Search results for: telecommunication providers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 881

Search results for: telecommunication providers

491 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 289
490 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 87
489 Library on the Cloud: Universalizing Libraries Based on Virtual Space

Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan

Abstract:

Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.

Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access

Procedia PDF Downloads 624
488 Distributed Manufacturing (DM)- Smart Units and Collaborative Processes

Authors: Hermann Kuehnle

Abstract:

Developments in ICT totally reshape manufacturing as machines, objects and equipment on the shop floors will be smart and online. Interactions with virtualizations and models of a manufacturing unit will appear exactly as interactions with the unit itself. These virtualizations may be driven by providers with novel ICT services on demand that might jeopardize even well established business models. Context aware equipment, autonomous orders, scalable machine capacity or networkable manufacturing unit will be the terminology to get familiar with in manufacturing and manufacturing management. Such newly appearing smart abilities with impact on network behavior, collaboration procedures and human resource development will make distributed manufacturing a preferred model to produce. Computing miniaturization and smart devices revolutionize manufacturing set ups, as virtualizations and atomization of resources unwrap novel manufacturing principles. Processes and resources obey novel specific laws and have strategic impact on manufacturing and major operational implications. Mechanisms from distributed manufacturing engaging interacting smart manufacturing units and decentralized planning and decision procedures already demonstrate important effects from this shift of focus towards collaboration and interoperability.

Keywords: autonomous unit, networkability, smart manufacturing unit, virtualization

Procedia PDF Downloads 504
487 Rural Women’s Skill Acquisition in the Processing of Locust Bean in Ipokia Local Government Area of Ogun State, Nigeria

Authors: A. A. Adekunle, A. M. Omoare, W. O. Oyediran

Abstract:

This study was carried out to assess rural women’s skill acquisition in the processing of locust bean in Ipokia Local Government Area of Ogun State, Nigeria. Simple random sampling technique was used to select 90 women locust bean processors for this study. Data were analyzed with descriptive statistics and Pearson Product Moment Correlation. The result showed that the mean age of respondents was 40.72 years. Most (70.00%) of the respondents were married. The mean processing experience was 8.63 years. 93.30% of the respondents relied on information from fellow locust beans processors and friends. All (100%) the respondents did not acquire improved processing skill through trainings and workshops. It can be concluded that the rural women’s skill acquisition on modernized processing techniques was generally low. It is hereby recommend that the rural women processors should be trained by extension service providers through series of workshops and seminars on improved processing techniques.

Keywords: locust bean, processing, skill acquisition, rural women

Procedia PDF Downloads 444
486 An Agent-Based Modelling Simulation Approach to Calculate Processing Delay of GEO Satellite Payload

Authors: V. Vicente E. Mujica, Gustavo Gonzalez

Abstract:

The global coverage of broadband multimedia and internet-based services in terrestrial-satellite networks demand particular interests for satellite providers in order to enhance services with low latencies and high signal quality to diverse users. In particular, the delay of on-board processing is an inherent source of latency in a satellite communication that sometimes is discarded for the end-to-end delay of the satellite link. The frame work for this paper includes modelling of an on-orbit satellite payload using an agent model that can reproduce the properties of processing delays. In essence, a comparison of different spatial interpolation methods is carried out to evaluate physical data obtained by an GEO satellite in order to define a discretization function for determining that delay. Furthermore, the performance of the proposed agent and the development of a delay discretization function are together validated by simulating an hybrid satellite and terrestrial network. Simulation results show high accuracy according to the characteristics of initial data points of processing delay for Ku bands.

