Search results for: private technology park
9686 Exploring the Implementation of Building Information Modelling Level 2 in the UK Construction Industry: The Case of Small and Medium-Sized Enterprises
Authors: Khaled Abu Awwad, Abdussalam Shibani, Michel Ghostin
Abstract:
In the last few years, building information modelling (BIM) has been acknowledged as a new technology capable of transforming the construction sector to a collaborated industry. The implementation of BIM in the United Kingdom (UK) construction sector has increased significantly in the last decade, particularly after the UK government mandated the use of BIM in all public projects by 2016. Despite this, there are many indicators that BIM implementation is the main concern for large companies, while small and medium-sized enterprises (SMEs) are lagging behind in adopting and implementing this new technology. This slow adoption of BIM leads to an uncompetitive disadvantage in public projects and possible private projects. On the other hand, there is limited research focusing on the implementation of BIM Level 2 within SMEs. Therefore, the aim of this study is to bridge this gap and provide a conceptual framework to aid SMEs in implementing BIM Level 2. This framework is a result of interpreting qualitative data obtained by conducting semi-structured interviews with BIM experts in the UK construction industry.Keywords: building information modelling, critical success factors, small and medium-sized enterprises, United Kingdom
Procedia PDF Downloads 2049685 Impact of Construction Risk Factors into Actual Construction Price in PPP Projects
Authors: Saleh Alzahrani, Halim Boussabaine
Abstract:
The majority of Public Private Partnership (PPP) are developed based on the rationale that the design, construction, operation, and financing of a public project is to be awarded to a private party within a single contractual framework. PPP project risks normally include the development and construction of a new asset as well as its operation for decades. Undoubtedly the most serious consequences of risks during the construction period are price and time overruns. These events are amongst the most broadly used scenarios in value for money analysis risks. The sources of risk change over the life cycle of a PPP project. In traditional procurement, the public sector normally has to cover all price distress from these risks. At least there is plenty evidence to suggest that price distress is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of construction risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies, and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.Keywords: Public Private Partnership (PPP), Risk, Risk Pricing, System Dynamics (SD), construction price
Procedia PDF Downloads 5659684 Educating Children with the Child-Friendly Smartphone Operation System
Authors: Wildan Maulana Wildan, Siti Annisa Rahmayani Icha
Abstract:
Nowadays advances in information technology are needed by all the inhabitants of the earth for the sake of ease all their work, but it is worth to introduced the technological advances in the world of children. Before the technology is growing rapidly, children busy with various of traditional games and have high socialization. Moreover, after it presence, almost all of children spend more their time for playing gadget, It can affect the education of children and will change the character and personality children. However, children also can not be separated with the technology. Because the technology insight knowledge of children will be more extensive. Because the world can not be separated with advances in technology as well as with children, there should be developed a smartphone operating system that is child-friendly. The operating system is able to filter contents that do not deserve children, even in this system there is a reminder of a time study, prayer time and play time for children and there are interactive contents that will help the development of education and children's character. Children need technology, and there are some ways to introduce it to children. We must look at the characteristics of children in different environments. Thus advances in technology can be beneficial to the world children and their parents, and educators do not have to worry about advances in technology. We should be able to take advantage of advances in technology best possible.Keywords: information technology, smartphone operating system, education, character
Procedia PDF Downloads 5139683 Decision Making Communication in the Process of Technologies Commercialization: Archival Analysis of the Process Content
Authors: Vaida Zemlickiene
Abstract:
Scientists around the world and practitioners are working to identify the factors that influence the results of technology commercialization and to propose the ideal model for the technology commercialization process. In other words, all stakeholders of technology commercialization seek to find a formula or set of rules to succeed in commercializing technologies in order to avoid unproductive investments. In this article, the process of commercialization technology is understood as the process of transforming inventions into marketable products, services, and processes, or the path from the idea of using an invention to a product that incorporates process from 1 to 9 technology readiness level (TRL). There are many publications in the field of management literature, which are aimed at managing the commercialization process. However, there is an apparent lack of research