Search results for: client’s expectations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1101

Search results for: client’s expectations

711 An Overview of New Era in Food Science and Technology

Authors: Raana Babadi Fathipour

Abstract:

Strict prerequisites of logical diaries united ought to demonstrate the exploratory information is (in)significant from the statistical point of view and has driven a soak increment within the utilization and advancement of the factual program. It is essential that the utilization of numerical and measurable strategies, counting chemometrics and many other factual methods/algorithms in nourishment science and innovation has expanded steeply within the final 20 a long time. Computational apparatuses accessible can be utilized not as it were to run factual investigations such as univariate and bivariate tests as well as multivariate calibration and improvement of complex models but also to run reenactments of distinctive scenarios considering a set of inputs or essentially making expectations for particular information sets or conditions. Conducting a fast look within the most legitimate logical databases (Pubmed, ScienceDirect, Scopus), it is conceivable to watch that measurable strategies have picked up a colossal space in numerous regions.

Keywords: food science, food technology, food safety, computational tools

Procedia PDF Downloads 41
710 Exploring the Relationship Between Past and Present Reviews: The Influence of User Generated Content on Future Hotel Guest Experience Perceptions

Authors: Sacha Joseph-Mathews, Leili Javadpour

Abstract:

In the tourism industry, hoteliers spend millions annually on marketing and positioning efforts for their respective hotels, all in an effort to create a specific image in the minds of the consumer. Yet despite extensive efforts to seduce potential hotel guests with sophisticated advertising messages generated by hotel entities, consumers continue to mistrust corporate branding, preferring instead to place their trust in the reviews of their consumer peers. In today’s complex and cluttered marketplace, online reviews can serve as a mediator for consumers who do not have actual knowledge and experiences with the brand, but are in the process of deciding whether or not to engage in a consumption exercise. Traditionally, consumers have used online reviews as a source of comfort and confirmation of a product/service’s positioning. But today, very few customers make any purchase decisions without first researching existing user reviews, making reviews more of a necessity, rather than a luxury in the purchase decision process. The influence of user generated content (UGC) is amplified in the tourism industry; as more than a third of potential hotel guests will not book a room without first reading a review. As corporate branding becomes less relevant and online reviews become more important, how much of the consumer’s stay expectations are being dictated by existing UGC? Moreover, as hotel guest experience a hotel through the lens of an existing review, how much of their stay and in turn their review, would have been influenced by those reviews that they read? Ultimately, there is the potential for UGC to dictate what potential guests will be most critical about, and or most focused on during their stay. If UGC is a stronger influencer in the purchase decision process than corporate branding, doesn’t it have the potential to dictate, the entire stay experience by influencing the expectations of the guest prior to them arriving on the property? For example, if a hotel is an eco-destination and they focus their branding on their website around sustainability and the retreat nature of the hotel. Yet, guest reviews constantly discuss how dissatisfactory the service and food was with no mention of nature or sustainability, will future reviews then focus primarily on the food? Using text analysis software to examine over 25,000 online reviews, we explore the extent to which new reviews are influenced by wording used in previous reviews for a hotel property, versus content generated by corporate positioning. Additionally, we investigate how distinct hotel related UGC is across different types of tourism destinations. Our findings suggest that UGC can have a greater impact on future reviews, than corporate branding and there is more cohesiveness across UGC of different types of hotel properties than anticipated. A model of User Generated Content Influence is presented and the managerial impact of the power of online reviews to trump corporate branding and shape future user experiences is discussed.

Keywords: user generated content, UGC, corporate branding, online reviews, hotels and tourism

Procedia PDF Downloads 63
709 Belonging in South Africa: Networks among African Immigrants and South African Natives

Authors: Efe Mary Isike

Abstract:

The variety of relationships between migrants and host communities is an enduring theme of migration studies. On one extreme, there are numerous examples of hostility towards ‘strangers’ who are either ejected from society or denied access to jobs, housing, education, healthcare and other aspects of normal life. More moderate treatments of those identified as different include expectations of assimilation in which host communities expect socially marginalized groups to conform to norms that they define. Both exclusion and assimilation attempt to manage the problem of difference by removing it. South Africa experienced great influx of African immigrants who worked in mines and farms under harsh and exploitative conditions before and after the institutionalization of apartheid. Although these labour migrants contributed a great deal to the economic development of South Africa, they were not given citizenship status. The formal democratization in 1994 came with dreams and expectations of a more inclusive South Africa, where black South Africans hoped to maximize their potential in a more free, fair and equal society. In the same vein, it also opened spaces for an influx of especially African immigrants into the country which set the stage for a new form of contest for belonging between South African citizens and African migrant settlers. One major manifestation of this contest was the violent xenophobic attacks against African immigrants which predate that of May 2008 and has continued with lower intensity across the country since then. While it is doubtless possible to find abundant evidence of antagonism in the relations between South Africans and African immigrants, the purpose of this study is to investigate the everyday realities of migrants in ordinary places who interact with a variety of people through their livelihood activities, marriages and social relationships, moving around towns and cities, in their residential areas, in faith-based organizations and other elements of everyday life. Rather than assuming all relations are hostile, this study intends to look at the breadth of everyday relationships within a specific context. Based on the foregoing, the main task of this study is to holistically examine and explain the nature of interactions between African migrants and South African citizens by analysing the social network ties that connect them in the specific case of Umhlathuze municipality. It will also investigate the variety of networks that exists between African migrants and South Africans and examine the nature of the linkages in the various networks identified between these two groups in Umhlathuze Municipality. Apart from a review of relevant literature, policies and other official documents, this paper will employ a purposive sample survey and in-depth interview of African immigrants and South Africans within their networks in selected suburbs in KwaZulu-Natal.

Keywords: migration, networks, development, host communities

Procedia PDF Downloads 256
708 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks

Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati

Abstract:

The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.

Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks

Procedia PDF Downloads 336
707 Factors and Impact of the Intention to Adopt Online Purchases in Africa: The Moderating Effect of Culture

Authors: Mefoute Badiang Alphonse, Emile Saker Nkwei

Abstract:

This study examines the factors determining the adoption of online purchases among customers and the influence of cultural variables in an African context. The research is based on a combination of the technology acceptance model (IS/IT). The hypotheses are tested using the structural equation method (PLS) on a sample of 446 individuals. The findings show that: (1) rational perception variables are influential factors affecting users’ intentions to adopt online purchases; (2) it is established that cultural factors have an impact on online purchases in the context of the study. Customers who value physical interaction are more likely to make purchases online, although mostly for hedonic reasons. Additionally, the relationship between utilitarian expectations and purchase intention depends on the level of conformity to the group. Implications and limitations of the research are formulated.

Keywords: Africa, cultural variables, online purchases, rational perception

Procedia PDF Downloads 56
706 Global Analysis in a Growth Economic Model with Perfect-Substitution Technologies

Authors: Paolo Russu

Abstract:

The purpose of the present paper is to highlight some features of an economic growth model with environmental negative externalities, giving rise to a three-dimensional dynamic system. In particular, we show that the economy, which is based on a Perfect-Substitution Technologies function of production, has no neither indeterminacy nor poverty trap. This implies that equilibrium select by economy depends on the history (initial values of state variable) of the economy rather than on expectations of economies agents. Moreover, by contrast, we prove that the basin of attraction of locally equilibrium points may be very large, as they can extend up to the boundary of the system phase space. The infinite-horizon optimal control problem has the purpose of maximizing the representative agent’s instantaneous utility function depending on leisure and consumption.

Keywords: Hopf bifurcation, open-access natural resources, optimal control, perfect-substitution technologies, Poincarè compactification

Procedia PDF Downloads 150
705 Technology Angels and Entrepreneurs: Insights from a Study in Poland

Authors: Rafal Morawczynski

Abstract:

The paper presents results of a study of technology angels in Poland, who are important for the development of the high technology industries. For entrepreneurs, they offer not only capital but also expertise, engagement, and networking. A technology angel is a relatively new type of investor who invests in high-tech start-ups and supports their founders (entrepreneurs) in the development process of a new venture. Conclusions are drawn from a comparison between 8 technology angels and 7 'classical' business angels. Results present features and behaviors of technology angels that distinguish them from traditional (typical, classic) business angels. As this type of investor actively cooperates with entrepreneurs, the study focuses mainly on their perception of venture founders and several aspects of this cooperation: perception of entrepreneurs’ characteristics by angels, correction of expectations toward corporate governance, and 'value adding' activities.

