Search results for: IPTV service application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11162

Search results for: IPTV service application

10772 Research on the Performance Management of Social Organizations Participating in Home-Based Care

Authors: Qiuhu Shao

Abstract:

Community home-based care service system, which is based on the family pension, supported by community pension and supplied by institutions pension, is an effective pension system to solve the current situation of China's accelerated aging. However, due to the fundamental realities of our country, the government is not able to bear the unilateral supply of the old-age service of the community. Therefore, based on the theory of welfare pluralism, the participation of social organizations in the home-based care service center has become an important part of the diversified supply of the old-age service for the elderly. Meanwhile, the home-based care service industry is still in the early stage, the management is relatively rough, which resulted in a large number of social resources waste. Thus, scientific, objective and long-term implementation is needed for social organizations to participate in home-based care services to guide its performance management. In order to realize the design of the performance management system, the author has done a research work that clarifies the research status of social organization's participation in home-based care service. Relevant theories such as welfare pluralism, community care theory, and performance management theory have been used to demonstrate the feasibility of data envelopment analysis method in social organization performance research. This paper analyzes the characteristics of the operation mode of the home-based care service center, and hackles the national as well as local documents, standards and norms related to the development of the home-based care industry, particularly studies those documents in Nanjing. Based on this, the paper designed a set of performance management PDCA system for home-based care service center in Nanjing and clarified each step of the system in detail. Subsequently, the research methods of performance evaluation and performance management and feedback, which are two core steps of performance management have been compared and screened in order to establish the overall framework of the performance management system of the home-based care service center. Through a large number of research, the paper summarized and analyzed the characteristics of the home-based care service center. Based on the research results, combined with the practice of the industry development in Nanjing, the paper puts forward a targeted performance evaluation index system of home-based care service center in Nanjing. Finally, the paper evaluated and sub-filed the performance of 186 home-based care service centers in Nanjing and then designed the performance optimization direction and performance improvement path based on the results. This study constructs the index system of performance evaluation of home-based care service and makes the index detailed to the implementation level, and constructs the evaluation index system which can be applied directly. Meanwhile, the quantitative evaluation of social organizations participating in the home-based care service changed the subjective impression in the previous practice of evaluation.

Keywords: data envelopment analysis, home-based care, performance management, social organization

Procedia PDF Downloads 244
10771 Implementation of Lean Management in Non-Governmental Organizations: A Case Study on WrocłAw Food Bank

Authors: Maciej Pieńkowski

Abstract:

Lean Management is nowadays one of the most dominating management concepts within industrial and service environment, providing compelling business benefits to many companies. At the same time, its application in the non-governmental organizations has not been extensively researched yet. Filling this gap will address clear necessity of efficient management system in NGO environment and significantly improve operational performance of many organizations. The goal of the research is to verify effectiveness of Lean Management implementation in the non-governmental organizations, based on Wrocław Food Bank case study. The case study describes a Lean Management implementation project within analyzed organization. During the project, Wrocław Food Bank went through full 5-step Lean Thinking processes, which consist of value identification, value stream mapping, creation of flow, establishing pull and seeking perfection. The research contains a detailed summary of each of those steps and provides with information regarding results of their implementation. The major findings of the study indicate, that application of Lean Management in NGO environment is possible, however physical implementation of its guidelines can be strongly impeded by multiple constraints, which non-governmental organizations are facing. Due to challenges like limited resources, project based activities and lack of traditional supplier-customer relationship, many NGOs may fail in their efforts to implement Lean Management. Successful Lean application requires therefore strong leadership commitment, which would drive transformation to remove barriers and obstacles.

Keywords: lean management, non-governmental organizations, continuous improvement, lean thinking

Procedia PDF Downloads 265
10770 Knowledge Based Liability for ISPs’ Copyright and Trademark Infringement in the EU E-Commerce Directive: Two Steps Behind the Philosophy of Computing Mind

Authors: Mohammad Sadeghi

Abstract:

The subject matter of this article is the efficiency of current knowledge standard to afford the legal integration regarding criteria and approaches to ISP knowledge standards, to shield ISP and copyright, trademark and other parties’ rights in the online information society. The EU recognizes the knowledge-based liability for intermediaries in the European Directive on Electronic Commerce, but the implication of all parties’ responsibility for combating infringement has been immolated by dominating attention on liability due to the lack of the appropriate legal mechanism to devote each party responsibility. Moreover, there is legal challenge on the applicability of knowledge-based liability on hosting services and information location tools service. The aim of this contribution is to discuss the advantages and disadvantages of ECD knowledge standard through case law with a special emphasis on duty of prevention and constructive knowledge role on internet service providers (ISP s’) to achieve fair balance between all parties rights.