for communication in decision-making in the process of technology commercialization. Works were done in the past, and the last decade's global research analysis led to the unambiguous conclusion that the methodological framework is not mature enough to be of practical use in business. The process of technology commercialization and the decisions made in the process should be explored in-depth. An archival analysis is performed to find insights into decision-making communication in the process of technologies commercialization, to find out the content of technology commercialization process: decision-making stages and participants, to analyze the internal factors of technology commercialization, to perform their critical analysis, to analyze the concept of successful/unsuccessful technology commercialization.Keywords: the process of technology commercialization, communication in decision-making process, the content of technology commercialization process, successful/unsuccessful technology commercialization
Procedia PDF Downloads 1539682 Investigating Teachers’ Confidence and Beliefs in Using Technology in Teaching Mathematics in Rwandan Secondary Schools
Authors: Odette Umugiraneza, Etienne Nzaramyimana
Abstract:
Confidence and beliefs are the main contributors to the improvement of teachers’ mathematical knowledge. The objective of this study was to investigate teachers’ confidence and beliefs towards technology use in teaching mathematics subjects in the Musanze District. The data were collected using closed and open questions. These were distributed to 118 secondary school senior 1 to 6 mathematics teachers in Musanze district. The findings revealed that the teachers’ confidence about the use of technology in teaching mathematics needs improvement. Apart from confidence, almost a third of the teachers convoyed negative beliefs that technology plays great importance in promoting the understanding of mathematics. Teachers as knowledge transmitters are required to join various professional courses towards technology integration in the teaching of mathematics, to improve the effectiveness of teaching and learning.Keywords: knowledge, technology, teachers’ confidence, beliefs, barriers of technology use
Procedia PDF Downloads 1259681 Shape Management Method for Safety Evaluation of Bridge Based on Terrestrial Laser Scanning Using Least Squares
Authors: Gichun Cha, Dongwan Lee, Junkyeong Kim, Aoqi Zhang, Seunghee Park
Abstract:
All the world are studying the construction technology of double deck tunnel in order to respond to the increasing urban traffic demands and environmental changes. Advanced countries have the construction technology of the double deck tunnel structure. but the domestic country began research on it. Construction technologies are important. But Safety evaluation of structure is necessary to prevent possible accidents during construction. Thus, the double deck tunnel was required the shape management of middle slabs. The domestic country is preparing the construction of double deck tunnel for an alternate route and a pleasant urban environment. Shape management of double deck tunnel has been no research because it is a new attempted technology. The present, a similar study is bridge structure for the shape management. Bridge is implemented shape model using terrestrial laser scanning(TLS). Therefore, we proceed research on the bridge slabs because there is a similar structure of double deck tunnel. In the study, we develop shape management method of bridge slabs using TLS. We select the Test-bed for measurement site. This site is bridge located on Sungkyunkwan University Natural Sciences Campus. This bridge has a total length of 34m, the vertical height of 8.7m from the ground. It connects Engineering Building #1 and Engineering Building #2. Point cloud data for shape management is acquired the TLS and We utilized the Leica ScanStation C10/C5 model. We will confirm the Maximum displacement area of middle slabs using Least-Squares Fitting. We expect to raise stability for double deck tunnel through shape management for middle slabs.Keywords: bridge slabs, least squares, safety evaluation, shape management method, terrestrial laser scanning
Procedia PDF Downloads 2419680 The Impact of Technology on Architecture and Graphic Designs
Authors: Feby Zaki Raouf Fawzy
Abstract:
Nowadays, design and architecture are being affected and undergoing change with the rapid advancements in technology, economics, politics, society, and culture. Architecture has been transforming with the latest developments after the inclusion of computers in design. Integration of design into the computational environment has revolutionized architecture and unique perspectives in architecture have been gained. The history of architecture shows the various technological developments and changes in which architecture has transformed with time. Therefore, the analysis of integration between technology and the history of the architectural process makes it possible to build a consensus on the idea of how architecture is to proceed. In this study, each period that occurs with the integration of technology into architecture is addressed within the historical process. At the same time, changes in architecture via technology are identified as important milestones and predictions with regards to the future of architecture have been determined. Developments and changes in technology and the use of technology in architecture within years are analyzed in charts and graphs comparatively. The historical process of