Search results for: financial services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6406

Search results for: financial services

2206 Mental Health Literacy in the Arabic Community

Authors: Yamam Abuzinadah

Abstract:

Mental health literacy has become a very influential topic around the world due to the increase of mental health issues that have been reported through national research and surveys. Mental health literacy refers to the awareness, attitudes, beliefs, knowledge and skills when dealing with mental illness. This research explores mental health literacy in the Arabic and the ways culture informs perceptions of mental health in general. Also, the impact of mental health literacy on: help-seeking attitudes, relationships and community interactions. The outcomes of this research will contribute to raising mental health awareness among the Arabic community, develop and enhance mental health service provision and explore new ideas in regards to elevating mental health literacy in the Arabic community. This research aims to explore attitudes, beliefs, perspective, values and perceptions toward mental health in general among the Arabic community. It will also aim to highlight the factors contributing to theses beliefs, perspective, value and perception and accordingly the role these factors play in regards to awareness, services access, recovery and care provided from the family and the community. This thesis will aim to reflect a detailed theorisation and exploration of: (1) The impact of cultural factors on mental health literacy ie. attitudes, beliefs, knowledge and skills. (2) The ways culture informs perceptions of mental health literacy. (3) The impact of mental health literacy on: help-seeking behaviors, and relationships and community interactions.

Keywords: Arab, mental health, literacy, awareness

Procedia PDF Downloads 432
2205 Availability, Accessibility and Utilization of Information and Communication Technology in Teaching and Learning Islamic Studies in Colleges of Education, North-Eastern, Nigeria

Authors: Bello Ali

Abstract:

The use of Information and Communication Technology (ICT) in tertiary institutions by lecturers and students has become a necessity for the enhancement of quality teaching and learning. This study examined availability, accessibility and utilization of ICT in Teaching-Learning Islamic Studies in Colleges of Education, North-East, Nigeria. The study adopted multi-stage sampling technique, in which, five out of the eleven Colleges of Education (both Federal and State owned) were purposively selected for the study. Primary data was drawn from the respondents by the use of questionnaire, interviews and observations. The results of the study, generally, indicate that the availability and accessibility to ICT facilities in Colleges of Education in North-East, Nigeria, especially in teaching/learning delivery of Islamic studies were relatively inadequate and rare to lecturers and students. The study further reveals that the respondents’ level of utilization of ICT is low and only few computer packages and internet services were involved in the ICT utilization, which is yet to reach the real expected situation of the globalization and advancement in the application of ICT if compared to other parts of the world, as far as the teaching and learning of Islamic studies is concerned. Observations and conclusion were drawn from the findings and finally, recommendations on how to improve on ICT availability, accessibility and utilization in teaching/ learning were suggested.

Keywords: accessibility, availability, college of education, ICT, Islamic studies, learning, North-East, teaching, utilization

Procedia PDF Downloads 364
2204 The Perceptions of Students in Tourism and Hospitality in Relation to the Pursuit of Higher Degrees: A Case of Walter Sisulu University

Authors: Adelaide Rethabile Motshabi Pitso-Mbili

Abstract:

Higher education institutions (HEIs) are under pressure in producing PhD graduates so that they can position themselves higher in terms of rankings. However, hospitality and tourism higher degree enrolment numbers are very low within South African universities. Furthermore, hospitality and tourism students choose these fields of study because they want to travel, be social, and have fun. Students in higher education are anxious about their future after studies as they are particularly worried about the job conditions in the hospitality and tourism sector, the remuneration, and the status perceptions of many jobs in the sector. Hence, there is a need for a continuous increase in the level of education with the formation of professional aptitudes and personnel quality. In order to understand the reasons for low enrolments, this study aims to explore the perceptions of the final year in tourism and hospitality diploma students towards enrolling for higher degree qualifications after their graduation. This paper utilised a quantitative research method, and data was gathered through questionnaires. In addition, the Linkert scale design was used for questionnaires. The questionnaires were distributed to 137 hospitality and tourism students who are on their exit level at Walter Sisulu University. SPSS was used to analyse data. The findings revealed that students do not wish to continue studying for higher degrees as they believe higher degrees are not important for the industry. Furthermore, families already have financial expectations as they think one qualification is enough. In addition, some students mentioned that they would love to study further, but lack of funding is a problem since NSFAS only funds the first qualification. Thus, it is recommended that students are made aware of the benefits and opportunities available after obtaining higher degrees.