Keywords: internet service providers, liability, copyright infringement, hosting, caching, mere conduit service, notice and takedown, E-commerce Directive

Procedia PDF Downloads 496
10769 Effect of Distance to Health Facilities on Maternal Service Use and Neonatal Mortality in Ethiopia

Authors: Getiye Dejenu Kibret, Daniel Demant, Andrew Hayen

Abstract:

Introduction: In Ethiopia, more than half of newborn babies do not have access to Emergency Obstetric and Neonatal Care (EmONC) services. Understanding the effect of distance to health facilities on service use and neonatal survival is crucial to recommend policymakers and improve resource distribution. We aimed to investigate the effect of distance to health services on maternal service use and neonatal mortality. Methods: We implemented a data linkage method based on geographic coordinates and calculated straight-line (Euclidean) distances from the Ethiopian 2016 demographic and health survey clusters to the closest health facility. We computed the distance in ESRI ArcGIS Version 10.3 using the geographic coordinates of DHS clusters and health facilities. Generalised Structural Equation Modelling (GSEM) was used to estimate the effect of distance on neonatal mortality. Results: Poor geographic accessibility to health facilities affects maternal service usage and increases the risk of newborn mortality. For every ten kilometres (km) increase in distance to a health facility, the odds of neonatal mortality increased by 1.33% (95% CI: 1.06% to 1.67%). Distance also negatively affected antenatal care, facility delivery and postnatal counselling service use. Conclusions: A lack of geographical access to health facilities decreases the likelihood of newborns surviving their first month of life and affects health services use during pregnancy and immediately after birth. The study also showed that antenatal care use was positively associated with facility delivery service use and that both positively influenced postnatal care use, demonstrating the interconnectedness of the continuum of care for maternal and neonatal care services. Policymakers can leverage the findings from this study to improve accessibility barriers to health services.

Keywords: acessibility, distance, maternal health service, neonatal mortality

Procedia PDF Downloads 86
10768 A Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State

Authors: Abimbola Olaotan Akinsete

Abstract:

Government all over the world has intensified efforts in making internet and resource centres readily available in public institutions and centres for the advancement of humanity and working processes. Information and communication resource centre will not only help in the reduction of task that are presumed to be herculean. This centres influenced the working rate and productivity of both staffs and students and its benefit. The utilization of the internet and information resource centre will not only speed up service delivery, working time and efficiency of the system. Information and Communication Technology plays significant roles in presenting equalization strategy for developing university community and improving educational service delivery. This equalization will not only advance, accelerate and ensure results are accessed electronically, ensuring the transfer and confirmation of students’ academic records and their results in the world without physically available to request for these services. This study seeks to make Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State. The study employ descriptive survey design method in identifying hindrances of the non-utilization of technology in the service delivery in the university. Findings revealed that the adoption of internet and resource centre in the Exams and Records unit of the University shall help in delivering more in students’ records/results processing.

Keywords: internet, resource, centre, policy and service delivery

Procedia PDF Downloads 74
10767 Convectory Policing-Reconciling Historic and Contemporary Models of Police Service Delivery

Authors: Mark Jackson

Abstract:

Description: This paper is based on an theoretical analysis of the efficacy of the dominant model of policing in western jurisdictions. Those results are then compared with a similar analysis of a traditional reactive model. It is found that neither model provides for optimal delivery of services. Instead optimal service can be achieved by a synchronous hybrid model, termed the Convectory Policing approach. Methodology and Findings: For over three decades problem oriented policing (PO) has been the dominant model for western police agencies. Initially based on the work of Goldstein during the 1970s the problem oriented framework has spawned endless variants and approaches, most of which embrace a problem solving rather than a reactive approach to policing. This has included the Area Policing Concept (APC) applied in many smaller jurisdictions in the USA, the Scaled Response Policing Model (SRPM) currently under trial in Western Australia and the Proactive Pre-Response Approach (PPRA) which has also seen some success. All of these, in some way or another, are largely based on a model that eschews a traditional reactive model of policing. Convectory Policing (CP) is an alternative model which challenges the underpinning assumptions which have seen proliferation of the PO approach in the last three decades and commences by questioning the economics on which PO is based. It is argued that in essence, the PO relies on an unstated, and often unrecognised assumption that resources will be available to meet demand for policing services, while at the same time maintaining the capacity to deploy staff to develop solutions to the problems which were ultimately manifested in those same calls for service. The CP model relies on the observations from a numerous western jurisdictions to challenge the validity of that underpinning assumption, particularly in fiscally tight environment. In deploying staff to pursue and develop solutions to underpinning problems, there is clearly an opportunity cost. Those same staff cannot be allocated to alternative duties while engaged in a problem solution role. At the same time, resources in use responding to calls for service are unavailable, while committed to that role, to pursue solutions to the problems giving rise to those same calls for service. The two approaches, reactive and PO are therefore dichotomous. One cannot be optimised while the other is being pursued. Convectory Policing is a pragmatic response to the schism between the competing traditional and contemporary models. If it is not possible to serve either model with any real rigour, it becomes necessary to taper an approach to deliver specific outcomes against which success or otherwise might be measured. CP proposes that a structured roster-driven approach to calls for service, combined with the application of what is termed a resource-effect response capacity has the potential to resolve the inherent conflict between traditional and models of policing and the expectations of the community in terms of community policing based problem solving models.