architecture and its transformation via technology is supported by a detailed literature review, and they are consolidated with the examination of focal points of 20th-century architecture under the titles parametric design, genetic architecture, simulation, and biomimicry. It is concluded that with the historical research between past and present, the developments in architecture cannot keep up with the advancements in technology, and recent developments in technology overshadow architecture; even technology decides the direction of architecture. As a result, a scenario is presented with regard to the reach of technology in the future of architecture and the role of the architect.Keywords: design and development the information technology architecture, enterprise architecture, enterprise architecture design result, TOGAF architecture development method (ADM)
Procedia PDF Downloads 699679 Analysis of the Recovery of Burnility Index and Reduction of CO2 for Cement Manufacturing Utilizing Waste Cementitious Powder as Alternative Raw Material of Limestone
Authors: Kwon Eunhee, Park Dongcheon, Jung Jaemin
Abstract:
In countries around the world, environmental regulations are being strengthened, and Korea is no exception to this trend, which means that environment pollution and the environmental load have recently become a significant issue. For this reason, in this study limestone was replaced with cementitious powder to reduce the volume of construction waste as well as the emission of carbon dioxide caused by Tal-carbonate reaction. The research found that cementitious powder can be used as a substitute for limestone. However, the mix proportions of fine aggregate and powder included in the cementitious powder appear to have a great effect on substitution. Thus, future research should focus on developing a technology that can effectively separate and discharge fine aggregate and powder in the cementitious powder.Keywords: waste cementitious powder, fine aggregate powder, CO2 emission, decarbonation reaction, calcining process
Procedia PDF Downloads 4909678 Pattern Recognition Using Feature Based Die-Map Clustering in the Semiconductor Manufacturing Process
Authors: Seung Hwan Park, Cheng-Sool Park, Jun Seok Kim, Youngji Yoo, Daewoong An, Jun-Geol Baek
Abstract:
Depending on the big data analysis becomes important, yield prediction using data from the semiconductor process is essential. In general, yield prediction and analysis of the causes of the failure are closely related. The purpose of this study is to analyze pattern affects the final test results using a die map based clustering. Many researches have been conducted using die data from the semiconductor test process. However, analysis has limitation as the test data is less directly related to the final test results. Therefore, this study proposes a framework for analysis through clustering using more detailed data than existing die data. This study consists of three phases. In the first phase, die map is created through fail bit data in each sub-area of die. In the second phase, clustering using map data is performed. And the third stage is to find patterns that affect final test result. Finally, the proposed three steps are applied to actual industrial data and experimental results showed the potential field application.Keywords: die-map clustering, feature extraction, pattern recognition, semiconductor manufacturing process
Procedia PDF Downloads 4029677 Computational Fluid Dynamics Simulation of Floating Body Motion Interacting with Focused Waves
Authors: Seul-Ki Park, Jong-Chun Park, Gyu-Mok Jeon, Dae-Kyung Ock, Seung-Gyu Jeong
Abstract:
Rogue waves cause frequent accidents of ships and offshore structures, which can result in severe damage to the structures. The Rogue waves, which are also known as big waves, freak waves, extreme waves, monster waves, focused waves, giant waves and abnormal waves, are unexpected and suddenly appearing, and can have a breaking force to destroy the structure even though modern structures are designed to tolerate a breaking wave. In the present study, a series of focused waves are numerically reproduced by concentrating nonlinear multi-directional waves into a target point using a commercial CFD software, Star-CCM+. A flow analysis for investigating the physical characteristics of the focused waves is performed using the Star-CCM+, while it has several difficulties to examine the inner properties of the waves in existing potential theory and experiments. Additionally, the 6-DOF (Degree of Freedom) motion of a floating body interacting with the focused waves are simulated, and the dynamic response of the body are discussed.Keywords: multidirectional waves, focused waves, rogue waves, wave-structure interaction, numerical wave tank, computational fluid dynamics
Procedia PDF Downloads 2519676 Attachments of the Distal Oblique Membrane and Distal Oblique Bundle to the Distal Radioulnar Joint Capsule and Septum of Extensor Tendon Sheath
Authors: Yuri Seu, Seong-Kyu Choi, Hyun Jin Park, Jin Seo Park, HongtaeKim, Mi-Sun Hur
Abstract:
The aim of this study was to clarify the attachments of the distal oblique membrane (DOM) and distal oblique bundle (DOB) of the interosseous membrane of the forearm. The distal oblique membrane was investigated in the 21 specimens of 11 Korean cadavers. The muscles in the forearms were removed to observe the DOB. The DOB was found in 13 of 21 specimens (61.9 %). The DOB was attached to the distal radioulnar joint capsule and the septum between the tendons of the extensor digiti minimi (EDM) and extensor carpi ulnaris (ECU) as well as the radius and ulna. In the cases that the DOB was absent, a part of the DOM extended to the distal radioulnar joint capsule and the septum between the tendons of the EDM and ECU, as well as the radius and ulna in all specimens (100%). The DOM, including the DOB, was arranged obliquely in the anteroposterior direction, whereas the intermediate part of the interosseous membrane was arranged in the same plane between the radius and ulna. The extension of the DOM and DOB to the wrist region may stabilize the distal radioulnar joint during supination and pronation. These data will be useful when performing reconstructive surgeries.Keywords: distal oblique membrane, distal oblique bundle, distal radioulnar joint capsule, interosseous membrane
Procedia PDF Downloads 919675 Cloud Computing: Major Issues and Solutions
Authors: S. Adhirai Subramaniyam, Paramjit Singh
Abstract:
This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security
Procedia PDF Downloads 3449674 Estimating Visitor’s Willingness to Pay for the Conservation Fund: Sustainable Financing Approach in Protected Areas in Ethiopia
Authors: Sintayehu Aynalem Aseres, Raminder Kaur Sira
Abstract:
Increasingly, protected areas have been confronting with inadequate conservation funds that make it tough to antithesis the continuing of annihilation. The problem is even grave in developing countries, where Protected Areas (Pas) are mainly government-administered. Subsequently, it needs a strong effort to toughen the self-financing capability of PAs by ripening alternative sources of sustainable financing for realizing the conservation goals, in particular, to save the remaining natural planet. This study, therefore, designed to estimate visitors’ willingness to pay (WTP) for the additional conservation fees using a contingent valuation method. The effect relationship between WTP and both socio-demographic and non-economic factors was scrutinized by binary logistic regression. The mean WTP of foreign visitors has estimated at US$ 7.4 and for that of domestic visitors at US$1, with annual aggregate revenue of US$29, 200. The WTP was strongly influenced by income, satisfaction, environmental concern and attitude. The study has policy implications for the conservationists and park authorities to estimate the non-use values of PAs for developing market-based conservation instruments.Keywords: conservation, ecotourism, sustainable financing, willingness to pay, protected areas, bale mountains national park
Procedia PDF Downloads 1619673 The Organizational Structure of the Special Purpose Vehicle in Public-Private Partnership Projects
Authors: Samuel Capintero
Abstract:
Public-private partnerships (PPP) arrangements have emerged all around the world as a response to infrastructure deficits and the need to refurbish existing infrastructure. During the last decade, the Spanish companies have dominated the international market of PPP projects in Latin America, Western Europe and North America, particularly in the transportation sector. Arguably, one of the most influential factors has been the organizational structure of the concessionaire implemented by the Spanish consortiums. The model followed by most Spanish groups has been a bundled model, where the concessionaire integrates the functions of concessionaire, construction and operator companies. This paper examines this model and explores how it has provided the Spanish companies with a comparative advantage in the international PPP market.Keywords: PPP, project management, concessionaire, concession, infrastructure, construction
Procedia PDF Downloads 3859672 Human-Elephant Conflict and Mitigation Measures in Buffer Zone of Bardia National Park, Nepal
Authors: Rabin Paudel, Dambar Bahadur Mahato, Prabin Poudel, Bijaya Neupane, Sakar Jha
Abstract:
Understanding Human-Elephant Conflict (HEC) is very important in countries like Nepal, where solutions to escalating conflicts are urgently required. However, most of the HEC mitigation measures implemented so far have been done on an ad hoc basis without the detailed understanding of nature and extent of the damage. This study aims to assess the current scenario of HEC in regards to crop and property damages by Wild Asian Elephant and people’s perception towards existing mitigating measures and elephant conservation in Buffer zone area of Bardia National Park. The methods used were a questionnaire survey (N= 178), key-informant interview (N= 18) and focal group discussions (N= 6). Descriptive statistics were used to determine the nature and extent of damage and to understand people’s perception towards HEC, its mitigation measures and elephant conservation. Chi-square test was applied to determine the significance of crop and property damages with respect to distance from the park boundary. Out of all types of damage, crop damage was found to be the highest (51%), followed by house damage (31%) and damage to stored grains (18%) with winter being the season with the greatest elephant damage. Among 178 respondents, the majority of them (82%) were positive towards elephant conservation despite the increment in HEC incidents as perceived by 88% of total respondents. Among the mitigation measures present, the most applied was electric fence (91%) followed by barbed wire fence (5%), reinforced concrete cement wall (3%) and gabion wall (1%). Most effective mitigation measures were reinforced concrete cement wall and gabion wall. To combat increasing crop damage, the insurance policy should be initiated. The efficiency of the mitigation measures should be timely monitored, and corrective measures should be applied as per the need.Keywords: crop and property damage, elephant conflict, Asiatic wild elephant, mitigation measures
