Fuchs

Abstract:

In presence of increasing deficits and public debt among OECD countries, the debate on fiscal disciple and mechanisms to constrain public spending policy heated up and gave rise to the institutionalization of fiscal rules. Considering the notions from political economy literature and the therein advocated axiom of maximization of votes, introduction of institutional mechanisms and rules to govern public spending is likely to be coined by electoral motives. While there exists a series of research concerned with the rise of creative accounting in the presence fiscal rules, implementation of accrual government accounting and its impact on the biting of fiscal rules has to authors’ best knowledge never been explored. This paper serves the illumination of the connection between debt break mechanisms and the adoption of accrual public sector accounting standards such as the IPSAS in the interface of political economy in the Swiss context. By explicitly considering the technical accounting dimension, this paper develops an integrated conceptual view on well-established Public Financial Management (PFM) institutions and elaborates how their interdependencies can co-create value with regard to the contemporary challenge of fiscal sustainability. Derivation of this integrated view follows an explorative approach, taking into account expert interviews with director level staff from cantonal finance administrations and policy documents, as well as literature from both research areas – public sector accounting and political economy.

Keywords: accounting, fiscal rules, International Public Sector Accounting Standards (IPSAS), public financial management

Procedia PDF Downloads 147
9531 Understanding Chronic Pain: Missing the Mark

Authors: Rachid El Khoury

Abstract:

Chronic pain is perhaps the most burdensome health issue facing the planet. Our understanding of the pathophysiology of chronic pain has increased substantially over the past 25 years, including but not limited to changes in the brain. However, we still do not know why chronic pain develops in some people and not in others. Most of the recent developments in pain science, that have direct relevance to clinical management, relate to our understanding of the role of the brain, the role of the immune system, or the role of cognitive and behavioral factors. Although the Biopsychosocial model of pain management was presented decades ago, the Bio-reductionist model remains, unfortunately, at the heart of many practices across professional and geographic boundaries. A large body of evidence shows that nociception is neither sufficient nor necessary for pain. Pain is a conscious experience that can certainly be, and often is, associated with nociception, however, always modulated by countless neurobiological, environmental, and cognitive factors. This study will clarify the current misconceptions of chronic pain concepts, and their misperceptions by clinicians. It will also attempt to bridge the considerable gap between what we already know on pain but somehow disregarded, the development in pain science, and clinical practice.

Keywords: chronic pain, nociception, biopsychosocial, neuroplasticity

Procedia PDF Downloads 46
9530 Predicting the Frequencies of Tropical Cyclone-Induced Rainfall Events in the US Using a Machine-Learning Model

Authors: Elham Sharifineyestani, Mohammad Farshchin

Abstract:

Tropical cyclones are one of the most expensive and deadliest natural disasters. They cause heavy rainfall and serious flash flooding that result in billions of dollars of damage and considerable mortality each year in the United States. Prediction of the frequency of tropical cyclone-induced rainfall events can be helpful in emergency planning and flood risk management. In this study, we have developed a machine-learning model to predict the exceedance frequencies of tropical cyclone-induced rainfall events in the United States. Model results show a satisfactory agreement with available observations. To examine the effectiveness of our approach, we also have compared the result of our predictions with the exceedance frequencies predicted using a physics-based rainfall model by Feldmann.

Keywords: flash flooding, tropical cyclones, frequencies, machine learning, risk management

Procedia PDF Downloads 231