Keywords: policing, reactive, proactive, models, efficacy

Procedia PDF Downloads 459
10766 A Framework of Product Information Service System Using Mobile Image Retrieval and Text Mining Techniques

Authors: Mei-Yi Wu, Shang-Ming Huang

Abstract:

The online shoppers nowadays often search the product information on the Internet using some keywords of products. To use this kind of information searching model, shoppers should have a preliminary understanding about their interesting products and choose the correct keywords. However, if the products are first contact (for example, the worn clothes or backpack of passengers which you do not have any idea about the brands), these products cannot be retrieved due to insufficient information. In this paper, we discuss and study the applications in E-commerce using image retrieval and text mining techniques. We design a reasonable E-commerce application system containing three layers in the architecture to provide users product information. The system can automatically search and retrieval similar images and corresponding web pages on Internet according to the target pictures which taken by users. Then text mining techniques are applied to extract important keywords from these retrieval web pages and search the prices on different online shopping stores with these keywords using a web crawler. Finally, the users can obtain the product information including photos and prices of their favorite products. The experiments shows the efficiency of proposed system.

Keywords: mobile image retrieval, text mining, product information service system, online marketing

Procedia PDF Downloads 334
10765 Effect of Band Application of Organic Manures on Growth and Yield of Pigeonpea (Cajanus cajan (L.) Millsp.)

Authors: S. B. Kalaghatagi, A. K. Guggari, Pallavi S. Manikashetti

Abstract:

A field experiment to study the effect of band application of organic manures on growth and yield of pigeon pea was conducted during 2016-17 at Kharif Seed Farm, College of Agriculture, Vijayapura. The experiment was carried out in randomized block design with thirteen treatments viz., T1 to T6 were band application of vermicompost at 0.5, 1.0, 1.5, 2.0, 2.5, 3.0 t ha⁻¹, respectively. The treatments T7 to T12 include band application of sieved FYM at 1, 2, 3, 4, 5 and 6 t ha⁻¹, respectively and were compared with already recommended practice of broadcasting of FYM at 6 t ha⁻¹ (T13); and recommended dose of fertilizer (25:50:0 NPK kg ha⁻¹) was applied commonly to all the treatments. The results revealed that band application of vermicompost (VC) at 3 t ha⁻¹ recorded significantly higher number of pods plant⁻¹ (116), grain weight plant⁻¹ (37.35 g), grain yield (1,647 kg ha⁻¹), stalk yield (2,920 kg ha⁻¹) and harvest index (0.36) and was on par with the band application of VC at 2.0 and 2.5 t ha⁻¹ and sieved FYM at 4.0 and 5.0 t ha⁻¹ as compared to broadcasting of FYM at 6 t ha-1 (99.33, 24.07 g, 1,061 kg ha⁻¹, 2,920 kg ha⁻¹ and 0.36, respectively). Significantly higher net return (Rupees 59,410 ha⁻¹) and benefit cost ratio of 2.92 recorded with band application of VC at 3 t ha⁻¹ over broadcasting of FYM at 6 tonnes per ha (Rupees 25,401 ha⁻¹ and 1.78, respectively). It indicates from the above results that, growing of pigeon pea with band application of VC at 2, 2.5 and 3 t ha⁻¹ and sieved FYM at 4 and 5 t ha⁻¹ leads to saving of 1 tonne of VC and 2 tonnes of FYM per ha.

Keywords: organic manures, rainfed pigeonpea, sieved FYM, vermicompost

Procedia PDF Downloads 185
10764 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 258
10763 Limitations of Selected e-Governance Services in India: Policy Change as Solution for Experience Enhancement of Citizen Services

Authors: Chaitanya Vyas

Abstract:

This paper identifies limitations of existing two e-Governance services viz. railway ticket booking and passport service in India. The comparison has been made as to how in the past these two citizen services were operating manually and how these services are taken online via e-Governance. Different e-Governance projects, investment aspects, and role of corporate are discussed. For Indian Railway online ticketing a comparison has been made between state run booking website and popular private firm run booking website. For passport service, observation through personal visit to passport center is described. Suggestions are made to improve these services further to improve citizen service experiences.