Procedia PDF Downloads 1499671 Assessing the Current State of Software Engineering and Information Technology in Ghana
Authors: David Yartel
Abstract:
Drawing on the current state of software engineering and information technology in Ghana, the study documents its significant contribution to the development of Ghanaian industries. The study focuses on the application of modern trends in technology and the barriers faced in the area of software engineering and information technology. A thorough analysis of a dozen of interviews with stakeholders in software engineering and information technology via interviews reveals how modern trends in software engineering pose challenges to the industry in Ghana. Results show that to meet the expectation of modern software engineering and information technology trends, stakeholders must have skilled professionals, adequate infrastructure, and enhanced support for technology startups. Again, individuals should be encouraged to pursue a career in software engineering and information technology, as it has the propensity to increase the efficiency and effectiveness of work-related activities. This study recommends that stakeholders in software engineering and technology industries should invest enough in training more professionals by collaborating with international institutions well-versed in the area by organizing frequent training and seminars. The government should also provide funding opportunities for small businesses in the technology sector to drive creativity and development in order to bring about growth and development.Keywords: software engineering, information technology, Ghana, development
Procedia PDF Downloads 949670 Monitoring Public Attitudes Towards Tourism Valorisation of the Dinara Nature Park’s Dry Grasslands
Authors: Sven Ratković
Abstract:
The survey of public attitudes and knowledge was conducted as part of the Dinara back to LIFE project during June and July 2020. The aim of the research was to collect public opinions and knowledge on the topics of the biodiversity of Dinara, perception of tourist potential, sustainable development, and acceptance of the project. The research was conducted using the survey method in the cities of Sinj, Knin, Vrlika, and Trilj, and the municipalities of Hrvace, Otok, Kijevo, and Civljane, where a total of 404 people were surveyed. The respondents perceive the cultural and recreational potential of Dinara and recognize it as a potential for agriculture and tourism. According to respondents, the biological diversity of Dinara is most affected by fires and human activity. When it comes to nature protection, the majority of respondents don’t trust local self-government units and relevant ministries. The obtained results indicate the need for informing and educating the community, and they serve to adjust the project activities and better guide the touristic development of the project area. The examination will be repeated in the last project year (2023).Keywords: protected area tourism, Dinara Nature Park, dry grasslands, touristic infrastructure
Procedia PDF Downloads 989669 Patterns and Effects of International Trade in Technology: Firm-Level Evidence
Authors: Heeyong Noh, Seongryong Kang, Sungjoo Lee
Abstract:
As the world becomes increasingly interconnected, firms have tried to explore market opportunities not only in the domestic market but also abroad. In particular, transactions of intangible assets in the global market now take on great importance. Accordingly, technology transfer activities such as patent licensing, copyright transfer, or workforce trainings which are considered significant to leverage an organization’s internal capabilities, are occurring more frequently and briskly across the world than ever before. Though a number of studies have addressed the issues regarding technology transfer, most of them have focused on university-industry technology transfer. Of course, some have investigated international technology transfer phenomenon but used patent citations data as a proxy. In order to understand the phenomena more clearly, it would be necessary to collect and analyze data that can measure technology transfer activities between firms more directly. Therefore, this study aims to examine the patterns of international trade in technology by employing data about international technology in-licensing activities in Korean firms. We also investigate the effect of international technology in-licensing strategy on a firm’s innovation performance. The research findings are expected to help R&D managers understand how firms have absorbed technological knowledge from foreign firms in the form of licensing and further develop effective international collaboration strategies. In addition, significant implications can be offered for political decision-making regarding technology trade within increasing international interconnections.Keywords: international technology trade, technology trade effect, technology transfer, R&D managers
Procedia PDF Downloads 3789668 To Cloudify or Not to Cloudify
Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi
Abstract:
As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors
Procedia PDF Downloads 2979667 Exploring the Aesthetics of Sexual Violence in Therese Park’s ‘A Gift of the Emperor’: A Brief Study on Korean Comfort Women