Keywords: business angels, entrepreneurs, Poland, start-up, technology entrepreneurship, venture capital

Procedia PDF Downloads 163
704 Gender Differences in the Impact and Subjective Interpretation of Childhood Sexual Abuse Survivors

Authors: T. Borja-Alvarez, V. Jiménez-Borja, M. Jiménez Borja, C. J. Jiménez-Mosquera

Abstract:

Research on child sexual abuse has predominantly focused on female survivors. This has resulted in less research looking at the particular context in which this abuse takes place for boys and the impact this abuse may have on male survivors. The aim of this study is to examine the sex and age of the perpetrators of child sexual abuse and explore gender differences in the impact along with the subjective interpretation that survivors attribute to these experiences. The data for this study was obtained from Ecuadorian university students (M = 230, F = 293) who reported sexual abuse using the ISPCAN Child Abuse Screening Tool Retrospective version (ICAST-R). Participants completed Horowitz's Impact of Event Scale (IES) and were also requested to choose among neutral, positive, and negative adjectives to describe these experiences. The results indicate that in the case of males, perpetrators were both males (adults =27%, peers =20%, relatives =10.3%, cousins =7.4%) and young females (girlfriends or ex-girlfriends =25.6%, neighborhood =20.7%, school =16.7%, cousins =15.3%, strangers =12.8%). In contrast, almost all females reported that adult males were the perpetrators (relatives =29.6%, neighborhood =11.9%, strangers =19.9%, family friends =9.7%). Regarding the impact of these events, significant gender differences emerged. More females (50%) than males (20%) presented symptoms of post-traumatic stress disorder (PTSD). Gender differences also surfaced in the way survivors interpret their experiences. Almost half of the male participants selected the word “consensual” followed by the words “normal”, “helped me to mature”, “shameful”, “confusing”, and “traumatic”. In contrast, almost all females chose the word “non-consensual” followed by the words “shameful”, “traumatic”, “scary”, and “confusing”. In conclusion, the findings of this study suggest that young females and adult males were the most common perpetrators of sexually abused boys whereas adult males were the most common perpetrators of sexually abused girls. The impact and the subjective interpretation of these experiences were more negative for girls than for boys. The factors that account for the gender differences in the impact and the interpretation of these experiences need further exploration. It is likely that the cultural expectations of sexual behaviors for boys and girls in Latin American societies may partially explain the differential impact in the way these childhood sexual abuse experiences are interpreted in adulthood. In Ecuador, as is the case in other Latin American countries, the machismo culture not only accepts but encourages early sexual behaviors in boys and negatively judges premature sexual behavior in females. The result of these different sexual expectations may be that sexually abused boys may re-define these experiences as “consensual” and “normal” in adulthood, even though these were not consensual at the time of occurrence. Future studies are needed to more deeply understand the different contexts of sexual abuse for boys and girls in order to analyze the long-term impact of these experiences.

Keywords: abuse, child, gender differences, sexual

Procedia PDF Downloads 73
703 The Interconnection between Curriculum Development and ICT

Authors: Hanane Sarnou, Sabri Koç

Abstract:

In this paper, the interconnection between curriculum development for basic education and the use of information and communication technologies (ICTs) in the classroom referring to the Licence, Master's and Doctorate (LMD) benefits under such link will be presented and analysed. This study seeks to achieve to what extent LMD, competency-based approach (CBA) and ICTs use are interrelated. Likewise, the data collected from the responses of our teachers and learners who are concerned with LMD impact on their learning and teaching through interviews will be discussed, analysed, and classified. This paper is divided into two sections. The first section is about the curriculum development for basic education and its relation with higher education under the LMD and its link with ICTs in the university while the second section is about the classification of learners’ and teachers’ positive/negative responses concerning their positive or negative attitudes towards the ICT integration. The focus will be on the positive aspects of students’ expectations, opinions and assumptions regarding the integration of ICTs into the classroom under LMD and CBA.

Keywords: LMD system, CBA approach, curriculum development, ICT

Procedia PDF Downloads 384
702 Cultural and Historical Roots of Plagiarism in Georgia

Authors: Lali Khurtsia, Vano Tsertsvadze

Abstract:

The purpose of the study was to find out incentives and expectations, methods and ways, which are influential to students during working with their thesis. Research findings shows that the use of plagiarism has cultural links deep in the history - on the one hand, the tradition of sharing knowledge in the oral manner, with its different interpretations, and on the other hand the lack of fair and honest methods in the academic process. Research results allow us to determine general ideas about preventive policy to reduce the use of plagiarism. We conducted surveys in three different groups – we interviewed so-called diploma writers, students on bachelors and masters level and the focus group of lecturers. We found that the problem with plagiarism in Georgia has cultural-mental character. We think that nearest years’ main task should be breaking of barriers existed between lecturers and students and acknowledgement of honest principals of study process among students and pupils.