Keywords: e-Governance, citizen services, passport, Indian Railways

Procedia PDF Downloads 218
10762 The Opinions of Nursing Students Regarding Humanized Care through Volunteer Activities at Boromrajonani College of Nursing, Chonburi

Authors: P. Phenpun, S. Wareewan

Abstract:

This qualitative study aimed to describe the opinions in relation to humanized care emerging from the volunteer activities of nursing students at Boromarajonani College of Nursing, Chonburi, Thailand. One hundred and twenty-seven second-year nursing students participated in this study. The volunteer activity model was composed of preparation, implementation, and evaluation through a learning log, in which students were encouraged to write their daily activities after completing practical training at the healthcare center. The preparation content included three main categories: service minded, analytical thinking, and client participation. The preparation process took over three days that accumulates up to 20 hours only. The implementation process was held over 10 days, but with a total of 70 hours only, with participants taking part in volunteer work activities at a healthcare center. A learning log was used for evaluation and data were analyzed using content analysis. The findings were as follows. With service minded, there were two subcategories that emerged from volunteer activities, which were service minded towards patients and within themselves. There were three categories under service minded towards patients, which were rapport, compassion, and empathy service behaviors, and there were four categories under service minded within themselves, which were self-esteem, self-value, management potential, and preparedness in providing good healthcare services. In line with analytical thinking, there were two components of analytical thinking, which were analytical skill for their works and analytical thinking for themselves. There were four subcategories under analytical thinking for their works, which were evidence based thinking, real situational thinking, cause analysis thinking, and systematic thinking, respectively. There were four subcategories under analytical thinking for themselves, which were comparative between themselves, towards their clients that leads to the changing of their service behaviors, open-minded thinking, modernized thinking, and verifying both verbal and non-verbal cues. Lastly, there were three categories under participation, which were mutual rapport relationship; reconsidering client’s needs services and providing useful health care information.

Keywords: humanized care service, volunteer activity, nursing student, learning log

Procedia PDF Downloads 283
10761 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 118
10760 Pre-service Social Studies Teachers Readiness in Promoting 21st Century Learning: Evidence from a Ghanaian University

Authors: Joseph Bentil

Abstract:

Successful acquisition of 21st-century competencies needed by students to navigate through the ever-changing world requires that they are taught and molded by 21st-century teachers with the needed professional competencies. Accordingly, this study sought to understand the readiness and how efficacious pre-service Social Studies specialism students are towards the implementation of the Common Core Social Studies Curriculum in the Junior High Schools in Ghana. Theory of Experience served as the theoretical lens for the study. Working within the pragmatist paradigm, this study utilized the cross-sectional descriptive survey design with a mixed method approach where, through census sampling technique, all the 120 pre-service Social Studies specialism students were sampled for the study. A structured questionnaire and an interview guide were the instruments employed for data collection. Descriptive statistics (mean, standard deviation and inferential statistics like independent samples t-test, one-way between groups ANOVA and Pearson Product Moment Correlation) were employed in the analysis the research questions and hypotheses with the aid of version 28 of SPSS while the qualitative data was analyzed using thematic analysis. The findings discovered that pre-service Social Studies teachers were highly ready and efficacious towards implementing the Common Core Junior High School Social Studies curriculum. However, male pre-service teachers were highly efficacious and ready than their female counterparts. Besides, it was disclosed that pre-service teachers within the 31-40 years age bracket were found to be highly efficacious and ready than their colleagues with 20-30 and below 20 years age bracket respectively. The findings further revealed that there was a moderate and statistically significant positive relationship between pre-service teachers’ readiness and efficacy in implementing the Common Core Social Studies curriculum. Therefore, the study recommended that interventional programmes aimed at raising the readiness and efficacy beliefs of pre-service teachers should be targeted towards female preservice teachers and those below 20 years age bracket for successful implementation and realization of the competencies enshrined in the common core social Studies curriculum.

Keywords: pre-service, readiness, social studies, teachers

Procedia PDF Downloads 54
10759 Standard Resource Parameter Based Trust Model in Cloud Computing

Authors: Shyamlal Kumawat

Abstract:

Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

Keywords: cloud, Iaas, Saas, Paas

Procedia PDF Downloads 312
10758 Evaluating the Service Quality and Customers’ Satisfaction for Lihpaoland in Taiwan

Authors: Wan-Yu Liu, Tiffany April Lin, Yu-Chieh Tang, Yi-Lin Wang, Chieh-Hui Li

Abstract:

As the national income in Taiwan has been raised, the life style of the public has also been changed, so that the tourism industry gradually moves from a service industry to an experience economy. The Lihpaoland is one of the most popular theme parks in Taiwan. However, the related works on performance of service quality of the park have been lacking since its re-operation in 2012. Therefore, this study investigates the quality of software/hardware facilities and services of the Lihpaoland, and aims to achieve the following three goals: 1) analyzing how various sample data of tourists leads to different results for service quality of LihpaoLand; 2) analyzing how tourists respond to the service tangibility, service reliability, service responsiveness, service guarantee, and service empathy of LihpaoLand; 3) according to the theoretical and empirical results, proposing how to improve the overall facilities and services of LihpaoLand, and hoping to provide suggestions to the LihpaoLand or other related businesses to make decision. The survey was conducted on the tourists to the LihpaoLand using convenience sampling, and 400 questionnaires were collected successfully. Analysis results show that tourists paid much attention to maintenance of amusement facilities and safety of the park, and were satisfied with them, which are great advantages of the park. However, transportation around the LihpaoLand was inadequate, and the price of the Fullon hotel (which is the hotel closest to the LihpaoLand) were not accepted by tourists – more promotion events are recommended. Additionally, the shows are not diversified, and should be improved with the highest priority. Tourists did not pay attention to service personnel’s clothing and the ticket price, but they were not satisfied with them. Hence, this study recommends to design more distinctive costumes and conduct ticket promotions. Accordingly, the suggestions made in this study for LihpaoLand are stated as follows: 1) Diversified amusement facilities should be provided to satisfy the needs at different ages. 2) Cheep but tasty catering and more distinctive souvenirs should be offered. 3) Diversified propaganda schemes should be strengthened to increase number of tourists. 4) Quality and professional of the service staff should be enhanced to acquire public praise and tourists revisiting. 5) Ticket promotions in peak seasons, low seasons, and special events should be conducted. 6) Proper traffic flows should be planned and combined with technologies to reduce waiting time of tourists. 7) The features of theme landscape in LihpaoLand should be strengthened to increase willingness of the tourists with special preferences to visit the park. 8) Ticket discounts or premier points card promotions should be adopted to reward the tourists with high loyalty.