Keywords: hospitality and tourism education, higher degrees, higher education, student’s perceptions, hospitality and tourism sector

Procedia PDF Downloads 117
2203 Approach for Demonstrating Reliability Targets for Rail Transport during Low Mileage Accumulation in the Field: Methodology and Case Study

Authors: Nipun Manirajan, Heeralal Gargama, Sushil Guhe, Manoj Prabhakaran

Abstract:

In railway industry, train sets are designed based on contractual requirements (mission profile), where reliability targets are measured in terms of mean distance between failures (MDBF). However, during the beginning of revenue services, trains do not achieve the designed mission profile distance (mileage) within the timeframe due to infrastructure constraints, scarcity of commuters or other operational challenges thereby not respecting the original design inputs. Since trains do not run sufficiently and do not achieve the designed mileage within the specified time, car builder has a risk of not achieving the contractual MDBF target. This paper proposes a constant failure rate based model to deal with the situations where mileage accumulation is not a part of the design mission profile. The model provides appropriate MDBF target to be demonstrated based on actual accumulated mileage. A case study of rolling stock running in the field is undertaken to analyze the failure data and MDBF target demonstration during low mileage accumulation. The results of case study prove that with the proposed method, reliability targets are achieved under low mileage accumulation.

Keywords: mean distance between failures, mileage-based reliability, reliability target appropriations, rolling stock reliability

Procedia PDF Downloads 267
2202 Production and Leftovers Usage Policies to Minimize Food Waste under Uncertain and Correlated Demand

Authors: Esma Birisci, Ronald McGarvey

Abstract:

One of the common problems in food service industry is demand uncertainty. This research presents a multi-criteria optimization approach to identify the efficient frontier of points lying between the minimum-waste and minimum-shortfall solutions within uncertain demand environment. It also addresses correlation across demands for items (e.g., hamburgers are often demanded with french fries). Reducing overproduction food waste (and its corresponding environmental impacts) and an aversion to shortfalls (leave some customer hungry) need to consider as two contradictory objectives in an all-you-care-to-eat environment food service operation. We identify optimal production adjustments relative to demand forecasts, demand thresholds for utilization of leftovers, and percentages of demand to be satisfied by leftovers, considering two alternative metrics for overproduction waste: mass; and greenhouse gas emissions. Demand uncertainty and demand correlations are addressed using a kernel density estimation approach. A statistical analysis of the changes in decision variable values across each of the efficient frontiers can then be performed to identify the key variables that could be modified to reduce the amount of wasted food at minimal increase in shortfalls. We illustrate our approach with an application to empirical data from Campus Dining Services operations at the University of Missouri.

Keywords: environmental studies, food waste, production planning, uncertain and correlated demand

Procedia PDF Downloads 372
2201 Collective Intelligence-Based Early Warning Management for Agriculture

Authors: Jarbas Lopes Cardoso Jr., Frederic Andres, Alexandre Guitton, Asanee Kawtrakul, Silvio E. Barbin

Abstract:

The important objective of the CyberBrain Mass Agriculture Alarm Acquisition and Analysis (CBMa4) project is to minimize the impacts of diseases and disasters on rice cultivation. For example, early detection of insects will reduce the volume of insecticides that is applied to the rice fields through the use of CBMa4 platform. In order to reach this goal, two major factors need to be considered: (1) the social network of smart farmers; and (2) the warning data alarm acquisition and analysis component. This paper outlines the process for collecting the warning and improving the decision-making result to the warning. It involves two sub-processes: the warning collection and the understanding enrichment. Human sensors combine basic suitable data processing techniques in order to extract warning related semantic according to collective intelligence. We identify each warning by a semantic content called 'warncons' with multimedia metaphors and metadata related to these metaphors. It is important to describe the metric to measuring the relation among warncons. With this knowledge, a collective intelligence-based decision-making approach determines the action(s) to be launched regarding one or a set of warncons.