Keywords: education, Georgia, plagiarism, study process, school, university

Procedia PDF Downloads 202
701 Where Is the Sultan of Aceh? Reconsidering the Return of the Aceh Sultanate

Authors: Muhammad Harya Ramdhoni, Nidzam Sulaiman, Muhammad Ridwan

Abstract:

The Helsinki Agreement between the Indonesian Government (RI) and the Aceh Liberation Movement (GAM) on 15th Aug. 2005 fails to reconcile social and political turmoil in Aceh Darussalam (NAD). The political powers that were once unified in their struggle against Indonesian Government prior to this agreement have now become divided due to differences in political and economic interests. Using descriptive analysis and intellectual discourse, this paper proposes that the Aceh Sultanate be revived as an attempt to unite these divided political powers and to curtail potential conflicts in the area. This proposal is based on three assumptions. First, the Aceh Sultanate is the only Sultanate in Sumatera that did not fall victim to the social revolution post 1945 proclamation of independence. Second, the Acehnese still acknowledge the Sultanate as a sovereign political power even though it was defeated by the Dutch in 1904. Third, there are emotional, historical and cultural ties between the Acehnese and the Sultanate as they still perceived them to be their patron. Consequently, the Sultanate is the unifying element of all political powers in the area. This, however, is not an attempt to reinstate feudalism in Aceh. It only seeks to facilitate the political reconciliation process in Aceh Darussalam founded on sociological and historical background of locals.

Keywords: Sultanate Aceh, political reconciliation, political power, patron-client

Procedia PDF Downloads 238
700 Causality Channels between Corruption and Democracy: A Threshold Non-Linear Analysis

Authors: Khalid Sekkat, Fredj Fhima, Ridha Nouira

Abstract:

This paper focuses on three main limitations of the literature regarding the impact of corruption on democracy. These limitations relate to the distinction between causality and correlation, the components of democracy underlying the impact and the shape of the relationship between corruption and democracy. The study uses recent developments in panel data causality econometrics, breaks democracy down into different components, and examines the types of the relationship. The results show that Control of Corruption leads to a higher quality of democracy. Regarding the estimated coefficients of the components of democracy, they are significant at the 1% level, and their signs and levels are in accordance with expectations except in a few cases. Overall, the results add to the literature in three respects: i). corruption has a causal effect on democracy and, hence, single equation estimation may pose a problem, ii) the assumption of the linearity of the relationships between control of corruption and democracy is also possibly problematic, and iii) the channels of transmission of the effects of corruption on democracy can be diverse. Disentangling them is useful from a policy perspective.

Keywords: corruption, governance, causality, threshold models

Procedia PDF Downloads 13
699 Research on a Digital Basketball Sports Game (DBSG) Framework Based on the Female Perspective

Authors: Ran Yue, Zhejing Li

Abstract:

Context: The context of this study is the field of Digital Basketball Sports Games (DBSG). The existing DBSGs often prioritize competitiveness and confrontation, neglecting the narrative and progressive expression, especially from a female standpoint. This study aims to address this gap by analyzing existing DBSGs and proposing a comprehensive framework tailored to meet the needs and desires of women in basketball. Research Aim: The aim of this research is to examine the narrative perspectives of women in basketball and understand their desires and expectations within the sport. It also seeks to investigate methods to seamlessly integrate women's basketball stories into gameplay, addressing their specific needs and expectations. Additionally, the study aims to develop a digital basketball sports game framework that combines narrative richness and entertainment, with a focus on the female audience. Methodology: The study utilizes affective-arousal theories as a psychological framework to explore how emotional arousal influences player engagement and responses in the digital basketball sports game. It employs in-depth case studies to examine specific instances and gain insights into the implementation and impact of narrative elements and educational features in existing DBSGs. Comparative studies are conducted to analyze different DBSGs, identifying effective strategies and shortcomings. Findings: The research findings contribute to the development of a digital basketball game framework from a female perspective. This framework enhances the completeness, diversity, and inclusivity of digital basketball sports games. By addressing the specific needs of women in basketball, including fundamental knowledge, sports skills, safety awareness, and rehabilitation training methods, the framework provides a foundational reservoir for a broader range of basketball participation. It enriches the gaming experience by enhancing enjoyment, narrative, and diversity. It also acts as a catalyst to encourage more women to engage with basketball stories, participate in the sport, persevere, and derive greater enjoyment while benefiting their physical fitness and health. Theoretical Importance: The study contributes to the existing literature by incorporating game motivation psychology theories and proposing a comprehensive framework that caters to the specific needs of women in basketball. It emphasizes the importance of considering the narrative and progressive expression in DBSGs, especially from a female perspective. The research explores affective-arousal theories and provides insights into how emotional arousal can influence player engagement and responses in digital basketball sports games. Data Collection and Analysis Procedures: The study collects data through in-depth case studies of existing DBSGs, examining specific instances to uncover insights into the implementation and impact of narrative elements and educational features. Comparative studies are conducted to contrast and analyze various DBSGs, identifying effective strategies and shortcomings. The analysis procedures involve identifying commonalities, differences, strengths, and weaknesses among the DBSGs, guiding the development of a female-centric perspective in the proposed framework. Questions Addressed: The study addresses the following questions: What are the narrative perspectives of women in basketball? How can women's basketball stories be seamlessly integrated into gameplay? What are the specific needs and expectations of women in basketball? What effective strategies and shortcomings exist in current DBSGs? How can a digital basketball game framework be developed to cater to the female audience? Conclusion: In conclusion, this study contributes to the field of DBSGs by proposing a comprehensive digital basketball game framework from a female perspective. The framework enhances the inclusivity, diversity, and enjoyment of DBSGs by addressing the specific needs and desires of women in basketball. It provides a foundation for a broader range of basketball participation, enriching the gaming experience and benefiting women's physical fitness and health. The research, using affective-arousal theories and in-depth case studies, provides valuable insights into the implementation and impact of narrative elements and educational features in existing DBSGs, guiding the development of the proposed female-centric framework.

Keywords: digital basketball game, game framework, female perspective, game narratives

Procedia PDF Downloads 33
698 Application Quality Function Deployment (QFD) Tool in Design of Aero Pumps Based on System Engineering

Authors: Z. Soleymani, M. Amirzadeh

Abstract:

Quality Function Deployment (QFD) was developed in 1960 in Japan and introduced in 1983 in America and Europe. The paper presents a real application of this technique in a way that the method of applying QFD in design and production aero fuel pumps has been considered. While designing a product and in order to apply system engineering process, the first step is identification customer needs then its transition to engineering parameters. Since each change in deign after production process leads to extra human costs and also increase in products quality risk, QFD can make benefits in sale by meeting customer expectations. Since the needs identified as well, the use of QFD tool can lead to increase in communications and less deviation in design and production phases, finally it leads to produce the products with defined technical attributes.

Keywords: customer voice, engineering parameters, gear pump, QFD

Procedia PDF Downloads 227
697 Forecast Based on an Empirical Probability Function with an Adjusted Error Using Propagation of Error

Authors: Oscar Javier Herrera, Manuel Angel Camacho

Abstract:

This paper addresses a cutting edge method of business demand forecasting, based on an empirical probability function when the historical behavior of the data is random. Additionally, it presents error determination based on the numerical method technique ‘propagation of errors’. The methodology was conducted characterization and process diagnostics demand planning as part of the production management, then new ways to predict its value through techniques of probability and to calculate their mistake investigated, it was tools used numerical methods. All this based on the behavior of the data. This analysis was determined considering the specific business circumstances of a company in the sector of communications, located in the city of Bogota, Colombia. In conclusion, using this application it was possible to obtain the adequate stock of the products required by the company to provide its services, helping the company reduce its service time, increase the client satisfaction rate, reduce stock which has not been in rotation for a long time, code its inventory, and plan reorder points for the replenishment of stock.

Keywords: demand forecasting, empirical distribution, propagation of error, Bogota

Procedia PDF Downloads 598
696 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 231
695 Quality versus Excellence: The Importance of Employees Knowing the Difference

Authors: Chris Nelson

Abstract:

Quality and excellence are qualitative topics that are usually addressed based on knowledge and past experience from leadership and those in charge of the organization. The significance of this study is to highlight the differences and similarities between these two mindsets and how an operational staff can most appropriately use them in the workplace. Quality and excellence are two words that are talked about a lot in the manufacturing world. Buzzwords such as operational excellence, quality controls, and efficiencies are discussed in the boardroom as well on the shop floor. These terms are used quite frequently and with good reasons. When a person visits their favorite local restaurant, They go because 1) they like the food and 2) the people are some of the greatest individuals to be around. With that in mind, they know they always put out quality food. They do not always go because the quality of the food is far superior than other restaurants. But the quality of ingredients always meets their expectations. When they compare them to the term excellence, they are disappointed. The food never looks like the pictures on the menu. But when have you ever been to a restaurant where the food looks the same as on the menu? For them, when evaluating which buzzword to use as a guiding star, its simple: excellence. The corporation can accomplish these goals by operating at a standard that far exceeds customer’s wants and needs.