Keywords: service quality, customers’ satisfaction, theme park, Taiwan

Procedia PDF Downloads 447
10757 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 326
10756 The Dilemma of Giving Mathematics Homework from the Perspective of Pre-Service Elementary Teachers

Authors: Myla Zenaida Cabrillas-Torio, Von Anthony G. Torio

Abstract:

Homework is defined as an additional task that a student does outside of the school. This added activity is in recognition of the necessity to spend additional time for subjects such as Mathematics. The dilemma comes in the form of the advantages and disadvantages that can be derived from homework. Studies have revealed varying effects to students on academic and non-academic areas. Teachers are at the forefront of the decision towards the giving or not of homework. Pre-service teachers at the elementary level represent the future leaders of the educational system and should be acquainted and involved at the onset of the dilemma. The main objective of this study is to determine the perspective of pre-service elementary teachers towards homework. The anatomy of their belief can be key towards addressing the issue via teacher training. Salient results revealed that the subjects favor the giving homework on the following grounds: it helps add knowledge and confidence. Those who do not favor homework find it as an additional burden. Difficulties in complying with homework are usually associated with lack of references and performance of other household chores. Students usually spend late nights to comply with homework and are unable to perform at the best of their potentials.

Keywords: attitude, homework, pre-service teachers, mathematics education, Philippines

Procedia PDF Downloads 480
10755 Value Creation of My Health Bank of National Health Insurance: Service Dominant Logic Perspective

Authors: Yu Hua Yan

Abstract:

Background: This research attempts to extend and apply the concept of service dominant logic on My Health Bank platform, analyzed to find out are there any significant difference in wills to participate (potential factors for value) on the results of value co-creation? Methods: The questionnaires were delivered from August 2017 to October 2017 in hospitals. 167 valid ones were received, with an effective response rate of 98.2%. Results: This research employed the questionnaire method in collecting research data, with patients that have used My Health Bank as objects, to whom questionnaires were sent. Regarding the factors influencing therapeutic effects, in the statistics of capability and interaction, it reached a significant level (p <0.1). Regarding the factors influencing satisfaction on medical service, in the statistics of capability and interaction, it reached a significant level (p <0.001). Conclusion: Regarding the contributions of this research, it is possible to clarify its contents with the studies on value co-creation to enrich the literature of the studies of service dominant logic and value co-creation in Taiwan. Regarding its contribution in practice, the results of this research allows the value advocator – the government, to have a broader view in the consideration of making the policies on value co-creation.

Keywords: My Health Bank, interactive, participation, value creation

Procedia PDF Downloads 143
10754 Gamification Using Stochastic Processes: Engage Children to Have Healthy Habits

Authors: Andre M. Carvalho, Pedro Sebastiao

Abstract:

This article is based on a dissertation that intends to analyze and make a model, intelligently, algorithms based on stochastic processes of a gamification application applied to marketing. Gamification is used in our daily lives to engage us to perform certain actions in order to achieve goals and gain rewards. This strategy is an increasingly adopted way to encourage and retain customers through game elements. The application of gamification aims to encourage children between 6 and 10 years of age to have healthy habits and the purpose of serving as a model for use in marketing. This application was developed in unity; we implemented intelligent algorithms based on stochastic processes, web services to respond to all requests of the application, a back-office website to manage the application and the database. The behavioral analysis of the use of game elements and stochastic processes in children’s motivation was done. The application of algorithms based on stochastic processes in-game elements is very important to promote cooperation and to ensure fair and friendly competition between users which consequently stimulates the user’s interest and their involvement in the application and organization.