Keywords: terrestrial-satellite networks, latency, on-orbit satellite payload, simulation

Procedia PDF Downloads 247
485 Barriers and Drivers Towards the Use of Childhood Vaccination Services by Undocumented Migrant Caregivers in Sabah, Malaysia: A Qualitative Analysis

Authors: Michal Christina Steven, Mohd. Yusof Hj Ibrahim, Haryati Abdul Karim, Prabakaran Dhanaraj, Kelly Alexius Mansin

Abstract:

After 27 years, Malaysia reported polio cases in 2019 involving the children of the undocumented migrants living in Sabah. These undocumented migrants present a significant challenge in achieving the elimination of vaccine-preventable diseases (VPD). Due to the recent polio outbreak among the undocumented migrant children in Sabah, an in-depth interview was conducted among the caregivers of undocumented migrant children to identify the barriers and drivers towards vaccinating their children. Financial barriers, legal citizenship status, language barrier, the COVID-19 pandemic, and physical barriers have been the barriers to access vaccination services by undocumented migrants. Five significant drivers for undocumented migrants to vaccinate their children are social influence, fear of disease, parental trust in healthcare providers, good support, and vaccine availability. Necessary action should be taken immediately to address the problems of vaccinating the children of undocumented migrants to prevent the re-emergence of VPD.

Keywords: Malaysia, polio, Sabah, undocumented migrants

Procedia PDF Downloads 135
484 The Guide Presentation: The Grand Palace

Authors: Nuchanat Handumrongkul Danaya Darnsawasdi, Anantachai Aeka

Abstract:

To be a model for performing oral presentations by the tour guides, this research has been conducted. In order to develop French language teaching and studying for tourism, its purpose is to analyze the content used by tour guides. The study employed audio recordings of these presentations as an interview method in authentic situations, having four guides as respondents and information providers. The data was analyzed through content analysis. The results found that the tour guides described eight important items by giving more importance to details at Wat Phra Kaew or the Temple of the Emerald Buddha than at the palaces. They preferred the buildings upon the upper terrace, Buddhist cosmology, the decoration techniques, the royal chapel, the mural paintings, Thai offerings to Buddha images, palaces with architectural features and functions including royal ceremonies and others. This information represents the Thai characteristics of each building and other related content. The findings were used as a manual for guides for how to describe a tourist attraction, especially the temple and other related cultural topics of interest.

Keywords: guide, guide presentation, Grand Palace, Buddhist cosmology

Procedia PDF Downloads 483
483 Efl Learner’s Perceptions of Online Learning and Motivation

Authors: Sonia Achour

Abstract:

Owing to the outbreak of the Corona pandemic, the shift to online learning took place abruptly. Neither practitioners nor learners were prepared for this sudden move. Higher education providers were compelled to implement online courses on a very short notice. Sultan Qaboos University is one among these. The question of motivation attracted a great number of educators. A case study was carried out so as to shed some lights on students' perceptions towards virtual learning and how it influenced their motivation to learning. The data was collected by means of semi-structured interviews of a focused group of 16 students along with classroom observation over a 12 week period. Both interviews and class observation revealed that there was a general negative feeling about the online teaching platform and its impact on the learners' motivation. Several factors were identified, namely the absence of interaction, social isolation, inconsistency of instructional knowledge, unfamiliarity with the new learning environment, IT illiteracy, and teacher development. The researcher aims at demonstrating the effect of virtual classrooms on students' motivation to acquire L2. The findings may be used to inform future decisions about courses, curriculum design. And teacher development

Keywords: online learning, motivation, EFL context, virtual setting

Procedia PDF Downloads 73
482 Antibiotic Prophylaxis Habits in Oral Implant Surgery in the Netherlands: A Cross-Sectional Survey

Authors: Fabio Rodriguez Sanchez, Josef Bruers, Iciar Arteagoitia, Carlos Rodriguez Andres

Abstract:

Background: Oral implants are a routine treatment to replace lost teeth. Although they have a high rate of success, implant failures do occur. Perioperative antibiotics have been suggested to prevent postoperative infections and dental implant failures, but they remain a controversial treatment among healthy patients. The objective of this study was to determine whether antibiotic prophylaxis is a common treatment in the Netherlands among general dentists, maxillofacial-surgeons, periodontists and implantologists in conjunction with oral implant surgery among healthy patients and to assess the nature of antibiotics prescriptions in order to evaluate whether any consensus has been reached and the current recommendations are being followed. Methodology: Observational cross-sectional study based on a web-survey reported according to the Strengthening the Reporting of Observational studies in Epidemiology (STROBE) guidelines. A validated questionnaire, developed by Deeb et al. (2015), was translated and slightly adjusted to circumstances in the Netherlands. It was used with the explicit permission of the authors. This questionnaire contained both close-ended and some open-ended questions in relation to the following topics: demographics, qualification, antibiotic type, prescription-duration and dosage. An email was sent February 2018 to a sample of 600 general dentists and all 302 oral implantologists, periodontists and maxillofacial surgeons who were recognized by the Dutch Association of Oral Implantology (NVOI) as oral health care providers placing oral implants. The email included a brief introduction about the study objectives and a link to the web questionnaire, which could be filled in anonymously. Overall, 902 questionnaires were sent. However, 29 questionnaires were not correctly received due to an incorrect email address. So a total number of 873 professionals were reached. Collected data were analyzed using SPSS (IBM Corp., released 2012, Armonk, NY). Results: The questionnaire was sent back by a total number of 218 participants (response rate=24.2%), 45 female (20.8%) and 171 male (79.2%). Two respondents were excluded from the study group because they were not currently working as oral health providers. Overall 151 (69.9%) placed oral implants on regular basis. Approximately 79 (52.7%) of these participants prescribed antibiotics only in determined situations, 66 (44.0%) prescribed antibiotics always and 5 dentists (3.3%) did not prescribe antibiotics at all when placing oral implants. Overall, 83 participants who prescribed antibiotics, did so both pre- and postoperatively (58.5%), 12 exclusively postoperative (8.5%), and 47 followed an exclusive preoperative regime (33.1%). A single dose of 2,000 mg amoxicillin orally 1-hour prior treatment was the most prescribed preoperative regimen. The most frequent prescribed postoperative regimen was 500 mg amoxicillin three times daily for 7 days after surgery. On average, oral health professionals prescribed 6,923 mg antibiotics in conjunction with oral implant surgery, varying from 500 to 14,600 mg. Conclusions: Antibiotic prophylaxis in conjunction with oral implant surgery is prescribed in the Netherlands on a rather large scale. Dutch professionals might prescribe antibiotics more cautiously than in other countries and there seems to be a lower range on the different antibiotic types and regimens being prescribed. Anyway, recommendations based on last-published evidence are frequently not being followed.

Keywords: clinical decision making, infection control, antibiotic prophylaxis, dental implants

Procedia PDF Downloads 122
481 The Evaluation of a Mobile Proximity Payment Application through Its Legitimacy and Social Acceptability

Authors: Intissar Abbes, Yousra Hallem, Jean-michel Sahut

Abstract:

The purpose of this research is to explore the legitimacy of a proximity mobile payment (PMP) system by taking into account the social aspects related to its use (social acceptability). We have chosen to focus on the acceptability process of a PMP application (‘Flashplay’) from the first testing to the adoption in a service context. This PMP solution is a pilot program developed as part of a global strategy of disintermediation in various sectors (retail, catering, and entertainment). This case is particularly interesting for two reasons: the context and environment are suitable to the adoption of innovation in payment like other African countries and the possibility to study different stages of the social acceptability process of that PMP system. The neo-institutional theory is mobilized to identify the three pillars of legitimacy: cognitive, normative and regulatory. A longitudinal qualitative study was conducted with 27 customers using the PMP service. Results highlighted the importance of the consumption system and the service provider as institutions. Recommendations are thus proposed to PMP service providers in order to rethink the design and implementation strategies of their PMP system to ensure their adoption and promote the institutionalization of this type of consumption practice.