Keywords: agricultural engineering, warning systems, social network services, context awareness

Procedia PDF Downloads 382
2200 Examining the Extent to Which the Effects of HIV/AIDS Is Addressed in Low Cost Housing Projects in South Africa: The Case of RDP Golf Course Housing Project in Alice Town, Eastern

Authors: Tatenda Manomano

Abstract:

The chronic challenges presented by HIV/AIDS globally have come with extreme negative effects on individuals, families and communities as well as governments. Sub-Saharan Africa remains strongly challenged with South Africa bearing a huge brunt of these. The paper examines the extent to which the effects of HIV/AIDS are addressed in low cost housing projects in South Africa with a case of the RDP Golf Course Housing Project in Alice Town. The study used a triangulation of both qualitative and quantitative methods with the qualitative as the dominant method while the quantitative was less dominant. Findings revealed that infection rate was high; prostitution was high; alcohol abuse was also high; and rape and sexual abuse was also high and there was also lack of hospitals and social workers around the location. These findings prompted this researcher to recommend for proactive policy making that can bolster the challenges faced by these low cost housing projects in accessing health and social services as well as massive campaigns that can promote behavior modification among other things. It is hoped that this paper will be a platform to ring a bell to both government and non-government to augment the campaign against HIV/AIDS in South Africa.

Keywords: HIV/AIDS, RDP houses, low cost housing projects, campaigns

Procedia PDF Downloads 400
2199 Banking and Accounting Analysis Researches Effect on Environment and Income

Authors: Gerges Samaan Henin Abdalla

Abstract:

Ultra-secured methods of banking services have been introduced to the customer, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. Consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 46
2198 The Changing Trend of Collaboration Patterns in the Social Sciences: Institutional Influences on Academic Research in Korea, 2013-2016

Authors: Ho-Dae Chong, Jong-Kil Kim

Abstract:

Collaborative research has become more prevalent and important across disciplines because it stimulates innovation and interaction between scholars. Seeing as existing studies relatively disregarded the institutional conditions triggering collaborative research, this work aims to analyze the changing trend in collaborative work patterns among Korean social scientists. The focus of this research is the performance of social scientists who received research grants through the government’s Social Science Korea (SSK) program. Using quantitative statistical methods, collaborative research patterns in a total of 2,354 papers published under the umbrella of the SSK program in peer-reviewed scholarly journals from 2013 to 2016 were examined to identify changing trends and triggering factors in collaborative research. A notable finding is that the share of collaborative research is overwhelmingly higher than that of individual research. In particular, levels of collaborative research surpassed 70%, increasing much quicker compared to other research done in the social sciences. Additionally, the most common composition of collaborative research was for two or three researchers to conduct joint research as coauthors, and this proportion has also increased steadily. Finally, a strong association between international journals and co-authorship patterns was found for the papers published by SSK program researchers from 2013 to 2016. The SSK program can be seen as the driving force behind collaboration between social scientists. Its emphasis on competition through a merit-based financial support system along with a rigorous evaluation process seems to have influenced researchers to cooperate with those who have similar research interests.

Keywords: coauthorship, collaboration, competition, cooperation, Social Science Korea, policy

Procedia PDF Downloads 229
2197 Flying Women in Chinese Folklore – Male Narrator’s Rejection of Gender Role Division in Patriarchal Societies

Authors: Emma H. Zhang

Abstract:

In Women Who Fly (2018), Serinity Young connects tales and legends of flying women in Greco-Roman, Indo-European, Mesopotamian, and Asian cultures with ancient matriarchal bird goddesses and argues that tales of flying women are reminiscent of the rituals and rites related to the worship of goddesses in pre-patriarchal times and that flying women, including swan maidens, harpies, fairies, and witches are “abnormal women” because they reject patriarchal order, defy, and desert their domestic roles. Tales of flying women in Chinese folklore, exemplified by the story of The Cowherd and the Weaver Girl, replicated in countless tales that depicts the courtship between a mortal man and a divine or magical woman suggest otherwise. In these tales, the divine woman exhibits idealized Confucian femininity and fulfills the needs of the male protagonist by providing him with marriage, children, social status, and financial affluence. This paper argues that the flying women in Chinese folklores are not a symbol of defiance but are exemplars that embodyideal Confucian femininity. These tales are instead a reflection of male rejection of gender division in patriarchal societies. The male protagonists, like the male storytellers, reject the necessity to pursue and provide for women in courtship and marriage. Though these tales show their authors’ and readers’ discontent with gender role division, they do not subvert the patriarchal social order but rather offers an escape through fantasy.