Keywords: engage, games, gamification, randomness, stochastic processes

Procedia PDF Downloads 305
10753 Facilitating Factors for the Success of Mobile Service Providers in Bangkok Metropolitan

Authors: Yananda Siraphatthada

Abstract:

The objectives of this research were to study the level of influencing factors, leadership, supply chain management, innovation, competitive advantages, business success, and affecting factors to the business success of the mobile phone system service providers in Bangkok Metropolitan. This research was done by the quantitative approach and the qualitative approach. The quantitative approach was used for questionnaires to collect data from the 331 mobile service shop managers franchised by AIS, Dtac and TrueMove. The mobile phone system service providers/shop managers were randomly stratified and proportionally allocated into subgroups exclusive to the number of the providers in each network. In terms of qualitative method, there were in-depth interviews of 6 mobile service providers/managers of Telewiz and Dtac and TrueMove shop to find the agreement or disagreement with the content analysis method. Descriptive Statistics, including Frequency, Percentage, Means and Standard Deviation were employed; also, the Structural Equation Model (SEM) was used as a tool for data analysis. The content analysis method was applied to identify key patterns emerging from the interview responses. The two data sets were brought together for comparing and contrasting to make the findings, providing triangulation to enrich result interpretation. It revealed that the level of the influencing factors – leadership, innovation management, supply chain management, and business competitiveness had an impact at a great level, but that the level of factors, innovation and the business, financial success and nonbusiness financial success of the mobile phone system service providers in Bangkok Metropolitan, is at the highest level. Moreover, the business influencing factors, competitive advantages in the business of mobile system service providers which were leadership, supply chain management, innovation management, business advantages, and business success, had statistical significance at .01 which corresponded to the data from the interviews.

Keywords: mobile service providers, facilitating factors, Bangkok Metropolitan, business success

Procedia PDF Downloads 326
10752 Artificial Intelligence in Duolingo

Authors: Jwana Khateeb, Lamar Bawazeer, Hayat Sharbatly, Mozoun Alghamdi

Abstract:

This research paper explores the idea of learning new languages through an innovative-mobile based learning technology. Throughout this paper we will discuss and examine a mobile-based application called Duolingo. Duolingo is a college standard application for learning foreign languages such as Spanish and English. It is a smart application where it uses smart adaptive technologies to advance the level of their students at each period of time by offering new tasks. Furthermore, we will discuss the history of the application and the methodology used within it. We have conducted a study in which we surveyed ten people about their experience using Duolingo. The results are examined and analyzed in which it indicates the effectiveness on Duolingo students who are seeking to learn new languages. Thus, the research paper will furthermore discuss the diverse methods and approaches in learning new languages through this mobile-based application.

Keywords: Duolingo, AI, personalized, customized

Procedia PDF Downloads 258
10751 The Determinants of Co-Production for Value Co-Creation: Quadratic Effects

Authors: Li-Wei Wu, Chung-Yu Wang

Abstract:

Recently, interest has been generated in the search for a new reference framework for value creation that is centered on the co-creation process. Co-creation implies cooperative value creation between service firms and customers and requires the building of experiences as well as the resolution of problems through the combined effort of the parties in the relationship. For customers, values are always co-created through their participation in services. Customers can ultimately determine the value of the service in use. This new approach emphasizes that a customer’s participation in the service process is considered indispensable to value co-creation. An important feature of service in the context of exchange is co-production, which implies that a certain amount of participation is needed from customers to co-produce a service and hence co-create value. Co-production no doubt helps customers better understand and take charge of their own roles in the service process. Thus, this proposal is to encourage co-production, thus facilitating value co-creation of that is reflected in both customers and service firms. Four determinants of co-production are identified in this study, namely, commitment, trust, asset specificity, and decision-making uncertainty. Commitment is an essential dimension that directly results in successful cooperative behaviors. Trust helps establish a relational environment that is fundamental to cross-border cooperation. Asset specificity motivates co-production because this determinant may enhance return on asset investment. Decision-making uncertainty prompts customers to collaborate with service firms in making decisions. In other words, customers adjust their roles and are increasingly engaged in co-production when commitment, trust, asset specificity, and decision-making uncertainty are enhanced. Although studies have examined the preceding effects, to our best knowledge, none has empirically examined the simultaneous effects of all the curvilinear relationships in a single study. When these determinants are excessive, however, customers will not engage in co-production process. In brief, we suggest that the relationships of commitment, trust, asset specificity, and decision-making uncertainty with co-production are curvilinear or are inverse U-shaped. These new forms of curvilinear relationships have not been identified in existing literature on co-production; therefore, they complement extant linear approaches. Most importantly, we aim to consider both the bright and the dark sides of the determinants of co-production.

