Search results for: destination reputation
259 Disaster Resilience Analysis of Atlanta Interstate Highway System within the Perimeter
Authors: Mengmeng Liu, J. David Frost
Abstract:
Interstate highway system within the Atlanta Perimeter plays an important role in residents’ daily life. The serious influence of Atlanta I-85 Collapses implies that transportation system in the region lacks a cohesive and comprehensive transportation plan. Therefore, disaster resilience analysis of the transportation system is necessary. Resilience is the system’s capability to persist or to maintain transportation services when exposed to changes or shocks. This paper analyzed the resilience of the whole transportation system within the Perimeter and see how removing interstates within the Perimeter will affect the resilience of the transportation system. The data used in the paper are Atlanta transportation networks and LEHD Origin-Destination Employment Statistics data. First, we calculate the traffic flow on each road section based on LEHD data assuming each trip travel along the shortest travel time paths. Second, we calculate the measure of resilience, which is flow-based connectivity and centrality of the transportation network, and see how they will change if we remove each section of interstates from the current transportation system. Finally, we get the resilience function curve of the interstates and identify the most resilient interstates section. The resilience analysis results show that the framework of calculation resilience is effective and can provide some useful information for the transportation planning and sustainability analysis of the transportation infrastructures.Keywords: connectivity, interstate highway system, network analysis, resilience analysis
Procedia PDF Downloads 260258 Bhumastra “Unmanned Ground Vehicle”
Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J
Abstract:
Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI
Procedia PDF Downloads 123257 The Other Dreamers: A Study of the Relationship between Returned Migration and Entrepreneurship
Authors: Pascual García, Francisco Ochoa, Jessica Ordoñez
Abstract:
The links between migration and development have been widely written and analyzed from different perspectives. However, the nexus between entrepreneurship and migration is of recent interest. The different studies related to this have focused on the ventures of ethnic enclaves, or on transnational businesses, which link the community of origin and destination. Beyond this perspective, this work analyzes the return migration, (a few studies until now, but forming part of a theoretical body of migration). As a result of the European crisis started between 2007-2008. Many Ecuadorians who lived in Europe, decided to return to their place of origin. The rise of the price of the oil and commodities presented a better panorama in Ecuador than in Europe. Faced with the magnitude of returnees, the opportunities for entrepreneurship in Ecuador increased (Accumulation of human capital, social capital, learned skills and capital). Thus there is an interest in the possibility of returned migrants in the country to start a business in their place of origin. The following study is the result of this. A survey of 110 returned migrants was carried out in the south of Ecuador and, using a Probit econometric model, we determined that the variables specified as geographic area, sex, education level are not significant, so they are not determinant when undertaking. However, time abroad and skills learned, if they were significant at the time of the decision to start a business.Keywords: entrepreneurship, development, migration, returned migration
Procedia PDF Downloads 210256 A Pilot Study of Bangkok High School Students’ Satisfaction Towards Online Learning Platform During Covid-19 Pandemic
Authors: Aung Aung Kyi, Khin Khin Aye
Abstract:
The mode of teaching and learning has been changed dramatically due to the Covid-19 pandemic that made schools close and students may have been away from the campus. However, many schools all over the countries are helping students to facilitate e-learning through online teaching and learning platform. Regarding this, Sarasas bilingual school in Bangkok conducted the high school students’ satisfaction survey since it is important for every school to improve its quality of education that must meet the students' need. For the good of the school's reputation, the purpose of the study is to examine the level of satisfaction that enhances the best services in the future. This study applied random sampling techniques and the data were collected using a self-administered survey. Descriptive analysis and independent sample t-tests were used to measure the importance of satisfaction components. The results showed G-11 (A) students were extremely satisfied with “Accessibility of course resources and materials through online platform” and “Ontime homework submission” while G-11 (B) students were extremely satisfied with “Teacher assisted with guiding my learning activities” and “Course teacher for this online course interacted with me in a timely fashion”. Additionally, they were also satisfied