Keywords: industrial engineering, innovation, management and technology, logistics and scheduling, six sigma

Procedia PDF Downloads 180
694 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 227
693 Types of Communication Strategies in Jainism: A Study of Jain Mendicants, Educators and Lay Persons

Authors: Bhumi Shah

Abstract:

The aim of the study is to create understanding of communication strategies followed by Jain mendicants, educators, and lay persons. Second objective of the study is to see ancient means of communication have reformed in this digital generation. For these purposes of the study, research was carried out among Jain lay persons, educators and mendicants. To understand how traditional methods of communication affect the understanding of Jain religion. The paper attempts further elaborate and analyse various degrees of involvement and expectations of Jain Lay persons and mendicants in the process of religious discourse. In doing so the paper would provide an in- depth debate and discussion about communication patterns and the actual impact to the original meaning of the religion. The study was carried out in the city of Ahmedabad India, where Jains are concentrated in urban settings. In depth interviews were carried out as to understand different communication strategies followed by them.

Keywords: customs, ethics, Jainism, Jain mendicants, religious communication, traditions, rituals

Procedia PDF Downloads 98
692 Hope and Psychological Resilience: Discursive Investigation

Authors: Haya Alalanda, Talal Alali

Abstract:

This study examines how people who are seeking help construct the notion of hope and resilience in their accounts. It focuses on how the different speakers present themselves, their experiences, expectations and what they hope to achieve from psychotherapy. The present research is based on the qualitative approach, it employs discursive psychology which depends on language and its role in constructing ideas in context of social interaction. In this study we analyzed treatment sessions and transcribed interviews by psychologists for a number of patients who attending psychiatric clinic. We interviewed 8 persons who were diagnosed with mood disorders . The findings indicate that the different speakers presented themselves as a resilient and presented hope in a way that is similar to Snyders theory. The results show that different speakers constructed themselves and their experience in a way that enables them to present their complaints while seen as resilient . Conclusion: this study aims to achieve better understanding of how these notions are presented within clinical sessions and its relation to mental disorders.

Keywords: hope, psychological resilience, discourse analysis, trauma

Procedia PDF Downloads 41
691 Visitor Discourses of European Holocaust Heritage: A Netnography

Authors: Craig Wight

Abstract:

This presentation will identify the key findings from a recent netnographic discourse analysis of social media content generated in response to visits to three iconic European Holocaust Heritage sites: Ann Frank’s House in Amsterdam, the Netherlands, the Auschwutz-Birkenau Memorial Museum and Memorial in Poland, and the Jewish Museum in Berlin, Germany. Four major discourses are identified under the headings of Holocaust heritage as social memory, reactions to Holocaust heritage, obligation and ritual, and transgressive visitor behaviour. Together, these discourses frame the values, existential anxieties, emotions, priorities, and expectations of visitors. The findings will interest those involved in the planning and management of Holocaust heritage for tourism purposes since they provide unique access to an archive of unmediated visitor feedback on European Holocaust heritage experiences.

Keywords: foucault, european holocaust heritage, discourse analysis, netnography, social media, dark tourism

Procedia PDF Downloads 118
690 Innovative Business Education Pedagogy: A Case Study of Action Learning at NITIE, Mumbai

Authors: Sudheer Dhume, T. Prasad

Abstract:

There are distinct signs of Business Education losing its sheen. It is more so in developing countries. One of the reasons is the value addition at the end of 2 year MBA program is not matching with the requirements of present times and expectations of the students. In this backdrop, Pedagogy Innovation has become prerequisite for making our MBA programs relevant and useful. This paper is the description and analysis of innovative Action Learning pedagogical approach adopted by a group of faculty members at NITIE Mumbai. It not only promotes multidisciplinary research but also enhances integration of the functional areas skillsets in the students. The paper discusses the theoretical bases of this pedagogy and evaluates the effectiveness of it vis-à-vis conventional pedagogical tools. The evaluation research using Bloom’s taxonomy framework showed that this blended method of Business Education is much superior as compared to conventional pedagogy.