Keywords: bird goddess, folklore, gender role division, patriarchy

Procedia PDF Downloads 165
2196 Enlightening Malaysia's Energy Policies and Strategies for Modernization and Sustainable Development

Authors: Hussain Ali Bekhet, Nor Salwati Othman

Abstract:

Malaysia has achieved remarkable economic growth since 1957, moving toward modernization from a predominantly agriculture base to manufacturing and—now—modern services. The development policies (i.e., New Economic Policy [1970–1990], the National Development Policy [1990–2000], and Vision 2020) have been recognized as the most important drivers of this transformation. The transformation of the economic structure has moved along with rapid gross domestic product (GDP) growth, urbanization growth, and greater demand for energy from mainly fossil fuel resources, which in turn, increase CO2 emissions. Malaysia faced a great challenge to bring down the CO2 emissions without compromising economic development. Solid policies and a strategy to reduce dependencies on fossil fuel resources and reduce CO2 emissions are needed in order to achieve sustainable development. This study provides an overview of the Malaysian economic, energy, and environmental situation, and explores the existing policies and strategies related to energy and the environment. The significance is to grasp a clear picture on what types of policies and strategies Malaysia has in hand. In the future, this examination should be extended by drawing a comparison with other developed countries and highlighting several options for sustainable development.

Keywords: energy policies, energy efficiency, renewable energy, green building, Malaysia, sustainable development

Procedia PDF Downloads 248
2195 Study on Temperature Distribution throughout the Continuous Casting Process of Copper Magnesium Alloys

Authors: Paweł Strzępek, Małgorzata Zasadzińska, Szymon Kordaszewski, Wojciech Ściężor

Abstract:

The constant tendency toward the materials properties improvement nowadays creates opportunities for the scientists, and furthermore the manufacturers all over the world to design, form and produce new alloys almost every day. Considering the fact that companies all over the world look for alloys with the highest values of mechanical properties coexisting with a reasonable electrical conductivity made it necessary to develop new materials based on copper, such as copper magnesium alloys with over 2 wt. % of Mg. Though, before such new material may be mass produced it must undergo a series of tests in order to determine the production technology and its parameters. The presented study is based on the numerical simulations calculated with the use of finite element method analysis, where the geometry of the cooling system, the material used to produce the cooling system and the surface quality of the graphite crystallizer at the place of contact with the cooling system and its influence on the temperatures throughout the continuous casting process is being investigated. The calculated simulations made it possible to propose the optimal set of equipment necessary for the continuous casting process to be carried out in laboratory conditions with various casting parameters and to determine basic materials properties of the obtained alloys such as hardness, electrical conductivity and homogeneity of the chemical composition. The authors are grateful for the financial support provided by The National Centre for Research and Development – Research Project No. LIDER/33/0121/L-11/19/NCBR/2020.

Keywords: CuMg alloys, continuous casting, temperature analysis, finite element method

Procedia PDF Downloads 204
2194 Food Service Waste Management In Nigeria: Emerging Opportunities And Policy Initiatives For Mitigation

Authors: Victor Oyewumi Ogunbiyi

Abstract:

Food waste is recognised as one of the major global challenges in achieving a sustainable future. Currently, very little is known about the multi-stakeholder approach to food waste management downstream of the supply chain, particularly in the foodservice sector. In order to better understand and explain the complex issues of food waste, a qualitative study was conducted on the generation of food waste in food services (restaurants, catering, canteens, and local food vendors) and policy initiatives to mitigate it from the perspective of the stakeholders. A semi-structured interview approach and observation were used to collect data from some 32 selected stakeholders in Garki, Abuja, Nigeria. Thematic analysis was employed to analyse the data from the qualitative instrument adopted in this study. Results revealed that the attitude of stakeholders, poor environmental hygiene, poor food cooking skills and handling, and lack of communication are the major causes of food waste. This study identified seven policy initiatives: regulations, information and education campaigns, economic instruments, mobile applications, stakeholders’ collaboration, firm internal action, and training. Finally, we link policy initiatives to food waste mitigation to provide a response to the damaging shock of food waste.