with a clear understanding of the teacher’s introduction during online learning. A significant difference in the satisfaction was observed between G-11 (A) and G-11 (B) students in terms of “A clear understanding on introduction was given by the teacher at the beginning of this online course”(P=0.03), “Teacher assisted with guiding my learning activities” (P=0.003), and “Comfortable surrounding during online learning” (P=0.02). With regard to gender, it has been seen that female high school students were extremely satisfied with the amount of course interaction with their teacher and her guidance with learning activities during online learning. By understanding the survey assessment, schools can improve their quality of education through the best digital educational platform that helps satisfy their students in the future.Keywords: Bangkok high school students., covid-19 pandemic, online learning platform, satisfaction
Procedia PDF Downloads 214255 The Barriers That ESOL Learners Face Accessing Further Education
Authors: Jamie David Hopkin
Abstract:
This study aims to contribute uniquely to help colleges and community learning and development institutes to help aid progression within ESOL learning. The study investigates the barriers that migrant and displaced learners face accessing further education in Scotland. The study also includes a set of recommendations both for colleges and CLD institutes to help ESOL learners in their journey to further education. The research found that integration into Scottish society is one of the biggest motivators for ESOL students to learn English. It also found that the place of gender and “gender roles” contribute to the barriers that learners face in terms of progression and learning. The study also reviews all literature related to ESOL learning in Scotland and found that there are only two main policies that support ESOL learning, and both are slightly outdated in terms of supporting progression. This study aims to help bridge the gap in knowledge around the progression from informal learning to formal education. The recommendations that are made in this study are aimed to help institutes and learners on their journey to a positive destination. The main beneficiaries of this research are current and future ESOL learners in Scotland, ESOL institutes, and TESOL professionals.Keywords: community learning and development, English for speakers of other languages, further education, higher education TESOL, teaching English as a second language
Procedia PDF Downloads 136254 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 266253 Mitigation of Profitable Problems: Level of Hotel Quality Management Program and Environmental Management Practices Towards Performance
Authors: Siti Anis Nadia Abu Bakar, Vani Tanggamani
Abstract:
Over recent years, the quality and environmental management practices are the necessary tasks in hospitality industry in order to provide high quality services, a comfortable and safe environment for occupants as well as innovative nature and shareholders' satisfaction, its environmental and social added value sustainable. Numerous studies have observed and measured quality management program (QMProg) and environmental management practices (EMPrac) independently. This paper analyzed the level of QMProg, and EMPrac in hospitality industry, particularly on hotel performance, specifically in the context of Malaysia as hotel industry in Malaysia has contributed tremendously to the development in the Malaysia tourism industry.The research objectives are; (1) to analyze how the level of QMProg influences on firm performance; (2) to investigate the level of EMPrac and its influence on firm performance. This paper contributes to the literature by providing added-value to the service industry strategic decision-making processes by helping to predict the varying impacts of positive and negative corporate social responsibility (CSR) activities on financial performance in their respective industries. Further, this paper also contributes to develop more applicable CSR strategies. As a matter of fact, the findings of this paper has contributed towards an integrated management system that will assist a firm in implementation of their environmental strategy by creating a higher level of accountability for environmental performance. The best results in environmental systems have instigated managers to explore more options when dealing with problems, especially problems involving the reputation of their hotel. In conclusion, the results of the study infer that the best CSR strategies of the quality and environmental management practices influences hotel performance.Keywords: corporate social responsibility (CSR), environmental management practices (EMPrac), performance (PERF), quality management program (QMProg)
Procedia PDF Downloads 374252 Investigating the Relative Priority of the Factors Affecting Customer Satisfaction in Gaining the Competitive Advantage in Pars-Khazar Company
Authors: Samaneh Pouyanfar, Michael Oliff
Abstract:
The industry of home appliances may beone of theindustries which has the highest competition, and actually what can guarantee the survival of this industry is discovering the superior services. A trend to provide quality products and services plays an important role in this industry because discovering the services is counted as a vital affair for Manufacturing Organizations’ survival and profitability. Given the importance of the topic, this paper attempts to investigate the relative priority of the factors influencing the customer satisfaction in gaining the competitive advantage in Pars-Khazar Company. In sum, 96 executives of Pars-Khazar Company where investigated in a census. For this purpose, after reviewing the research literature and performing deep interviews between pundits and experts active in the industry, the research questionnaire was made based on variables affecting customer satisfaction and components determining business competitive advantage. Determining the content validity took place by judgement of the experts. The reliability of each structure was measured based on Cronbach’s alpha coefficient. Since the value of Cronbach's alpha was higher than 0.7 for each structure, internal consistency of statements was high and the reliability of the questionnaire was acceptable. The data analysis was also done with Kulmgrf-asmyrnf test and Friedman test using SPSS software. The results showed that in dimension of factors affecting customer satisfaction, the History of trade name (brand), Familiarity with the product brand, Brand reputation and Safety have the highest value of priority respectively, and the variable of firm growth has the highest value of priority among the components determining the performance of competitive advantage.Keywords: customer satisfaction, competitive advantage, brand history, safety, growth
Procedia PDF Downloads 230251 Agent-Based Modeling of Pedestrian Corridor Congestion on the Characteristics of Physical Space Form
Abstract:
The pedestrian corridor is the most crowded area in the public space. The crowded severity has been focused on the field of evacuation strategies of the entrance in large public spaces. The aim of this paper is to analyze the walking efficiency in different spaces of pedestrian corridor with the variation of spatial parameters. The congestion condition caused by the variation of walking efficiency is modeled as well. This study established the space model of the walking corridor by setting the width, slope, turning form and turning angle of the pedestrian corridor. The pedestrian preference of walking mode varied with the difference of the crowded severity, walking speed, field of vision, sight direction and the expected destination, which is influenced by the characters of physical space form. Swarm software is applied to build Agent model. According to the output of the Agent model, the relationship between the pedestrian corridor width, ground slope, turning forms, turning angle and the walking efficiency, crowded severity is acquired. The results of the simulation can be applied to pedestrian corridor design in order to reduce the crowded severity and the potential safety risks caused by crowded people.Keywords: crowded severity, multi-agent, pedestrian preference, urban space design
Procedia PDF Downloads 219250 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol
Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani
Abstract:
Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.Keywords: heuristics routing, intelligent routing, VANET, route optimization
Procedia PDF Downloads 176249 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India
Authors: Mohammed Bashir Uddin
Abstract:
Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.Keywords: globalization, human security, human trafficking, political economy
Procedia PDF Downloads 471248 Comparison of Tourist Shopping Patterns in Korea, 2009-2015: A Case of China and Japan
Abstract:
Japan has been positioned as a major inbound market to Korea, accounting for about 31% of total inbound visitors until 2012. The percentage has sharply dropped each year since and remained in second place, reaching 13.33% in 2016. Meanwhile, China has been boosted as a major inbound market, reaching 46.79% in 2016. Chinese tourists mainly visit Korea with the major purpose of shopping. They consume Korean cosmetic/beauty products and clothes while Japanese tourists prefer to purchase healthy food such as ginseng and seaweed. This study aims to investigate and compare tourist shopping patterns across two major inbound markets, China and Japan. A quantitative approach using survey was applied from 2009 to 2016. Findings suggest Chinese visit Korea due to quality of product, value for money, and accessibility, and trust. Meanwhile, Japanese choose Korea as a shopping destination mainly due to convenience, affordability, and tourist attractions. Also, there were significant differences in shopping venues. For example, Japanese tourists prefer shopping at department stores while Chinese tourists prefer retail outlets and local markets. This study contributes to deeper understanding on two major inbound markets to Korea and suggests future marketing strategies.Keywords: tourist shopping patterns, Korea, China, Japan, historical data