Keywords: action learning, blooms taxonomy, business education, innovation, pedagogy

Procedia PDF Downloads 247
689 Supply Chain Control and Inventory Management in Garment Industry

Authors: Nisa Nur Duman, Sümeyya Kiliç

Abstract:

In global competition conditions, survival of the plants by obtaining competitive advantage relies on the effective usage of existing sources. By this way, the plants can minimize their costs without losing their quality. They also take advantage took advantage on their competitors and enlarge customer portfolio by increasing profit margins. Changing structure of market and customer demands also change the structure of the competition between companies. Furthermore, competition is not only between the companies. By this manner, supply chain and supply chain management get importance by considering company performances. Companies that want to survive, search the ways of decreasing costs and the ways of meeting customer expectations. One of the important tools for reaching these goals is inventory managemet. The best inventory management system is meeting the demands by considering plant goals.

Keywords: Supply chain, inventory management, apparel sector, garment industry

Procedia PDF Downloads 344
688 Case Study: Hybrid Mechanically Stabilized Earth Wall System Built on Basal Reinforced Raft

Authors: S. Kaymakçı, D. Gündoğdu, H. Özçelik

Abstract:

The truck park of a warehouse for a chain of supermarket was going to be constructed on a poor ground. Rather than using a piled foundation, the client was convinced that a ground improvement using a reinforced foundation raft also known as “basal reinforcement” shall work. The retaining structures supporting the truck park area were designed using a hybrid structure made up of the Terramesh® Wall System and MacGrid™ high strength geogrids. The total wall surface area is nearly 2740 sq.m , reaching a maximum height of 13.00 meters. The area is located in the first degree seismic zone of Turkey and the design seismic acceleration is high. The design of walls has been carried out using pseudo-static method (limit equilibrium) taking into consideration different loading conditions using Eurocode 7. For each standard approach stability analysis in seismic condition were performed. The paper presents the detailed design of the reinforced soil structure, basal reinforcement and the construction methods; advantages of using such system for the project are discussed.

Keywords: basal reinforcement, geogrid, reinforced soil raft, reinforced soil wall, soil reinforcement

Procedia PDF Downloads 277
687 The Implementation of the Multi-Agent Classification System (MACS) in Compliance with FIPA Specifications

Authors: Mohamed R. Mhereeg

Abstract:

The paper discusses the implementation of the MultiAgent classification System (MACS) and utilizing it to provide an automated and accurate classification of end users developing applications in the spreadsheet domain. However, different technologies have been brought together to build MACS. The strength of the system is the integration of the agent technology with the FIPA specifications together with other technologies, which are the .NET widows service based agents, the Windows Communication Foundation (WCF) services, the Service Oriented Architecture (SOA), and Oracle Data Mining (ODM). Microsoft's .NET windows service based agents were utilized to develop the monitoring agents of MACS, the .NET WCF services together with SOA approach allowed the distribution and communication between agents over the WWW. The Monitoring Agents (MAs) were configured to execute automatically to monitor excel spreadsheets development activities by content. Data gathered by the Monitoring Agents from various resources over a period of time was collected and filtered by a Database Updater Agent (DUA) residing in the .NET client application of the system. This agent then transfers and stores the data in Oracle server database via Oracle stored procedures for further processing that leads to the classification of the end user developers.

Keywords: MACS, implementation, multi-agent, SOA, autonomous, WCF

Procedia PDF Downloads 258
686 Engagement Analysis Using DAiSEE Dataset

Authors: Naman Solanki, Souraj Mondal

Abstract:

With the world moving towards online communication, the video datastore has exploded in the past few years. Consequently, it has become crucial to analyse participant’s engagement levels in online communication videos. Engagement prediction of people in videos can be useful in many domains, like education, client meetings, dating, etc. Video-level or frame-level prediction of engagement for a user involves the development of robust models that can capture facial micro-emotions efficiently. For the development of an engagement prediction model, it is necessary to have a widely-accepted standard dataset for engagement analysis. DAiSEE is one of the datasets which consist of in-the-wild data and has a gold standard annotation for engagement prediction. Earlier research done using the DAiSEE dataset involved training and testing standard models like CNN-based models, but the results were not satisfactory according to industry standards. In this paper, a multi-level classification approach has been introduced to create a more robust model for engagement analysis using the DAiSEE dataset. This approach has recorded testing accuracies of 0.638, 0.7728, 0.8195, and 0.866 for predicting boredom level, engagement level, confusion level, and frustration level, respectively.