Keywords: legitimacy, payment, acceptability, mobility

Procedia PDF Downloads 158
480 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 127
479 Correlation of Empathy with Job Satisfaction and Stress of Social Workers

Authors: Theodosios Paralikas, Evangelia Kotrotsiou, Mairy Gouva, Manolis Mentis, Stiliani Stavrotheodorou, Stiliani Kotrotsiou, Maria Malliarou

Abstract:

There is a big discussion in the international literature on empathy, job satisfaction and job occupational among various of disciplines, including social workers. Νevertheless these parameters have not been specifically studied in the Greek territory. This paper aims to study empathy of social workers, to produce results related to whether empathy is influenced by demographic factors such as gender, age, marital status, level of education and study their perceived stress levels and also the satisfaction they derive from their work. For the first time, an attempt is made to link the empathy of these professionals to their job satisfaction and their anxiety. The sample of this survey consists of 165 social workers working on providers of public and private social services. The results showed that social workers have high levels of empathy contrary to the perceived stress levels which were low to moderate. Regarding the field of the job satisfaction, the survey showed that social workers are very satisfied with their workpiece and workplace. The survey shows no significant relationship between empathy and demographic factors, but there is a significant relationship between empathy and the workpiece/job satisfaction and the feeling of success.

Keywords: empathy, stress, job satisfaction, social workers

Procedia PDF Downloads 144
478 The Impact of System Cascading Collapse and Transmission Line Outages to the Transfer Capability Assessment

Authors: Nur Ashida Salim, Muhammad Murtadha Othman, Ismail Musirin, Mohd Salleh Serwan

Abstract:

Uncertainty of system operating conditions is one of the causative reasons which may render to the instability of a transmission system. This will encumber the performance of transmission system to efficiently transmit the electrical power between areas. For that reason, accurate assessment of Transmission Reliability Margin (TRM) is essential in order to ensure effective power transfer between areas during the occurrence of system uncertainties. The power transfer is also called as the Available Transfer Capability (ATC) in which it is the information required by the utilities and marketers to instigate selling and buying the electric energy. This paper proposes a computationally effective approach to estimate TRM and ATC by considering the uncertainties of system cascading collapse and transmission line outages which is identified as the main reasons in power system instability. In accordance to the results that have been obtained, the proposed method is essential for the transmission providers which could help the power marketers and planning sectors in the operation and reserving transmission services based on the ATC calculated.

Keywords: system cascading collapse, transmission line outages, transmission reliability margin, available transfer capability

Procedia PDF Downloads 409
477 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 91
476 The Role of Acoustical Design within Architectural Design in the Early Design Phase

Authors: O. Wright, N. Perkins, M. Donn, M. Halstead

Abstract:

This research responded to anecdotal evidence that suggested inefficiencies within the Architect and Acoustician relationship may lead to ineffective acoustic design decisions.  The acoustician spoken to believed that he was approached too late in the design phase. The approached architect valued acoustical qualities, yet, struggled to interpret common measurement parameters. The preliminary investigation of these opinions indicated a gap in the current New Zealand Architectural discourse and currently informs the creation of a 2016 Master of Architecture (Prof) thesis research. Little meaningful information about acoustic intervention in the early design phase could be found from past literature. In the information that was sourced, authors focus on software as an incorporation tool without investigating why the flaws in the relationship originally exist. To further explore this relationship, a survey was designed. It underwent three phases to ensure its consistency, and was delivered to a group of 51 acousticians from one international Acoustics company. The results were then separated between New Zealand and off-shore to identify trends. The survey results suggest that 75% of acousticians meet the architect less than 5 times per project. Instead of regular contact, a mediated method is adopted though a mix of telecommunication and written reports. Acousticians tend to be introduced later into New Zealand building project than the corresponding off-shore building. This delay corresponds to an increase in remedial action for each of the building types in the survey except Auditoria and Office Buildings. 31 participants have had their specifications challenged by an architect. Furthermore, 71% of the acousticians believe that architects do not have the knowledge to understand why the acoustic specifications are in place. The issues raised in this investigation align to the colloquial evidence expressed by the two consultants. It identifies a larger gap in the industry were acoustics is remedially treated rather than identified as a possible design driver. Further research through design is suggested to understand the role of acoustics within architectural design and potential tools for its inclusion during, not after, the design process.