Keywords: co-production, commitment, trust, asset specificity, decision-making uncertainty

Procedia PDF Downloads 169
10750 On Demand Transport: Feasibility Study - Local Needs and Capabilities within the Oran Wilaya

Authors: Nadjet Brahmia

Abstract:

The evolution of urban forms, the new aspects of mobility, the ways of life and economic models make public transport conventional collective low-performing on the majority of largest Algerian cities, particularly in the west of Algeria. On the other side, the information and communication technologies (ICT) open new eventualities to develop a new mode of transport which brings together both the tenders offered by the public service collective and those of the particular vehicle, suitable for urban requirements, social and environmental. Like the concrete examples made in the international countries in terms of on-demand transport systems (ODT) more particularly in the developed countries, this article has for objective the opportunity analysis to establish a service of ODT at the level of a few towns of Oran Wilaya, such a service will be subsequently spread on the totality of the Wilaya if not on the whole of Algeria. In this context, we show the different existing means of transport in the current network whose aim to illustrate the points of insufficiency accented in the present transport system, then we discuss the solutions that may exhibit a service of ODT to the problem studied all around the transport sector, to carry at the end to highlight the capabilities of ODT replying to the transformation of mobilities, this in the light of well-defined cases.

Keywords: mobility, on-demand transport, public transport collective, transport system

Procedia PDF Downloads 331
10749 Transition from Linear to Circular Business Models with Service Design Methodology

Authors: Minna-Maari Harmaala, Hanna Harilainen

Abstract:

Estimates of the economic value of transitioning to circular economy models vary but it has been estimated to represent $1 trillion worth of new business into the global economy. In Europe alone, estimates claim that adopting circular-economy principles could not only have environmental and social benefits but also generate a net economic benefit of €1.8 trillion by 2030. Proponents of a circular economy argue that it offers a major opportunity to increase resource productivity, decrease resource dependence and waste, and increase employment and growth. A circular system could improve competitiveness and unleash innovation. Yet, most companies are not capturing these opportunities and thus the even abundant circular opportunities remain uncaptured even though they would seem inherently profitable. Service design in broad terms relates to developing an existing or a new service or service concept with emphasis and focus on the customer experience from the onset of the development process. Service design may even mean starting from scratch and co-creating the service concept entirely with the help of customer involvement. Service design methodologies provide a structured way of incorporating customer understanding and involvement in the process of designing better services with better resonance to customer needs. A business model is a depiction of how the company creates, delivers, and captures value; i.e. how it organizes its business. The process of business model development and adjustment or modification is also called business model innovation. Innovating business models has become a part of business strategy. Our hypothesis is that in addition to linear models still being easier to adopt and often with lower threshold costs, companies lack an understanding of how circular models can be adopted into their business and how customers will be willing and ready to adopt the new circular business models. In our research, we use robust service design methodology to develop circular economy solutions with two case study companies. The aim of the process is to not only develop the service concepts and portfolio, but to demonstrate the willingness to adopt circular solutions exists in the customer base. In addition to service design, we employ business model innovation methods to develop, test, and validate the new circular business models further. The results clearly indicate that amongst the customer groups there are specific customer personas that are willing to adopt and in fact are expecting the companies to take a leading role in the transition towards a circular economy. At the same time, there is a group of indifferents, to whom the idea of circularity provides no added value. In addition, the case studies clearly show what changes adoption of circular economy principles brings to the existing business model and how they can be integrated.

Keywords: business model innovation, circular economy, circular economy business models, service design

Procedia PDF Downloads 106
10748 Concurrent Engineering Challenges and Resolution Mechanisms from Quality Perspectives

Authors: Grmanesh Gidey Kahsay

Abstract:

In modern technical engineering applications, quality is defined in two ways. The first one is that quality is the parameter that measures a product or service’s characteristics to meet and satisfy the pre-stated or fundamental needs (reliability, durability, serviceability). The second one is the quality of a product or service free of any defect or deficiencies. The American Society for Quality (ASQ) describes quality as a pursuit of optimal solutions to confirm successes and fulfillment to be accountable for the product or service's requirements and expectations. This article focuses on quality engineering tools in modern industrial applications. Quality engineering is a field of engineering that deals with the principles, techniques, models, and applications of the product or service to guarantee quality. Including the entire activities to analyze the product’s design and development, quality engineering emphasizes how to make sure that products and services are designed and developed to meet consumers’ requirements. This episode acquaints with quality tools such as quality systems, auditing, product design, and process control. The finding presents thoughts that aim to improve quality engineering proficiency and effectiveness by introducing essential quality techniques and tools in some selected industries.

Keywords: essential quality tools, quality systems and models, quality management systems, and quality assurance

Procedia PDF Downloads 128
10747 Mobi Navi Tour for Rescue Operations

Authors: V. R. Sadasivam, M. Vipin, P. Vineeth, M. Sajith, G. Sathiskumar, R. Manikandan, N. Vijayarangan

Abstract:

Global positioning system technology is what leads to such things as navigation systems, GPS tracking devices, GPS surveying and GPS mapping. All that GPS does is provide a set of coordinates which represent the location of GPS units with respect to its latitude, longitude and elevation on planet Earth. It also provides time, which is accurate. The tracking devices themselves come in different flavors. They will contain a GPS receiver, and GPS software, along with some way of transmitting the resulting coordinates. GPS in mobile tend to use radio waves to transmit their location to another GPS device. The purpose of this prototype “Mobi Navi Tour for Rescue Operation” timely communication, and lightning fast decision-making with a group of people located in different places with a common goal. Timely communication and tracking the people are a critical issue in many situations, environments. Expedited can find missing person by sending the location and other related information to them through mobile. Information must be drawn from the caller and entered into the system by the administrator or a group leader and transferred to the group leader. This system will locate the closest available person, a group of people working in an organization/company or vehicle to determine availability and their position to track them. Misinformation cannot lead to the wrong decision in the rapidly paced environment in a normal and an abnormal situation. In “Mobi Navi Tour for Rescue Operation” we use Google Cloud Messaging for android (GCM) which is a service that helps developers send data from servers to their android applications on android devices. The service provides a simple, lightweight mechanism that servers can use to tell mobile applications to contact the server directly, to fetch updated application or user data.