Procedia PDF Downloads 198247 Theoretical Discussion on the Classification of Risks in Supply Chain Management
Authors: Liane Marcia Freitas Silva, Fernando Augusto Silva Marins, Maria Silene Alexandre Leite
Abstract:
The adoption of a network structure, like in the supply chains, favors the increase of dependence between companies and, by consequence, their vulnerability. Environment disasters, sociopolitical and economical events, and the dynamics of supply chains elevate the uncertainty of their operation, favoring the occurrence of events that can generate break up in the operations and other undesired consequences. Thus, supply chains are exposed to various risks that can influence the profitability of companies involved, and there are several previous studies that have proposed risk classification models in order to categorize the risks and to manage them. The objective of this paper is to analyze and discuss thirty of these risk classification models by means a theoretical survey. The research method adopted for analyzing and discussion includes three phases: The identification of the types of risks proposed in each one of the thirty models, the grouping of them considering equivalent concepts associated to their definitions, and, the analysis of these risks groups, evaluating their similarities and differences. After these analyses, it was possible to conclude that, in fact, there is more than thirty risks types identified in the literature of Supply Chains, but some of them are identical despite of be used distinct terms to characterize them, because different criteria for risk classification are adopted by researchers. In short, it is observed that some types of risks are identified as risk source for supply chains, such as, demand risk, environmental risk and safety risk. On the other hand, other types of risks are identified by the consequences that they can generate for the supply chains, such as, the reputation risk, the asset depreciation risk and the competitive risk. These results are consequence of the disagreements between researchers on risk classification, mainly about what is risk event and about what is the consequence of risk occurrence. An additional study is in developing in order to clarify how the risks can be generated, and which are the characteristics of the components in a Supply Chain that leads to occurrence of risk.Keywords: sisks classification, survey, supply chain management, theoretical discussion
Procedia PDF Downloads 632246 Afghan Women’s Definitions, Perceptions and Experience of Domestic Violence, a Qualitative Study with Afghan Women in Australia
Authors: Rojan Afrouz
Abstract:
The main aim of this study is understanding Afghan women’s perception of domestic violence and their experience of abuse by their family members. The voice of Afghan women has not been heard much particularly in Australia. Their families and communities have silenced some of them in the name of family honour and reputation, and others have not had the opportunity to talk about the issue. Although domestic violence is an issue in every country, research suggests that this is more likely to be considered acceptable behaviour in Afghanistan than elsewhere. Given the high public visibility of initiatives which aim to tackle domestic violence in Australia, it is entirely possible that Afghan women’s perceptions and beliefs about domestic violence will have changed since their arrival in this country. Thus, their understandings, perceptions and their experience of domestic violence have been investigated to improve the Afghan women’s situation in Australia. Methods: This qualitative study has been conducted among Afghan women who have lived in Australia less than ten years. Semi-structured interviews either face to face or by phone have been used to collect data for this study. The interviews have been audio-recorded and transcribed verbatim. Nvivo software has been used for data analysis. Findings: Participants’ definitions of domestic violence vary. They defined domestic violence in relation to their educational levels, their personal life and experience of domestic violence. Some women tended to change the definitions to be more relevant to their own life and experience. Many women had the knowledge of different domestic violence acts that have been distinguished as violent acts in Australia or other western countries. Some of the participants stated that they had the experience of domestic violence from their partner or one of the family members. Those who have been abused, their experiences were diverse and had been perpetrated by different family members. Majority of participants revealed the story of other women in their family and community that have been abused. Conclusion: Moving to Australia helped women to be aware of the issues and recognising that they are in the abusive relationships. However, intersecting multiple identities in a complex system of oppression, domination or discrimination makes the experience of domestic violence more complicated among Afghan community in Australia that cannot be addressed easily.Keywords: domestic violence, intersectionality, immigration, afghan women
Procedia PDF Downloads 324245 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks
Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi
Abstract:
In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward
Procedia PDF Downloads 581244 Comparative Study on Manet Using Soft Computing Techniques
Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri
Abstract:
Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network
Procedia PDF Downloads 349243 Comparative Assessment of Bus Rapid Transit System in India
Authors: Namrata Ghosh, Sapan Tiwari
Abstract:
Public transport service plays an important role in people's transportation needs in urban areas. Bus Rapid Transit System (BRTS) is a transport service that provides passengers with a quick and efficient mode of transport. It is developed by changing the existing infrastructure, vehicles, route, or by developing a new dedicated corridor for the bus route. This dedicated lanes transport passengers to their destination quickly and efficiently and flexible in meeting demand. However, with rapid urbanization and increasing population density in Indian cities, traffic congestion has become a significant issue. In a few Indian cities, the BRTS concept is implemented to address the issue of traffic congestion that eventually resulted in less road congestion. The research aims to provide a literature review on the overall outlook of the BRTS system and its practical implementation in mass urban transit. First, it reflects a literature review on the concept of the BRTS system in both developed and developing countries. Afterward, comparative analysis of BRTS, hindrances associated with the permanent integrated system, and the need for establishing the Bus Rapid Transit System in Indian cities is demonstrated. The research concludes with some recommendations that could help in improving the loopholes in the existing system.Keywords: bus rapid transit system(BRTS), dedicated corridor, public transport, traffic congestion
Procedia PDF Downloads 285242 Assessment of Tourist and Community Perception with Regard to Tourism Sustainability Indicators: A Case Study of Sinharaja World Heritage Rainforest, Sri Lanka
Authors: L. P. K. Liyanage, N. R. P. Withana, A. L. Sandika
Abstract:
The purpose of this study was to determine tourist and community perception-based sustainable tourism indicators as well as Human Pressure Index (HPI) and Tourist Activity Index (TAI). Study was carried out in Sinharaja forest which is considered as one of the major eco-tourism destination in Sri Lanka. Data were gathered using a pre-tested semi-structured questionnaire as well as records from Forest department. Convenient sampling technique was applied. For the majority of issues, the responses were obtained on multi-point Likert-type scales. Visual portrayal was used for display analyzed data. The study revealed that the host community of the Kudawa gets many benefits from tourism. Also, tourism has caused negative impacts upon the environment and community. The study further revealed the need of proper waste management and involvement of local cultural events for the tourism business in the Kudawa conservation center. The TAI, which accounted to be 1.27 and monthly evolution of HPI revealed that congestion can be occurred in the Sinharaja rainforest during peak season. The results provide useful information to any party involved with tourism planning anywhere, since such attempts would be more effective once the people’s perceptions on these aspects are taken into account.Keywords: Kudawa Conservation Center, Sinharaja World Heritage Rainforest, sustainability indicators, community perception
Procedia PDF Downloads 151241 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 61240 A National Systematic Review on Determining Prevalence of Mobbing Exposure in Turkish Nurses
Authors: Betül Sönmez, Aytolan Yıldırım
Abstract:
Objective: This systematic review aims to methodically analyze studies regarding mobbing behavior prevalence, individuals performing this behavior and the effects of mobbing on Turkish nurses. Background: Worldwide reports on mobbing cases have increased in the past years, a similar trend also observable in Turkey. It has been demonstrated that among healthcare workers, mobbing is significantly widespread in nurses. The number of studies carried out in this regard has also increased. Method: The main criteria for choosing articles in this systematic review were nurses located in Turkey, regardless of any specific date. In November 2014, a search using the keywords 'mobbing, bullying, psychological terror/violence, emotional violence, nurses, healthcare workers, Turkey' in PubMed, Science Direct, Ebscohost, National Thesis Centre database and Google search engine led to 71 studies in this field. 33 studies were not met the inclusion criteria specified for this study. Results: The findings were obtained using the results of 38 studies carried out in the past 13 years in Turkey, a large sample consisting of 8,877 nurses. Analysis of the incidences of mobbing behavior revealed a broad spectrum, ranging from none-slight experiences to 100% experiences. The most frequently observed mobbing behaviors include attacking personality, blocking communication and attacking professional and social reputation. Victims mostly experienced mobbing from their managers, the most common consequence of these actions being psychological effects. Conclusions: The results of studies with various scales indicate exposure of nurses to similar mobbing behavior. The high frequency of exposure of nurses to mobbing behavior in such a large sample highlights the importance of considering this issue in terms of individual and institutional consequences that adversely affect the performance of nurses.Keywords: mobbing, bullying, workplace violence, nurses, Turkey