Keywords: food waste, foodservices, emerging opportunities, policy initiatives, food waste prevention, multistakeholder. garki district-abuja

Procedia PDF Downloads 81
2193 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farming as Web of Things to Cloud Interface Using Platform as a Service

Authors: Sumaya Iqbal, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made the resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular Representational State Transfer protocol (REST) was extended for the specific requirements of the application. Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 122
2192 Jungle Justice on Emotional Health Challenges among Lagosians

Authors: Aaron Akinloye

Abstract:

This research examined the influence of jungle justice as it affects the emotional health challenges among residents in Lagos metropolitan city. Descriptive survey research design was used along with the questionnaire as research instrument. Population for the study comprised residents in Yaba and Shomolu Communities of Lagos State, Nigeria. Accidental sampling technique was used to sample 300 Residents. Self-developed questionnaire was used to obtain data on the variables under investigation. Research instrument was validated following the face, content, and construct validation of the instrument. Thereafter, the reliability coefficient yielded 0.84. It is therefore concluded and recommended that; there is a significant influence of jungle justice on trauma among residents- df (298) t= 2.33, p< 0.05; there is a significant influence of jungle justice on pressure among residents- df (298) t= 2.16, p< 0.05: there is a significant influence of jungle justice on fear among residents- df (298) t= 2.20, p< 0.05; there is a significant influence of jungle justice on depression among residents- df (298) t= 2.14, p< 0.05. Recommendations were made that; there should be deliberate effort to implement comprehensive awareness campaigns to educate the residents on the detrimental effects of jungle justice on individuals and the community members as a whole; there should be an improvement in the effectiveness and efficiency of the existing law enforcement agencies in Lagos metropolitan city; development and implementation of support systems for victims of jungle justice, which include trauma, counselling, mental health services, and rehabilitation programmes; there should be proper review and revision of the legal framework to address the issue of jungle justice effectively.

Keywords: jungle justice, emotional health, depression, fear

Procedia PDF Downloads 99
2191 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136
2190 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 116
2189 Analysis to the Characterization of Self-Esteem of Students in Eulogio 'Amang' Rodriguez Institute of Science and Technology: A Foundation of Conceptualizing Substantial Plan of Action

Authors: Eriberto R. Astorga Jr., Herbert D. Vertucio, Evelyn M. Polison

Abstract:

This study was conducted in order to determine the analysis with regards to the Characterization of Self-Esteem of EARIST Students according to their origin of self-esteem and low self-esteem as well as its causes. The respondents of this study are three thousand three hundred twenty three (3,323) randomly selected students from eight colleges of EARIST such as Arts and Sciences, Education, Public Administration and Criminology, Business Administration, Hospitality Management, Architecture and Fine Arts, Engineering, and Industrial Technology. A survey was conducted by using a validated questionnaire for information gathering about respondents profile and different factors relating to self-esteem of students such as self-origin, familial and social relationship, financial situation and education. Frequency, percentage, ranking and standards deviation, standard t-test and ANOVA were applied to investigate the differences of the answers of the respondents to the origin of their self-esteem and the reasons for low self-esteem. The results revealed that there are no significant differences in the origin of their self-esteem and the reasons of low esteem as to the eight group of respondent’s. Moreover, most causes of low esteem are caused by hearing a comment or experiencing an incident that has a negative impact student mentally and emotionally, poor health, being bullied, lack of support from family, friends, and job loss, experiencing verbal and sexual abuse and are in a violent relationship, feelings of isolation, divorce, dysfunctional family, death and lack of achievement at work and at school, trying to conform to stereotypes and prove our independence from our parents.