Keywords: android, gps, tour, communication, service

Procedia PDF Downloads 377
10746 Modeling Waiting and Service Time for Patients: A Case Study of Matawale Health Centre, Zomba, Malawi

Authors: Moses Aron, Elias Mwakilama, Jimmy Namangale

Abstract:

Spending more time on long queues for a basic service remains a common challenge to most developing countries, including Malawi. For health sector in particular, Out-Patient Department (OPD) experiences long queues. This puts the lives of patients at risk. However, using queuing analysis to under the nature of the problems and efficiency of service systems, such problems can be abated. Based on a kind of service, literature proposes different possible queuing models. However, unlike using generalized assumed models proposed by literature, use of real time case study data can help in deeper understanding the particular problem model and how such a model can vary from one day to the other and also from each case to another. As such, this study uses data obtained from one urban HC for BP, Pediatric and General OPD cases to investigate an average queuing time for patients within the system. It seeks to highlight the proper queuing model by investigating the kind of distributions functions over patient’s arrival time, inter-arrival time, waiting time and service time. Comparable with the standard set values by WHO, the study found that patients at this HC spend more waiting times than service times. On model investigation, different days presented different models ranging from an assumed M/M/1, M/M/2 to M/Er/2. As such, through sensitivity analysis, in general, a commonly assumed M/M/1 model failed to fit the data but rather an M/Er/2 demonstrated to fit well. An M/Er/3 model seemed to be good in terms of measuring resource utilization, proposing a need to increase medical personnel at this HC. However, an M/Er/4 showed to cause more idleness of human resources.

Keywords: health care, out-patient department, queuing model, sensitivity analysis

Procedia PDF Downloads 414
10745 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 373
10744 A Morphological Thinking Approach for Conceptualising Product-Service Systems Solutions

Authors: Nicolas Haber

Abstract:

The study addresses the conceptual design of Product-Service Systems (PSSs) as a means of innovating solutions with the aim of reducing the environmental load of conventional product based solutions. Functional approaches targeting PSS solutions are developed in instinctive methods within the constraints of the setting in which they are conceived. Adopting morphological matrices in designing PSS concepts allows a thorough understanding of the settings, stakeholders, and functional requirements. Additionally, such a methodology is robust and adaptable to product-oriented, use-oriented and result-oriented systems. The research is based on a functional decomposition of the task in a similar way as in product design; while extended to include service components, providers, and receivers, while assessing the adaptability and homogeneity of the selected components and actors. A use-oriented concept is presented via a practical case study at an agricultural boom-sprayer manufacturer to demonstrate the effectiveness of the morphological approach to justify its viability. Additionally, a life cycle analysis is carried out in order to evaluate the environmental advantages inherited in a PSS solution versus a conventional solution. In light of the applications presented, the morphological approach appears to be a valid and generic tactic to conceiving integrated solutions whilst capturing the interrelations between the actors and elements of an integrated product-service system.

Keywords: conceptual design, design for sustainability, functional decomposition, product-service systems

Procedia PDF Downloads 246
10743 Feasibility of Risk Assessment for Type 2 Diabetes in Community Pharmacies Using Two Different Approaches: A Pilot Study in Thailand

Authors: Thitaporn Thoopputra, Tipaporn Pongmesa, Shuchuen Li

Abstract:

Aims: To evaluate the application of non-invasive diabetes risk assessment tool in community pharmacy setting. Methods: Thai diabetes risk score was applied to assess individuals at risk of developing type 2 diabetes. Interactive computer-based risk screening (IT) and paper-based risk screening (PT) tools were applied. Participants aged over 25 years with no known diabetes were recruited in six participating pharmacies. Results: A total of 187 clients, mean aged (+SD) was 48.6 (+10.9) years. 35% were at high risk. The mean value of willingness-to-pay for the service fee in IT group was significantly higher than PT group (p=0.013). No significant difference observed for the satisfaction between groups. Conclusions: Non-invasive risk assessment tool, whether paper-based or computerized-based can be applied in community pharmacy to support the enhancing role of pharmacists in chronic disease management. Long term follow up is needed to determine the impact of its application in clinical, humanistic and economic outcomes.

Keywords: community pharmacy, intervention, prevention, risk assessment, type 2 diabetes

Procedia PDF Downloads 483