Procedia PDF Downloads 277239 Hybrid Incentives for Excellent Abroad Students Study for High Education Degrees
Authors: L. Sun, C. Hardacre, A. Garforth, N. Zhang
Abstract:
Higher Education (HE) degrees in the UK are attractive for international students. The recognized reputation of the HE and the world-leading researchers in some areas in the UK imply that the HE degree from the UK might be a passport to a successful career for abroad students. However, it is a challenge to inspire outstanding students applying for the universities in the UK. The incentives should be country-specific for undergraduates and postgraduates. The potential obstacles to stop students applying for the study in the UK mainly lie in these aspects: different HE systems between the UK and other countries, such as China; less information for the application procedures; worries for the study in English for those non-native speakers; and expensive international tuition fees. The hybrid incentives have been proposed by the efforts from the institutions, stuffs, and students themselves. For example, excellent students from top universities would join us based on the abroad exchange programs or ‘2+2 programme’ with discount tuition. They are potential PhD candidates in the further study in the UK. Diversity promotions are implemented to share information and answer queries for potential students and their guardians. Face to face presentations, workshops, and seminars deliver chances for students to admire teaching and learning in the UK, and give students direct answers for their confusions. WeChat official account and Twitter as the online information platform are set up to post messages of recruitment, the guidance for the application procedures, and international collaboration in teaching and research as well. Students who are studying in the UK and the alumni would share their experiences in the study and lives in the UK and their careers after obtaining the HE degree would play as a positive stimulus to our potential students. Short term modules in the UK with exchangeable credits in summer holidays would give abroad students firsthand experiences of the study in the reputable schools with excellent academics, different cultures and the network with international students. Successful cases at the University of Manchester illustrated the effectiveness of these presented methodologies.Keywords: abroad students, degree study, high education, hybrid incentives
Procedia PDF Downloads 166238 Multi-Criteria Bid/No Bid Decision Support Framework for General Contractors: A Case of Pakistan
Authors: Nida Iftikhar, Jamaluddin Thaheem, Bilal Iftikhar
Abstract:
In the construction industry, adequate and effective decision-making can mean the difference between success and failure. Bidding is the most important element of the construction business since it is a mean by which contractors obtain work. This is probably the only option for any contractor firm to sustain in the market and achieve its objective of earning the profits by winning tenders. The capability to select most appropriate ventures not only defines the success and wellbeing of contractor firms but also their survival and sustainability in the industry. The construction practitioners are usually on their own when it comes to deciding on bidding for a project or not. Usually, experience-based solutions are offered where a lot of subjectivity is involved. This research has been opted considering the local construction industry of Pakistan in order to examine the critical success factors from contractors’ perspective while making bidding decisions, listing and evaluating critical factors in order of their importance, categorization of these factors into decision support & decision oppose groups and to develop a framework to help contractors in the decision-making process. Literature review, questionnaires, and structured interviews are used for identification and quantification of factors affecting bid/no bid decision-making. Statistical methods of ranking analysis and analytical hierarchy process of multi-criteria decision-making method are used for analysis. It is found that profitability, need for work and financial health of client are the most decisive factors in bid/no bid decision-making while project size, project type, fulfilling the tender conditions imposed by the client and relationship, identity & reputation of the client are least impact factors in bid/no bid decision-making. Further, to verify the developed framework, case studies have been conducted to evaluate the bid/no bid decision-making in building procurement. This is the first of its nature study in the context of the local construction industry and recommends using a holistic decision-making framework for such business-critical deliberations.Keywords: bidding, bid decision-making, construction procurement, contractor
