Search results for: operations research
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25699

Search results for: operations research

25279 An Approach to Tackle Start up Problems Using Applied Games

Authors: Aiswarya Gopal, Kamal Bijlani, Vinoth Rengaraj, R. Jayakrishnan

Abstract:

In the business world, the term “startup” is frequently ringing the bell with the high frequency of young ventures. The main dilemma of startups is the unsuccessful management of the unique risks that have to be confronted in the present world of competition and technology. This research work tried to bring out a game based methodology to improve enough real-world experience among entrepreneurs as well as management students to handle risks and challenges in the field. The game will provide experience to the player to overcome challenges like market problems, running out of cash, poor management, and product problems which can be resolved by a proper strategic approach in the entrepreneurship world. The proposed serious game works on the life cycle of a new software enterprise where the entrepreneur moves from the planning stage to secured financial stage, laying down the basic business structure, and initiates the operations ensuring the increment in confidence level of the player.

Keywords: business model, game based learning, poor management, start up

Procedia PDF Downloads 471
25278 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 135
25277 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 244
25276 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 166
25275 Taguchi-Based Surface Roughness Optimization for Slotted and Tapered Cylindrical Products in Milling and Turning Operations

Authors: Vineeth G. Kuriakose, Joseph C. Chen, Ye Li

Abstract:

The research follows a systematic approach to optimize the parameters for parts machined by turning and milling processes. The quality characteristic chosen is surface roughness since the surface finish plays an important role for parts that require surface contact. A tapered cylindrical surface is designed as a test specimen for the research. The material chosen for machining is aluminum alloy 6061 due to its wide variety of industrial and engineering applications. HAAS VF-2 TR computer numerical control (CNC) vertical machining center is used for milling and HAAS ST-20 CNC machine is used for turning in this research. Taguchi analysis is used to optimize the surface roughness of the machined parts. The L9 Orthogonal Array is designed for four controllable factors with three different levels each, resulting in 18 experimental runs. Signal to Noise (S/N) Ratio is calculated for achieving the specific target value of 75 ± 15 µin. The controllable parameters chosen for turning process are feed rate, depth of cut, coolant flow and finish cut and for milling process are feed rate, spindle speed, step over and coolant flow. The uncontrollable factors are tool geometry for turning process and tool material for milling process. Hypothesis testing is conducted to study the significance of different uncontrollable factors on the surface roughnesses. The optimal parameter settings were identified from the Taguchi analysis and the process capability Cp and the process capability index Cpk were improved from 1.76 and 0.02 to 3.70 and 2.10 respectively for turning process and from 0.87 and 0.19 to 3.85 and 2.70 respectively for the milling process. The surface roughnesses were improved from 60.17 µin to 68.50 µin, reducing the defect rate from 52.39% to 0% for the turning process and from 93.18 µin to 79.49 µin, reducing the defect rate from 71.23% to 0% for the milling process. The purpose of this study is to efficiently utilize the Taguchi design analysis to improve the surface roughness.

Keywords: surface roughness, Taguchi parameter design, CNC turning, CNC milling

Procedia PDF Downloads 153
25274 Development of the Logistic Service Providers under the Pandemic Affects during COVID-19 in Turkey

Authors: Süleyman Günes

Abstract:

The crucial effects of the COVID-19 pandemic have on social and economic systems in Turkey as well as all over the world. It has impacted logistic providers and worldwide supply chains. Unexpected risks played a central role in creating vulnerabilities for logistics service operations during the pandemic terms. This study aims to research and design qualitative and quantitive contributions to logistic services. The COVID-19 pandemic brought unavoidable risks to the logistics industry in Turkey. The Logistic Service Providers (LSPs) have learned how to ensure uncertainties and risks triggered by main and adverse effects. The risks that LSPs encounter during the COVID-19 pandemic have been investigated and unveiled, and identified uncertainties and risks. The cause-effect structures were displayed by the qualitative and quantitive studies. The results suggest that supply chains and demand changes triggered by the COVID-19 pandemic while it influenced financial failure and forecast horizon with operational performances.