Keywords: computer vision, engagement prediction, deep learning, multi-level classification

Procedia PDF Downloads 95
685 Engineering Graduates' Employability in the Eyes of Stakeholders: Based on the Survey to 6 Universities and 20 Enterprises in China

Authors: Cui Jun

Abstract:

By surveying 536 engineering graduates and 232 employers of 6 research-based universities and 20 enterprises in China, this research aims to reveal the perceptions and expectations of engineering curriculum and graduates’ employability by stakeholders. Variation was seen by university and sometimes by engineering major. Overall, however, the satisfaction with courses that promote employability is not high by graduates, and there is a gap between employers’ satisfaction and their expectation. Importantly, students’ satisfaction degree of the curricula enhancing employability and employers’ satisfaction degree of graduates’ employability are significantly lower than employers’ expectation value. Therefore, engineering curriculum reform must take the stakeholders’ demand into account and integrate employability into curricula. These findings provide the empirical basis for the curriculum reform of the National Excellent Engineers Education Program (NE3P) in China.

Keywords: engineering education, employability of graduates, stakeholders, survey

Procedia PDF Downloads 350
684 Website Appeal’s Impact on Brand Outcomes: The Mediated Effect of Emotional Attractiveness in the Relationship between Consistent Image and Brand Value

Authors: Salvador Treviño-Martinez, Christian Reich-Lopez

Abstract:

This paper investigates the relationship between website appeal and brand value outcomes (brand attraction, brand loyalty, brand relationship, and brand experience), considering the mediating effect of emotional attractiveness. Data were collected from 221 customers of a quick-service restaurant in Culiacan, Mexico, using an online survey distributed via WhatsApp, following the clients' navigation of the restaurant's website. The study employed PLS-SEM to test the proposed hypotheses and performed 5,000 bootstrapping subsamples to obtain results. The findings indicate that consistent image, a key component of website appeal, has a statistically significant direct and mediated effect (through emotional attractiveness) on the aforementioned brand outcomes. The study's limitations include the convenience sampling method and the single company client database used for the sample composition. This research contributes to the branding and website quality literature by testing nine hypotheses using the Stimuli-Organism-Response theoretical approach in an underexplored context: quick-service restaurants in Latin America.

Keywords: website appeal, branding, emotional attractiveness, consistent image, website quality

Procedia PDF Downloads 66
683 Analysis of Nonlinear Bertrand Duopoly Game with Heterogeneous Players

Authors: Jixiang Zhang

Abstract:

A dynamic of Bertrand duopoly game is analyzed, where players use different production methods and choose their prices with bounded rationality. The equilibriums of the corresponding discrete dynamical systems are investigated. The stability conditions of Nash equilibrium under a local adjustment process are studied. The stability conditions of Nash equilibrium under a local adjustment process are studied. The stability of Nash equilibrium, as some parameters of the model are varied, gives rise to complex dynamics such as cycles of higher order and chaos. On this basis, we discover that an increase of adjustment speed of bounded rational player can make Bertrand market sink into the chaotic state. Finally, the complex dynamics, bifurcations and chaos are displayed by numerical simulation.

Keywords: Bertrand duopoly model, discrete dynamical system, heterogeneous expectations, nash equilibrium

Procedia PDF Downloads 372
682 Determining Current and Future Training Needs of Ontario Workers Supporting Persons with Developmental Disabilities

Authors: Erin C. Rodenburg, Jennifer McWhirter, Andrew Papadopoulos

Abstract:

Support workers for adults with developmental disabilities promote the care and wellbeing of a historically underserved population. Poor employment training and low work satisfaction for these disability support workers are linked to low productivity, poor quality of care, turnover, and intention to leave employment. Therefore, to improve the lives of those within disability support homes, both client and caregiver, it is vital to determine where improvements to training and support for those providing direct care can be made. The current study aims to explore disability support worker’s perceptions of the training received in their employment at the residential homes, how it prepared them for their role, and where there is room for improvement with the aim of developing recommendations for an improved training experience. Responses were collected from 85 disability support workers across 40 Ontario group homes. Findings suggest most disability support workers within the 40 support homes feel adequately trained in their responsibilities of employment. For those who did not feel adequately trained, the main issues expressed were a lack of standardization in training, a need for more continuous training, and a move away from trial and error in performing tasks to support clients with developmental disabilities.

Keywords: developmental disabilities, disability workers, support homes, training

Procedia PDF Downloads 162