Keywords: architectural acoustics, early-design, interdisciplinary communication, remedial response

Procedia PDF Downloads 230
475 Analysis of the Diffusion Behavior of an Information and Communication Technology Platform for City Logistics

Authors: Giulio Mangano, Alberto De Marco, Giovanni Zenezini

Abstract:

The concept of City Logistics (CL) has emerged to improve the impacts of last mile freight distribution in urban areas. In this paper, a System Dynamics (SD) model exploring the dynamics of the diffusion of a ICT platform for CL management across different populations is proposed. For the development of the model two sources have been used. On the one hand, the major diffusion variables and feedback loops are derived from a literature review of existing diffusion models. On the other hand, the parameters are represented by the value propositions delivered by the platform as a response to some of the users’ needs. To extract the most important value propositions the Business Model Canvas approach has been used. Such approach in fact focuses on understanding how a company can create value for her target customers. These variables and parameters are thus translated into a SD diffusion model with three different populations namely municipalities, logistics service providers, and own account carriers. Results show that, the three populations under analysis fully adopt the platform within the simulation time frame, highlighting a strong demand by different stakeholders for CL projects aiming at carrying out more efficient urban logistics operations.

Keywords: city logistics, simulation, system dynamics, business model

Procedia PDF Downloads 249
474 Personnel Training of Automotive Manufacturers in Virtual Reality

Authors: Mirza Ahsan Baig, Paul Evans

Abstract:

Due to the high demand for automobiles, manufacturers have to run their production lines non-stop for long periods. At such a scale, unplanned downtime could cost up to $50 billion annually. Improper training of new hires could lead to safety issues causing unplanned downtimes. The project developed a virtual reality simulation that could train personnel for key operations on an automobile manufacturing floor, reducing the risk of unplanned downtime while eliminating any disruption (due to training) on the assembly line. An automation firm sponsored it to explore the possibilities the likes of Jaguar and BMW are yet to achieve! The project was inspired by Bentley, the only company that succeeded in simulation training scenarios within virtual space. The project aims to inspire other significant firms to do the same. It was increasing employee safety, eliminating downtimes, and improving efficiency. The developed prototype uncovered various limitations within existing simulation providers and was able to simulate state-of-the-art training scenarios. It also explored the possibility of a multiuser interface and resolved complex issues such as lack of movement space within the training area.

Keywords: virtual reality, scenario training, limited movement, multiuser

Procedia PDF Downloads 59
473 Service Blueprinting: A New Application for Evaluating Service Provision in the Hospice Sector

Authors: L. Sudbury-Riley, P. Hunter-Jones, L. Menzies, M. Pyrah, H. Knight

Abstract:

Just as manufacturing firms aim for zero defects, service providers strive to avoid service failures where customer expectations are not met. However, because services comprise unique human interactions, service failures are almost inevitable. Consequently, firms focus on service recovery strategies to fix problems and retain their customers for the future. Because a hospice offers care to terminally ill patients, it may not get the opportunity to correct a service failure. This situation makes the identification of what hospice users really need and want, and to ascertain perceptions of the hospice’s service delivery from the user’s perspective, even more important than for other service providers. A well-documented and fundamental barrier to improving end-of-life care is a lack of service quality measurement tools that capture the experiences of user’s from their own perspective. In palliative care, many quantitative measures are used and these focus on issues such as how quickly patients are assessed, whether they receive information leaflets, whether a discussion about their emotional needs is documented, and so on. Consequently, quality of service from the user’s perspective is overlooked. The current study was designed to overcome these limitations by adapting service blueprinting - never before used in the hospice sector - in order to undertake a ‘deep-dive’ to examine the impact of hospice services upon different users. Service blueprinting is a customer-focused approach for service innovation and improvement, where the ‘onstage’ visible service user and provider interactions must be supported by the ‘backstage’ employee actions and support processes. The study was conducted in conjunction with East Cheshire Hospice in England. The Hospice provides specialist palliative care for patients with progressive life-limiting illnesses, offering services to patients, carers and families via inpatient and outpatient units. Using service blueprinting to identify every service touchpoint, in-depth qualitative interviews with 38 in-patients, outpatients, visitors and bereaved families enabled a ‘deep-dive’ to uncover perceptions of the whole service experience among these diverse users. Interviews were recorded and transcribed, and thematic analysis of over 104,000 words of data revealed many excellent aspects of Hospice service. Staff frequently exceed people’s expectations. Striking gratifying comparisons to hospitals emerged. The Hospice makes people feel safe. Nevertheless, the technique uncovered many areas for improvement, including serendipity of referrals processes, the need for better communications with external agencies, improvements amid the daunting arrival and admissions process, a desperate need for more depression counselling, clarity of communication pertaining to actual end of life, and shortcomings in systems dealing with bereaved families. The study reveals that the adapted service blueprinting tool has major advantages of alternative quantitative evaluation techniques, including uncovering the complex nature of service user’s experiences in health-care service systems, highlighting more fully the interconnected configurations within the system and making greater sense of the impact of the service upon different service users. Unlike other tools, this in-depth examination reveals areas for improvement, many of which have already been implemented by the Hospice. The technique has potential to improve experiences of palliative and end-of-life care among patients and their families.

Keywords: hospices, end-of-life-care, service blueprinting, service delivery

Procedia PDF Downloads 175
472 A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.

Keywords: challenges, IPTV service, requirements, software defined networking (SDN)

Procedia PDF Downloads 248
471 A Simulation Study on the Applicability of Overbooking Strategies in Inland Container Transport

Authors: S. Fazi, B. Behdani

Abstract:

The inland transportation of maritime containers entails the use of different modalities whose capacity is typically booked in advance. Containers may miss their scheduled departure time at a terminal for several reasons, such as delays, change of transport modes, multiple bookings pending. In those cases, it may be difficult for transport service providers to find last minute containers to fill the vacant capacity. Similarly to other industries, overbooking could potentially limit these drawbacks at the cost of a lower service level in case of actual excess of capacity in overbooked rides. However, the presence of multiple modalities may provide the required flexibility in rescheduling and limit the dissatisfaction of the shippers in case of containers in overbooking. This flexibility is known with the term 'synchromodality'. In this paper, we evaluate via discrete event simulation the application of overbooking. Results show that in certain conditions overbooking can significantly increase profit and utilization of high-capacity means of transport, such as barges and trains. On the other hand, in case of high penalty costs and limited no-show, overbooking may lead to an excessive use of expensive trucks.

Keywords: discrete event simulation, flexibility, inland shipping, multimodality, overbooking

Procedia PDF Downloads 108
470 Hierarchical Operation Strategies for Grid Connected Building Microgrid with Energy Storage and Photovoltatic Source

Authors: Seon-Ho Yoon, Jin-Young Choi, Dong-Jun Won

Abstract:

This paper presents hierarchical operation strategies which are minimizing operation error between day ahead operation plan and real time operation. Operating power systems between centralized and decentralized approaches can be represented as hierarchical control scheme, featured as primary control, secondary control and tertiary control. Primary control is known as local control, featuring fast response. Secondary control is referred to as microgrid Energy Management System (EMS). Tertiary control is responsible of coordinating the operations of multi-microgrids. In this paper, we formulated 3 stage microgrid operation strategies which are similar to hierarchical control scheme. First stage is to set a day ahead scheduled output power of Battery Energy Storage System (BESS) which is only controllable source in microgrid and it is optimized to minimize cost of exchanged power with main grid using Particle Swarm Optimization (PSO) method. Second stage is to control the active and reactive power of BESS to be operated in day ahead scheduled plan in case that State of Charge (SOC) error occurs between real time and scheduled plan. The third is rescheduling the system when the predicted error is over the limited value. The first stage can be compared with the secondary control in that it adjusts the active power. The second stage is comparable to the primary control in that it controls the error in local manner. The third stage is compared with the secondary control in that it manages power balancing. The proposed strategies will be applied to one of the buildings in Electronics and Telecommunication Research Institute (ETRI). The building microgrid is composed of Photovoltaic (PV) generation, BESS and load and it will be interconnected with the main grid. Main purpose of that is minimizing operation cost and to be operated in scheduled plan. Simulation results support validation of proposed strategies.