Keywords: logistic service providers, COVID-19, development, financial failure

Procedia PDF Downloads 71
25273 Ta-DAH: Task Driven Automated Hardware Design of Free-Flying Space Robots

Authors: Lucy Jackson, Celyn Walters, Steve Eckersley, Mini Rai, Simon Hadfield

Abstract:

Space robots will play an integral part in exploring the universe and beyond. A correctly designed space robot will facilitate OOA, satellite servicing and ADR. However, problems arise when trying to design such a system as it is a highly complex multidimensional problem into which there is little research. Current design techniques are slow and specific to terrestrial manipulators. This paper presents a solution to the slow speed of robotic hardware design, and generalizes the technique to free-flying space robots. It presents Ta-DAH Design, an automated design approach that utilises a multi-objective cost function in an iterative and automated pipeline. The design approach leverages prior knowledge and facilitates the faster output of optimal designs. The result is a system that can optimise the size of the base spacecraft, manipulator and some key subsystems for any given task. Presented in this work is the methodology behind Ta-DAH Design and a number optimal space robot designs.

Keywords: space robots, automated design, on-orbit operations, hardware design

Procedia PDF Downloads 67
25272 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)

Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram

Abstract:

The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.

Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)

Procedia PDF Downloads 87
25271 The Role of Establishing Zakat-Based Finance in Alleviating Poverty in the Muslim World

Authors: Khan Md. Abdus Subhan, Rabeya Bushra

Abstract:

The management of Intellectual Property (IP) in museums can be complex and challenging, as it requires balancing access and control. On the one hand, museums must ensure that they have balanced permissions to display works in their collections and make them accessible to the public. On the other hand, they must also protect the rights of creators and owners of works and ensure that they are not infringing on IP rights. Intellectual property has become an increasingly important aspect of museum operations in the digital age. Museums hold a vast array of cultural assets in their collections, many of which have significant value as IP assets. The balanced management of IP in museums can help generate additional revenue and promote cultural heritage while also protecting the rights of the museum and its collections. Digital technologies have greatly impacted the way museums manage IP, providing new opportunities for revenue generation through e-commerce and licensing while also presenting new challenges related to IP protection and management. Museums must take a comprehensive approach to IP management, leveraging digital technologies, protecting IP rights, and engaging in licensing and e-commerce activities to maximize income and the economy of countries through the strong management of cultural institutions. Overall, the balanced management of IP in museums is crucial for ensuring the sustainability of museum operations and for preserving cultural heritage for future generations. By taking a balanced approach to identifying museum IP assets, museums can generate revenues and secure their financial sustainability to ensure the long-term preservation of their cultural heritage. We can divide IP assets in museums into two kinds: collection IP and museum-generated IP. Certain museums become confused and lose sight of their mission when trying to leverage collections-based IP. This was the case at the German State Museum in Berlin when the museum made 100 replicas from the Nefertiti bust and wrote under the replicas all rights reserved to the Berlin Museum and issued a certificate to prevent any person or Institution from reproducing any replica from this bust. The implications of IP in museums are far-reaching and can have significant impacts on the preservation of cultural heritage, the dissemination of information, and the development of educational programs. As such, it is important for museums to have a comprehensive understanding of IP laws and regulations and to properly manage IP to avoid legal liability, damage to reputation, and loss of revenue. The research aims to highlight the importance and role of intellectual property in museums and provide some illustrative examples of this.

Keywords: zakat, economic development, Muslim world, poverty alleviation.

Procedia PDF Downloads 33
25270 Ambivalence in Embracing Artificial Intelligence in the Units of a Public Hospital in South Africa

Authors: Sanele E. Nene L., Lia M. Hewitt

Abstract:

Background: Artificial intelligence (AI) has a high value in healthcare, various applications have been developed for the efficiency of clinical operations, such as appointment/surgery scheduling, diagnostic image analysis, prognosis, prediction and management of specific ailments. Purpose: The purpose of this study was to explore, describe, contrast, evaluate, and develop the various leadership strategies as a conceptual framework, applied by public health Operational Managers (OMs) to embrace AI benefits, with the aim to improve the healthcare system in a public hospital. Design and Method: A qualitative, exploratory, descriptive and contextual research design was followed and a descriptive phenomenological approach. Five phases were followed to conduct this study. Phenomenological individual interviews and focus groups were used to collect data and a phenomenological thematic data analysis method was used. Findings and conclusion: Three themes surfaced as the experiences of AI by the OMs; Positive experiences related to AI, Management and leadership processes in AI facilitation, and Challenges related to AI.