Procedia PDF Downloads 191237 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks
Authors: A. Khan, H. Mahmood
Abstract:
In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.Keywords: energy holes, interference, routing, underwater
Procedia PDF Downloads 408236 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 263235 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network
Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz
Abstract:
Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle
Procedia PDF Downloads 238234 Investigate the Current Performance of Burger King Ho Chi Minh City in Terms of the Controllable Variables of the Overall Retail Strategy
Authors: Nhi Ngoc Thien
Abstract:
Franchising is a popular trend in Vietnam retail industry, especially in fast food industry. Several famous foreign fast food brands such as KFC, Lotteria, Jollibee or Pizza Hut invested on this potential market since the 1990s. Following this trend, in 2011, Burger King - the second largest fast food hamburger chain all over the world - entered Vietnam with its first store located in Tan Son Nhat International Airport, with the expectation to become the leading brand in the country. However, the business performance of Burger King was not going well in the first few years making it questioned about its strategy. The given assumption was that its business performance was affected negatively by its store location selection strategy. This research aims to investigate the current performance of Burger King Vietnam in terms of the controllable variables like store location as well as to explore the key factors influencing customer decision to choose Burger King. Therefore, a case study research method was conducted to approach deeply on the opinions and evaluations of 10 Burger King’s customers, Burger King's staffs and other fast food experts on Burger King’s performance through in-depth interview, direct observation and documentary analysis. Findings show that there are 8 determinants affecting the decision-making of Burger King’s customers, which are store location, quality of food, service quality, store atmosphere, price, promotion, menu and brand reputation. Moreover, findings present that Burger King’s staffs and fast food experts also mentioned the main problems of Burger King, which are about store location and food quality. As a result, there are some recommendations for Burger King Vietnam to improve its performance in the market and attract more Vietnamese target customers by giving suitable promotional activities among its customers and being differentiated itself from other fast food brands.Keywords: overall retail strategy, controllable variables, store location, quality of food
Procedia PDF Downloads 344233 Aggregation Scheduling Algorithms in Wireless Sensor Networks
Authors: Min Kyung An
Abstract:
In Wireless Sensor Networks which consist of tiny wireless sensor nodes with limited battery power, one of the most fundamental applications is data aggregation which collects nearby environmental conditions and aggregates the data to a designated destination, called a sink node. Important issues concerning the data aggregation are time efficiency and energy consumption due to its limited energy, and therefore, the related problem, named Minimum Latency Aggregation Scheduling (MLAS), has been the focus of many researchers. Its objective is to compute the minimum latency schedule, that is, to compute a schedule with the minimum number of timeslots, such that the sink node can receive the aggregated data from all the other nodes without any collision or interference. For the problem, the two interference models, the graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR), have been adopted with different power models, uniform-power and non-uniform power (with power control or without power control), and different antenna models, omni-directional antenna and directional antenna models. In this survey article, as the problem has proven to be NP-hard, we present and compare several state-of-the-art approximation algorithms in various models on the basis of latency as its performance measure.Keywords: data aggregation, convergecast, gathering, approximation, interference, omni-directional, directional
Procedia PDF Downloads 229232 A Mathematical Model to Select Shipbrokers
Authors: Y. Smirlis, G. Koronakos, S. Plitsos
Abstract:
Shipbrokers assist the ship companies in chartering or selling and buying vessels, acting as intermediates between them and the market. They facilitate deals, providing their expertise, negotiating skills, and knowledge about ship market bargains. Their role is very important as it affects the profitability and market position of a shipping company. Due to their significant contribution, the shipping companies have to employ systematic procedures to evaluate the shipbrokers’ services in order to select the best and, consequently, to achieve the best deals. Towards this, in this paper, we consider shipbrokers as financial service providers, and we formulate the problem of evaluating and selecting shipbrokers’ services as a multi-criteria decision making (MCDM) procedure. The proposed methodology comprises a first normalization step to adjust different scales and orientations of the criteria and a second step that includes the mathematical model to evaluate the performance of the shipbrokers’ services involved in the assessment. The criteria along which the shipbrokers are assessed may refer to their size and reputation, the potential efficiency of the services, the terms and conditions imposed, the expenses (e.g., commission – brokerage), the expected time to accomplish a chartering or selling/buying task, etc. and according to our modelling approach these criteria may be assigned different importance. The mathematical programming model performs a comparative assessment and estimates for the shipbrokers involved in the evaluation, a relative score that ranks the shipbrokers in terms of their potential performance. To illustrate the proposed methodology, we present a case study in which a shipping company evaluates and selects the most suitable among a number of sale and purchase (S&P) brokers. Acknowledgment: This study is supported by the OptiShip project, implemented within the framework of the National Recovery Plan and Resilience “Greece 2.0” and funded by the European Union – NextGenerationEU programme.Keywords: shipbrokers, multi-criteria decision making, mathematical programming, service-provider selection
Procedia PDF Downloads 88231 Air Connectivity in Promoting Association of Southeast Asian Nations Integration: The Role of Low Cost-Carriers
Authors: Gabriella Fardhiyanti, Victor Wee
Abstract:
Air connectivity is the crucial factors to boost a region economics growth. It will open the accessibility to support regional competitiveness and helps to achieve ASEAN (Association of Southeast Asian Nations) integration in term of economic integration, business investment, promote intra-regional trade, and creates the sense of belongingness among ASEAN people in the region. An increasing number of air connectivity and transportation will be benefiting the region because air transportation is a vital hub for ASEAN. The aim of this paper is to address the importance of air connectivity in promoting ASEAN Integration, by focusing on the ASEAN vision for a more integrated region. The assessment uses based on the Netscan Air connectivity model based on the flight destination and airport connectivity index, further analysis present that air connectivity significantly influence ASEAN tourism sector. Follow by the implications of open skies policy for the liberation of the aviation industry and the growth of low cost-carriers (LCCs) in the region. This paper provides recommendation and strategy for overcoming the challenges faced by ASEAN to boost ASEAN tourism integration successfully. The findings can assist in guiding policy and industry stakeholders in the future decision relating to air liberalization and more integrated system in the region.Keywords: air connectivity, ASEAN integration, low-cost carries, NetScan connectivity model, open skies policy
Procedia PDF Downloads 215230 Comparison of Nitrogen Dioxide Pollution for Different Commuting Modes in Kaunas
Authors: A. Dėdelė, A. Miškinytė
Abstract:
The assessment of air pollution exposure in different microenvironments is important for better understanding the relationship between health effects caused by air pollution. The recent researches revealed that the level of air pollution in transport microenvironment contributes considerably to the total exposure of air pollution. The aim of the study was to determine air pollution of nitrogen dioxide and to assess the exposure of NO2 dependence on the chosen commuting mode using a global positioning system (GPS). The same travel destination was chosen and 30 rides in three different commuting modes: cycling, walking, and public transport were made. Every different mean of transport is associated with different route. GPS device and travel diary data were used to track all routes of different commuting modes. Air pollution of nitrogen dioxide was determined using the ADMS-Urban dispersion model. The average annual concentration of nitrogen dioxide was modeled for 2011 year in Kaunas city. The geographical information systems were used to visualize the travel routes, to create maps indicating the route of different commuting modes and to combine modelled nitrogen dioxide data. The results showed that there is a significant difference between the selected commuting mode and the exposure of nitrogen dioxide. The concentrations in the microenvironments were 22.4 μg/m3, 21.4 μg/m3, and 25.9 μg/m3 for cycling, walking and public transport respectively. Of all the modes of commuting, the highest average exposure of nitrogen dioxide was found travelling by public transport, while the lowest average concentration of NO2 was determined by walking.Keywords: nitrogen dioxide, dispersion model, commuting mode, GPS
Procedia PDF Downloads 432