Authors: Khushboo Verma
Abstract:
The use of rape as a weapon of war has been in existence for as early as the middle ages. Women, during the conflict, have been treated as the spoils of war, a reward for the conquering soldiers granted to them by their superiors which is, arguably, most often overlooked as part of the collateral damage that is unavoidable in conflict zones. Korean-born Therese Park’s first novel, A Gift of the Emperor (1997), describes one such atrocious incidence wherein she highlights the active role the Japanese military played in procuring and condoning trafficking of women, who were euphemistically referred to as ‘comfort women’, for prostitution during World War II. This paper thus aims to look at the remembering and reckonings of these women, which fueled a range of creative gestures in the artistic representations and knowledge production by Korean American artists and writers. The essay divides into three parts wherein first it tries to highlight the relationship of the state and the self in relation to the ‘comfort women’ as to who bears the onus of the exploitation of these women, or the responsibility for the redressal with the present-day notions of human rights as studied through Ueno Chizuko’s ‘The Politics of Memory: Nation, Individual and Self’ (1999). There are several narratological elements of the text that are of interest here which shall be viewed and analysed throughout the paper as well. The second part of the paper talks about the aesthetics of rape and sexual violence as represented or (mis)represented by Park in her novel as she attempts to give voice to the victim and retain her and her suffering as the central focus of the narrative. Finally, the third part of the novel explores as well as places the novel in the context of debates over the highly contested issue of ‘comfort women’ and the actual ‘comfort women’ survivors’ testimonies. For this purpose, the present study focuses on Dori Laub’s ‘Truth and Testimony: The Process and the Struggle’ (1991).Keywords: Korean comfort women, survivors’ testimonies, sexual slavery, aesthetics of sexual violence, horrible memories
Procedia PDF Downloads 1599666 An Assessment of the Factors Affecting Green Building Technology (GBT) Adoption
Authors: Nuruddeen Usman, Usman Mohammed Gidado
Abstract:
A construction and post construction activity in buildings contributes to environmental degradation, because of the generation of solid waste during construction to the production of carbon dioxide by the occupants during utilization. These problems were caused as a result of lack of adopting green building technology during and after construction. However, this study aims at conceptualizing the factors that are affecting the adoption of green building technology with a view to suggest better ways for its successful adoption in the construction industry through developing a green building technology model. Thus, the research findings show that: Economic, social, cultural, and technological progresses are the factors affecting Green Building Technology Adoption. Therefore, identifying these factors and developing the model might help in the successful adoption of green building technology.Keywords: green building technology, construction, post construction, degradation
Procedia PDF Downloads 6619665 Appropriate Technology: Revisiting the Movement in Developing Countries for Sustainability
Authors: Jayshree Patnaik, Bhaskar Bhowmick
Abstract:
The economic growth of any nation is steered and dependent on innovation in technology. It can be preferably argued that technology has enhanced the quality of life. Technology is linked both with an economic and a social structure. But there are some parts of the world or communities which are yet to reap the benefits of technological innovation. Business and organizations are now well equipped with cutting-edge innovations that improve the firm performance and provide them with a competitive edge, but rarely does it have a positive impact on any community which is weak and marginalized. In recent times, it is observed that communities are actively handling social or ecological issues with the help of indigenous technologies. Thus, "Appropriate Technology" comes into the discussion, which is quite prevalent in the rural third world. Appropriate technology grew as a movement in the mid-1970s during the energy crisis, but it lost its stance in the following years when people started it to describe it as an inferior technology or dead technology. Basically, there is no such technology which is inferior or sophisticated for a particular region. The relevance of appropriate technology lies in penetrating technology into a larger and weaker section of community where the “Bottom of the pyramid” can pay for technology if they find the price is affordable. This is a theoretical paper which primarily revolves around how appropriate technology has faded and again evolved in both developed and developing countries. The paper will try to focus on the various concepts, history and challenges faced by the appropriate technology over the years. Appropriate technology follows a documented approach but lags in overall design and diffusion. Diffusion of technology into the poorer sections of community remains unanswered until the present time. Appropriate technology is multi-disciplinary in nature; therefore, this openness allows having a varied working model for different problems. Appropriate technology is a friendly technology that seeks to improve the lives of people in a constraint environment by providing an affordable and sustainable solution. Appropriate technology needs to be defined in the era of modern technological advancement for sustainability.Keywords: appropriate technology, community, developing country, sustainability