Keywords: characterization, plan of action, profile, self-esteem

Procedia PDF Downloads 175
2188 Determinates and Consequences of Job Involvement in Kuwaiti Business Organizations

Authors: Ali H. Muhammad

Abstract:

The present study examines some antecedents and consequences of employee job involvement in Kuwaiti business organization. The model presented in the current study suggests that job satisfaction and organizational commitments are determinates of job involvements. Employees who are satisfied with their jobs tend to be more attached to their jobs and view their jobs as an essential part of their existence. Similarly, employees who are committed to organizational goals, and identify with organizational values, tend to have high level of involvement. Furthermore, our model suggests that job involvement is positively related to work performance and organizational citizenship behavior. The negative consequences of job involvement include burnout and work family conflict. To test the hypotheses, a sample of 204 Kuwaiti employees representing 8 Kuwaiti work organizations is used. The sample covers a variety of business sectors in Kuwait, including manufacturing, services, and transportation. The data were analyzed using non-parametric tests, Pearson correlations, and structural equation modeling. Results indicate that job satisfaction and organizational commitment have significant positive effects on job involvement. Furthermore, findings reveal that job involvement is positively associated with performance, organization citizenship behavior, and work family conflict. Findings are discussed, and future areas of research are identified.

Keywords: job involvement, organizational citizenship behavior, work family conflict, burnout

Procedia PDF Downloads 157
2187 Characterization of the Corn Cob to Know Its Potential as a Source of Biosilica to Be Used in Sustainable Cementitious Mixtures

Authors: Sandra C. L. Dorea, Joann K. Whalen, Yixin Shao, Oumarou Savadogo

Abstract:

The major challenge for industries that rely on fossil fuels in manufacturing processes or to provide goods and services is to lower their CO2 emissions, as the case for the manufacture of Portland cement. Feasible materials for this purpose can include agro-industrial or agricultural wastes, which are termed 'biosilica' since the silica was contained in a biological matrix (biomass). Corn cob (CC) has some characteristics that make it a good candidate as biosilica source: 1) it is an abundant grain crop produced around the world; 2) more production means more available residues is left in the field to be used. This work aims to evaluate the CC collected from different farms in Canada during the corn harvest in order to see if they can be used together as a biosilica source. The characterization of the raw CC was made in the physical, chemical, and thermal way. The moisture content, the granulometry, and the morphology were also analyzed. The ash content measured was 2,1%. The Thermogravimetric Analysis (TGA) and its Derivative (DTG) evaluated of CC as a function of weight loss with temperature variation ranging between 30°C and 800°C in an atmosphere of N2. The chemical composition and the presence of silica revealed that the different sources of the CC do not interfere in its basic chemical composition, which means that this kind of waste can be used together as a source of biosilica no matter where they come from. Then, this biosilica can partially replace the cement Portland making sustainable cementitious mixtures and contributing to reduce the CO2 emissions.

Keywords: biosilica, characterization, corn cob, sustainable cementitious materials

Procedia PDF Downloads 262
2186 The Meaning of Adolescent Mothers' Experience with Childrearing and Studying Simultaneously

Authors: Benyapa Thitimapong

Abstract:

Teenage pregnancy and adolescent mothers have become a matter of increasing concern in Thailand. Since adolescent mothers have been a big problem for two main consequences; health outcomes and socio-economic impacts. Adolescent mothers often endure poor living conditions; limited financial resources while also experience high stress, family instability, and limited educational opportunities. These disadvantages are negative and have long-term effects on adolescent mothers, their families, and the community. The majority of pregnant students and adolescent mothers dropped out of school after becoming pregnant, and some of them return to study again after they gave birth. This research aimed to explain the meaning of adolescent mothers who had undergone with childrearing and studying simultaneously after childbirth. A phenomenological qualitative approach was undertaken to investigate this study. The participants were 20 adolescent mothers each of whom became a mother and a student concurrently within less than 2 years after giving birth to a healthy baby and had also undergone the experience of childrearing and studying in non-formal education. In-depth interview was carried out for data collection, and the data were analyzed using content analysis method. ‘Learning to move forward’ was the meaning of adolescent mothers who experienced with childrearing and studying simultaneously. Their expressions were classified into two categories 1) having more responsibility, and 2) conceding and going on. The result of this study can be used as evidence for health care providers, especially nurses to facilitate and support pregnant adolescents and adolescent mothers to continue their education. Also, it can be used to guide policy to promote in all educational system to enable these groups to remain in school for their life-long success in the future.