Keywords: Battery Energy Storage System (BESS), Energy Management System (EMS), Microgrid (MG), Particle Swarm Optimization (PSO)

Procedia PDF Downloads 232
469 Involvement in Health Policy and Political Efficacy among Hospital Nurses in Jordan: A Descriptive Survey

Authors: Raeda F. Abualrub, Amani Abdulnabi

Abstract:

Aim: The aims of this study were to (a) examine the levels of nurses' political efficacy and involvement in health policy; and (b) explore the relationships between political efficacy, involvement in health policy, and participants’ background variables. Background: Nurses as citizens and health care providers have the right to express their opinions and beliefs in regard to issues that are concerned with the health care system or the public health domain. Methods: A descriptive, cross-sectional design using was utilized. A self-administered questionnaire (Political Efficacy Scale & Involvement in Health Policy Scale) was completed by a convenience sample of 302 nurses. Results: The results of this study showed low levels of involvement in health policy and political efficacy and a positive weak correlation between political efficacy and involvement in health policy. The perceived level of political efficacy was associated positively with nurses’ age and experience. Conclusions: Nurse administrators and managers may empower, support, and encourage nurses to enhance their involvement in health policy. Implications for Nursing Management: The findings have implications for nursing leaders and administrators to design appropriate strategies to enhance nurses’ involvement in health policy development.

Keywords: health policy, Jordan, nurses, political efficacy

Procedia PDF Downloads 71
468 Impact of Increasing Distributed Solar PV Systems on Distribution Networks in South Africa

Authors: Aradhna Pandarum

Abstract:

South Africa is experiencing an exponential growth of distributed solar PV installations. This is due to various factors with the predominant one being increasing electricity tariffs along with decreasing installation costs, resulting in attractive business cases to some end-users. Despite there being a variety of economic and environmental advantages associated with the installation of PV, their potential impact on distribution grids has yet to be thoroughly investigated. This is especially true since the locations of these units cannot be controlled by Network Service Providers (NSPs) and their output power is stochastic and non-dispatchable. This report details two case studies that were completed to determine the possible voltage and technical losses impact of increasing PV penetration in the Northern Cape of South Africa. Some major impacts considered for the simulations were ramping of PV generation due to intermittency caused by moving clouds, the size and overall hosting capacity and the location of the systems. The main finding is that the technical impact is different on a constrained feeder vs a non-constrained feeder. The acceptable PV penetration level is much lower for a constrained feeder than a non-constrained feeder, depending on where the systems are located.

Keywords: medium voltage networks, power system losses, power system voltage, solar photovoltaic

Procedia PDF Downloads 129
467 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 254
466 Good Banks, Bad Banks, and Public Scrutiny: The Determinants of Corporate Social Responsibility in Times of Financial Volatility

Authors: A. W. Chalmers, O. M. van den Broek

Abstract:

This article examines the relationship between the global financial crisis and corporate social responsibility activities of financial services firms. It challenges the general consensus in existing studies that firms, when faced with economic hardship, tend to jettison CSR commitments. Instead, and building on recent insights into the institutional determinants of CSR, it is argued that firms are constrained in their ability to abandon CSR by the extent to which they are subject to intense public scrutiny by regulators and the news media. This argument is tested in the context of the European sovereign debt crisis drawing on a unique dataset of 170 firms in 15 different countries over a six-year period. Controlling for a battery of alternative explanations and comparing financial service providers to firms operating in other economic sectors, results indicate considerable evidence supporting the main argument. Rather than abandoning CSR during times of economic hardship, financial industry firms ramp up their CSR commitments in order to manage their public image and foster public trust in light of intense public scrutiny.