Procedia PDF Downloads 2629664 Mode Choice for School Trip of Children’s Independence Mobility: A Case Study of School Proximity to Mass Transit Stations in Bangkok, Thailand
Authors: Phannarithisen Ong
Abstract:
Children's independent mobility for school trips promotes physical and mental well-being, reduces parental chauffeuring and traffic congestion, and boosts children's public confidence. However, in Thailand, despite a decade of rail mass transit development in Bangkok City, cars still queue to drop students at schools near transit stations. This worsens congestion, urging better independent mobility among children in mass transit regions. The high reliance on the private vehicle will influence the private mode in the children's adulthood. This research emphasizes mass transit use among high school students near transit systems. Through a questionnaire survey, quantitative and qualitative methods reveal key factors impacting school trip mode choice. Preliminary findings highlight children's independence as crucial. The socioeconomic, demographic, trip, and transportation traits explain private car use, even schools near mass transit stations. The outcomes of this study will shed light on urban strategic policies for improvement, advocacy, and encouragement of students using mass transit for school trips, which will help normalize the use of mass transit for such trips.Keywords: children's independence mobility, mode choice, school trips, TOD, extraneous variable, children's independency
Procedia PDF Downloads 1419663 Introduction of Knowledge Management in a Public Sector Organization in India
Authors: Siddharth Vashisth, Varun Mathur
Abstract:
This review provides an overview of the impact that implementation of various Knowledge Management (KM) strategies has had on the growth of a department in a Public Sector Company in India. In a regulated utility controlled by the government, the growth of an organization such as Hindustan Petroleum Corporation Limited (HPCL) had depended largely on the efficiencies of the systems and its people. However, subsequent to the de-regularization & to the entry of the private competition, the need for a ‘systematic templating’ of knowledge was recognized. This necessitated the introduction of Knowledge Management Centre (KMC). Projects & Pipelines Department (P&P) of HPCL introduced KMC that contributed significantly towards KM by adopting various strategies such as standardization, leveraging information system, competency enhancement, and improvements & innovations. These strategies gave both tangible as well as intangible benefits towards KM. Knowledge, technology & people are the three pillars that need to be catered for effective knowledge management in any organization. In HPCL, the initiative of KMC has served as an intermediary between these three major pillars as each activity of the strategy was centered on them and contributed significantly to their growth and up-gradation, ensuring overall growth of KM in the department.Keywords: knowledge, knowledge management, public sector organization, standardization, technology, people, skill, information system, innovation, competency, impact
Procedia PDF Downloads 4549662 Emotional Artificial Intelligence and the Right to Privacy
Authors: Emine Akar
Abstract:
The majority of privacy-related regulation has traditionally focused on concepts that are perceived to be well-understood or easily describable, such as certain categories of data and personal information or images. In the past century, such regulation appeared reasonably suitable for its purposes. However, technologies such as AI, combined with ever-increasing capabilities to collect, process, and store “big data”, not only require calibration of these traditional understandings but may require re-thinking of entire categories of privacy law. In the presentation, it will be explained, against the background of various emerging technologies under the umbrella term “emotional artificial intelligence”, why modern privacy law will need to embrace human emotions as potentially private subject matter. This argument can be made on a jurisprudential level, given that human emotions can plausibly be accommodated within the various concepts that are traditionally regarded as the underlying foundation of privacy protection, such as, for example, dignity, autonomy, and liberal values. However, the practical reasons for regarding human emotions as potentially private subject matter are perhaps more important (and very likely more convincing from the perspective of regulators). In that respect, it should be regarded as alarming that, according to most projections, the usefulness of emotional data to governments and, particularly, private companies will not only lead to radically increased processing and analysing of such data but, concerningly, to an exponential growth in the collection of such data. In light of this, it is also necessity to discuss options for how regulators could address this emerging threat.Keywords: AI, privacy law, data protection, big data
Procedia PDF Downloads 889661 The Promotion of AI Technology to Financial Development in China
Authors: Li Yong
Abstract:
Using the data of 135 financial institutions in China from 2018 to 2022, this paper deeply analyzes the underlying theoretical mechanism of artificial intelligence (AI) technology promoting financial development and examines the impact of AI technology on the digital transformation performance of financial enterprises. It is found that the level of AI technology has a significant positive impact on the development of finance. Compared with the impact on the expansion of financial scale, AI technology plays a greater role in improving the performance of financial institutions, reflecting the trend characteristics of the current AI technology to promote the evolution of financial structure. By investigating the intermediary transmission effects, we found that AI technology plays a positive role in promoting the performance of financial institutions by reducing operating costs and improving customer satisfaction, but its function in innovating financial products and mitigating financial risks is relatively limited. In addition, the promotion of AI technology in financial development has significant heterogeneity in terms of the type, scale, and attributes of financial institutions.Keywords: artificial intelligence technology, financial development, China, heterogeneity
Procedia PDF Downloads 659660 Exploring Students' Understanding about Bullying in Private Colleges in Rawalpindi, Pakistan
Authors: Alveena Khan
Abstract:
The objective of this research is to explore students’ understanding about bullying and different bullying types. Nowadays bullying is considered as an important social issue around the world because it has long lasting effects on students’ lives. Sometimes due to bullying students commit suicide, they lose confidence and become isolated. This research used qualitative research approach. In order to generate data, triangulation was considered for the verification and reliability of the generated data. Semi-structured interview, non-participant observation, and case studies were conducted. This research focused on five major private colleges and 20 students (both female and male) participated in Rawalpindi, Pakistan. The data generated included approximately 45 hours of total interviews. Thematic analysis was used for data analysis and followed grounded theory to generate themes. The findings of the research highlights that bullying does prevail in studied private colleges, mostly in the form of verbal and physical bullying. No specific gender difference was found in experiencing verbal and physical bullying. Furthermore, from students’ point of view, college administrators are responsible to deal with bullying. The researcher suggests that there must be a proper check and balance system and anti-bullying programs should be held in colleges to create a protective and healthy environment in which students do not face bullying.Keywords: bullying, college student, physical and verbal bullying, qualitative research
Procedia PDF Downloads 1599659 Design of Middleware for Mobile Group Control in Physical Proximity
Authors: Moon-Tak Oh, Kyung-Min Park, Tae-Eun Yoon, Hoon Choi, Chil-Woo Lee
Abstract:
This paper is about middle-ware which enables group-user applications on mobile devices in physical proximity to interact with other devices without intervention of a central server. Requirements of the middle-ware are identified from service usage scenarios, and the functional architecture of the middle-ware is specified. These requirements include group management, synchronization, and resource management. Group Management needs to provide various capabilities to such applications with respect to managing multiple users (e.g., creation of groups, discovery of group or individual users, member join/leave, election of a group manager and service-group association) using D2D communication technology. We designed the middle-ware for the above requirements on the Android platform.Keywords: group user, middleware, mobile service, physical proximity
Procedia PDF Downloads 5069658 The Role of Technology in Transforming the Finance, Banking, and Insurance Sectors
Authors: Farid Fahami
Abstract:
This article explores the transformative role of technology in the finance, banking, and insurance sectors. It examines key technological trends such as AI, blockchain, data analytics, and digital platforms and their impact on operations, customer experiences, and business models. The article highlights the benefits of technology adoption, including improved efficiency, cost reduction, enhanced customer experiences, and expanded financial inclusion. It also addresses challenges like cybersecurity, data privacy, and the need for upskilling. Real-world case studies demonstrate successful technology integration, and recommendations for stakeholders emphasize embracing innovation and collaboration. The article concludes by emphasizing the importance of technology in shaping the future of these sectors.Keywords: banking, finance, insurance, technology
Procedia PDF Downloads 729657 The Physics of Cold Spray Technology
Authors: Ionel Botef
Abstract:
Studies show that, for qualitative coatings, the knowledge of cold spray technology must focus on a variety of interdisciplinary fields and a framework for problem solving. The integrated disciplines include, but are not limited to, engineering, material sciences, and physics. Due to its importance, the purpose of this paper is to summarize the state of the art of this technology alongside its theoretical and experimental studies, and explore the role and impact of physics upon cold spraying technology.Keywords: surface engineering, cold spray, physics, modelling
Procedia PDF Downloads 531