Keywords: adolescent mothers, childrearing, studying, teenage pregnancy

Procedia PDF Downloads 132
2185 Improving the Deficiencies in Entrepreneurship Training for Small Businesses in Emerging Markets

Authors: Eno Jah Tabogo

Abstract:

The aim of this research is to identify and examine current deficiencies in entrepreneurial training in improving the performance of small businesses in sub Saharan Africa economies. This research achieves this by examining the course content, training methods, and profiles of trainers and trainees of small business service providers in Sub Saharan Africa (SSA) to identify training deficiencies in improving small businesses. Data was for the analysis was collected from a sample of four entrepreneurial training providers in SSA. These four providers served an average of 1,500 trainees. Questionnaire was used to collect data via face to face and through telephone. Face validity was determined by distributing the questionnaire among a group of colleagues, followed by a group discussion to strengthen the validity of the questionnaire. Interviews were also held with managers of training programs. Content and descriptive statistics was used to analyse the data collected. The results indicated only 25% of the training content were entrepreneurial. In terms of service provided, both business, entrepreneurial, technical and after-care services were identified. It was also discovered that owners of training firms had no formal entrepreneurship background. The paper contributes by advocating for a comprehensive entrepreneurship-training program for successful small business enterprises. Recommendations that could help sustain emerging small business enterprises and direction for further research are presented.

Keywords: entrepreneurship, emerging markets, small business, training

Procedia PDF Downloads 141
2184 Effect of Information and Communication Intervention on Stable Economic Growth in Ethiopia

Authors: Medhin Haftom Hailu

Abstract:

The advancement of information technology has significantly impacted Ethiopia's economy, driving innovation, productivity, job creation, and global connectivity. This research examined the impact of contemporary information and communication technologies on Ethiopian economic progress. The study examined eight variables, including mobile, internet, and fixed-line penetration rates, and five macroeconomic control variables. The results showed a positive and strong effect of ICT on economic growth in Ethiopia, with 1% increase in mobile, internet, and fixed line services penetration indexes resulting in an 8.03, 10.05, and 30.06% increase in real GDP. The Granger causality test showed that all ICT variables Granger caused economic growth, but economic growth Granger caused mobile penetration rate only. The study suggests that coordinated ICT infrastructure development, increased telecom service accessibility, and increased competition in the telecom market are crucial for Ethiopia's economic growth. Ethiopia is attempting to establish a digital economy through massive investment in ensuring ICT quality and accessibility. Thus, the research could enhance in understanding of the economic impact of ICT expansion for successful ICT policy interventions for future research.

Keywords: economic growth, cointegration and error correction, ICT expansion, granger causality, penetration

Procedia PDF Downloads 80
2183 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 471
2182 Evaluating Machine Learning Techniques for Activity Classification in Smart Home Environments

Authors: Talal Alshammari, Nasser Alshammari, Mohamed Sedky, Chris Howard

Abstract:

With the widespread adoption of the Internet-connected devices, and with the prevalence of the Internet of Things (IoT) applications, there is an increased interest in machine learning techniques that can provide useful and interesting services in the smart home domain. The areas that machine learning techniques can help advance are varied and ever-evolving. Classifying smart home inhabitants’ Activities of Daily Living (ADLs), is one prominent example. The ability of machine learning technique to find meaningful spatio-temporal relations of high-dimensional data is an important requirement as well. This paper presents a comparative evaluation of state-of-the-art machine learning techniques to classify ADLs in the smart home domain. Forty-two synthetic datasets and two real-world datasets with multiple inhabitants are used to evaluate and compare the performance of the identified machine learning techniques. Our results show significant performance differences between the evaluated techniques. Such as AdaBoost, Cortical Learning Algorithm (CLA), Decision Trees, Hidden Markov Model (HMM), Multi-layer Perceptron (MLP), Structured Perceptron and Support Vector Machines (SVM). Overall, neural network based techniques have shown superiority over the other tested techniques.

Keywords: activities of daily living, classification, internet of things, machine learning, prediction, smart home

Procedia PDF Downloads 357
2181 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access

Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman

Abstract:

Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.

Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)

Procedia PDF Downloads 432
2180 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 101
2179 Method to Find a ε-Optimal Control of Stochastic Differential Equation Driven by a Brownian Motion

Authors: Francys Souza, Alberto Ohashi, Dorival Leao

Abstract:

We present a general solution for finding the ε-optimal controls for non-Markovian stochastic systems as stochastic differential equations driven by Brownian motion, which is a problem recognized as a difficult solution. The contribution appears in the development of mathematical tools to deal with modeling and control of non-Markovian systems, whose applicability in different areas is well known. The methodology used consists to discretize the problem through a random discretization. In this way, we transform an infinite dimensional problem in a finite dimensional, thereafter we use measurable selection arguments, to find a control on an explicit form for the discretized problem. Then, we prove the control found for the discretized problem is a ε-optimal control for the original problem. Our theory provides a concrete description of a rather general class, among the principals, we can highlight financial problems such as portfolio control, hedging, super-hedging, pairs-trading and others. Therefore, our main contribution is the development of a tool to explicitly the ε-optimal control for non-Markovian stochastic systems. The pathwise analysis was made through a random discretization jointly with measurable selection arguments, has provided us with a structure to transform an infinite dimensional problem into a finite dimensional. The theory is applied to stochastic control problems based on path-dependent stochastic differential equations, where both drift and diffusion components are controlled. We are able to explicitly show optimal control with our method.

Keywords: dynamic programming equation, optimal control, stochastic control, stochastic differential equation

Procedia PDF Downloads 188
2178 Evaluating the Implementation of Machine Learning Techniques in the South African Built Environment

Authors: Peter Adekunle, Clinton Aigbavboa, Matthew Ikuabe, Opeoluwa Akinradewo

Abstract:

The future of machine learning (ML) in building may seem like a distant idea that will take decades to materialize, but it is actually far closer than previously believed. In reality, the built environment has been progressively increasing interest in machine learning. Although it could appear to be a very technical, impersonal approach, it can really make things more personable. Instead of eliminating humans out of the equation, machine learning allows people do their real work more efficiently. It is therefore vital to evaluate the factors influencing the implementation and challenges of implementing machine learning techniques in the South African built environment. The study's design was one of a survey. In South Africa, construction workers and professionals were given a total of one hundred fifty (150) questionnaires, of which one hundred and twenty-four (124) were returned and deemed eligible for study. Utilizing percentage, mean item scores, standard deviation, and Kruskal-Wallis, the collected data was analyzed. The results demonstrate that the top factors influencing the adoption of machine learning are knowledge level and a lack of understanding of its potential benefits. While lack of collaboration among stakeholders and lack of tools and services are the key hurdles to the deployment of machine learning within the South African built environment. The study came to the conclusion that ML adoption should be promoted in order to increase safety, productivity, and service quality within the built environment.

Keywords: machine learning, implementation, built environment, construction stakeholders

Procedia PDF Downloads 133
2177 Using Surface Entropy Reduction to Improve the Crystallization Properties of a Recombinant Antibody Fragment RNA Crystallization Chaperone

Authors: Christina Roman, Deepak Koirala, Joseph A. Piccirilli

Abstract:

Phage displaying synthetic Fab libraries have been used to obtain Fabs that bind to specific RNA targets with high affinity and specificity. These Fabs have been demonstrated to facilitate RNA crystallization. However, the antibody framework used in the construction of these phage display libraries contains numerous bulky, flexible, and charged residues, which facilitate solubility and hinder aggregation. These residues can interfere with crystallization due to the entropic cost associated with burying them within crystal contacts. To systematically reduce the surface entropy of the Fabs and improve their crystallization properties, a protein engineering strategy termed surface entropy reduction (SER) is being applied to the Fab framework. In this approach, high entropy residues are mutated to smaller ones such as alanine or serine. Focusing initially on Fab BL3-6, which binds an RNA AAACA pentaloop with 20nM affinity, the SER P server (http://services.mbi.ucla.edu/SER/) was used and analysis was performed on existing RNA-Fab BL3-6 co-crystal structures. From this analysis twelve surface entropy reduced mutants were designed. These SER mutants were expressed and are now being measured for their crystallization and diffraction performance with various RNA targets. So far, one mutant has generated 3.02 angstrom diffraction with the yjdF riboswitch RNA. Ultimately, the most productive mutations will be combined into a new Fab framework to be used in a optimized phage displayed Fab library.

Keywords: antibody fragment, crystallography, RNA, surface entropy reduction

Procedia PDF Downloads 196