Keywords: corporate social responsibility (CSR), public scrutiny, global financial crisis, financial services firms

Procedia PDF Downloads 286
465 Studying the Influence of Logistics on Organizational Performance through a Supply Chain Strategy: Case Study in Goldiran Electronics Co.

Authors: Ali Hajiesmaeili, Mehdi Rahimi, Ehsan Jaberi, Amir Abbas Hosseini

Abstract:

The purpose of this study is investigating the influences of logistics performance on organizational performance including both marketing & financial aspects, and showing the financial impacts of selecting the right marketing and logistics priorities in line with their supply chain type, and also giving the practitioners an advance identification of their priorities and participation types of supply chain, and the best combination of their strategies and resources in this regard. We made use of the original model’s questionnaire to gather all expert’s data and also SPSS and AMOS Ver.22 to analyze the gathered data. CFA method was also used to test whether a relationship between observed variables and their underlying latent constructs exists. Supply chain strategy implementation leads to logistics performance improvement, and marketing performance will be affected as well. Logistics service providers should focus on enhancement of supply chain performance, since logistics performance has been considered as a basis of evaluation of supply chain management strategy. Consequently, performance of the organization will be enhanced. This case is the first research made in Iran that analyzes the relationship between Logistics & Organizational performance in Home Appliances and Home Entertainment companies.

Keywords: logistics, organizational, performance, supply chain, strategy

Procedia PDF Downloads 626
464 Model Development of Health Tourism at Ban Nam Chieo Community, Laem Ngop, Trat Province

Authors: Pradapet Krutchangthong, Jirawat Sudsawart

Abstract:

This research aims to study the health tourism administration and factors related to health tourism promotion at Ban Nam Chieo Community, Laem Ngop, Trat Province. The sample in this research is 361 tourists who use the service and Ban Nam Chieo Community residents who provide the service. Sampling was done from a population size of 3,780 using Taro Yamane’s formula. The tools used in the study were questionnaires and interviews. The statistics used in this research are percentage, mean and standard deviation. The result of Model Development of Health Tourism at Ban Nam Chieo Community, Laem Ngop , Trat Province shows that most of them are female with bachelor degree. They are government officers with an average income between 16,001-20,000 Baht. Suggested health system activities for health tourism development are: 1) health massage, 2) herbal compress, 3) exercise in the water by walking on shell. Meanwhile, factors related to health tourism promotion at Ban Nam Chieo Community, Laem Ngop, Trat Province are: 1) understanding the context of the community and service providers, 2) cooperation from related government and private sectors.

Keywords: health tourism, health system activities, promotion, administration

Procedia PDF Downloads 367
463 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 340
462 The Potential Roles of Digital Technologies in Developing Children's Artistic Ability and Promoting Creative Activity in Children Aged

Authors: Aber Aboalgasm, Rupert Ward, Ruth Taylor, Jonathan Glazzard

Abstract:

Teaching art by digital means is a big challenge for the majority of teachers of art and artistic design courses in primary education schools. These courses can clearly identify relationships between art, technology, and creativity in the classroom .The aim of this article is to present a modern way of teaching art, using digital tools in the art classroom in order to improve creative ability in pupils aged between 9 and 11 years; it also presents a conceptual model for creativity based on digital art. The model could be useful for pupils interested in learning drawing and using an e-drawing package, and for teachers who are interested in teaching their students modern digital art, and improving children’s creativity. This model is designed to show the strategy of teaching art through technology, in order for children to learn how to be creative. This will also help education providers to make suitable choices about which technological approaches they should choose to teach students and enhance their creative ability. It is also expected that use of this model will help to develop social interactive qualities that may improve intellectual ability.

Keywords: digital tools, motivation, creative activity, education

Procedia PDF Downloads 316