Keywords: ambivalence, embracing, Artificial intelligence, public hospital

Procedia PDF Downloads 76
25269 Smart Campus Digital Twin: Basic Framework - Current State, Trends and Challenges

Authors: Enido Fabiano de Ramos, Ieda Kanashiro Makiya, Francisco I. Giocondo Cesar

Abstract:

This study presents an analysis of the Digital Twin concept applied to the academic environment, focusing on the development of a Digital Twin Smart Campus Framework. Using bibliometric analysis methodologies and literature review, the research investigates the evolution and applications of the Digital Twin in educational contexts, comparing these findings with the advances of Industry 4.0. It was identified gaps in the existing literature and highlighted the need to adapt Digital Twin principles to meet the specific demands of a smart campus. By integrating Industry 4.0 concepts such as automation, Internet of Things, and real-time data analytics, we propose an innovative framework for the successful implementation of the Digital Twin in academic settings. The results of this study provide valuable insights for university campus managers, allowing for a better understanding of the potential applications of the Digital Twin for operations, security, and user experience optimization. In addition, our framework offers practical guidance for transitioning from a digital campus to a digital twin smart campus, promoting innovation and efficiency in the educational environment. This work contributes to the growing literature on Digital Twins and Industry 4.0, while offering a specific and tailored approach to transforming university campuses into smart and connected spaces, high demanded by Society 5.0 trends. It is hoped that this framework will serve as a basis for future research and practical implementations in the field of higher education and educational technology.

Keywords: smart campus, digital twin, industry 4.0, education trends, society 5.0

Procedia PDF Downloads 52
25268 Management of Small-Scale Companies in Nigeria. Case Study of Problems Faced by Entrepreneurs

Authors: Aderemi, Moses Aderibigbe

Abstract:

The supply chain of a manufacturing company can be classified into three categories, namely: 1) supplier chain, these are a network of suppliers of raw materials, machinery, and other requirements for daily operations for the company; 2) internal chain, which are departmental or functional relationships within the organization like production, finance, marketing, logistic and quality control departments all interacting together to achieve the goals and objective of the company; and 3) customer chain; these are networks used for products distribution to the final consumer which includes the product distributors and retailers in the marketplace as may be applicable. In a developing country like Nigeria, where government infrastructures are poor or, in some cases, none in existence, the survival of a small-scale manufacturing company often depends on how effectively its supply chain is managed. In Nigeria, suppliers of machinery and raw materials to most manufacturing companies are from low-cost but high-tech countries like China or India. The problem with the supply chain from these countries apart from the language barrier between these countries and Nigeria, is also that of product quality and after-sales support services. The internal chain also requires funding to employ an experienced and trained workforce to deliver the company’s goals and objectives effectively and efficiently, which is always a challenge for small-scale manufacturers, including product marketing. In Nigeria, the management of the supply chain by small-scale manufacturers is further complicated by unfavourable government policies. This empirical research is a review and analysis of the supply chain management of a small-scale manufacturing company located in Lagos, Nigeria. The company's performance for the past five years has been on the decline and company management thinks there is a need for a review of its supply chain management for business survival. The company’s supply chain is analyzed and compared with best global practices in this research, and recommendations are made to the company management. The research outcome justifies the company’s need for a strategic change in its supply chain management for business sustainability and provides a learning point to small-scale manufacturing companies from developing countries in Africa

Keywords: management, small scale, supply chain, companies, leaders

Procedia PDF Downloads 11
25267 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 101
25266 Evaluation of Access to Finance for Local Oil Fields Companies in Ghana

Authors: Gordon Newlove Asamoah, Wendy Ama Oti

Abstract:

This study focused on evaluating access to finance for local oil field companies in Ghana. The study adopted a census survey design in evaluating access to finance for local oil field companies in Ghana. The respondents of this study were 30 management members of three oil field companies in Ghana. The data collected was analysed using Statistical Package for Social Scientists (SPSS) to generate tables and graphs for interpretation. The results show that most companies use equity financing in combination with other forms of financing to finance their business activities. This research has shown the various challenges bordering on the financing of local oil and gas projects, with emphasis on the challenges of raising funds by indigenous oil companies. Financing of the projects by indigenous oil field companies in Ghana is preferably achieved through equity finance mainly because it is the easiest to get compared to all the other forms of financing available. Other sources of financing available are debt financing, joint venture, and retained earnings from the profits generated from their operations. The study made recommendations to local oil field companies as to how they can make good use of the capital market to raise financing.

Keywords: access, financing, oil fields, Ghana

Procedia PDF Downloads 101
25265 Your First Step to Understanding Research Ethics: Psychoneurolinguistic Approach

Authors: Sadeq Al Yaari, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari

Abstract:

Objective: This research aims at investigating the research ethics in the field of science. Method: It is an exploratory research wherein the researchers attempted to cover the phenomenon at hand from all specialists’ viewpoints. Results Discussion is based upon the findings resulted from the analysis the researcher undertook. Concerning the results’ prediction, the researcher needs first to seek highly qualified people in the field of research as well as in the field of statistics who share the philosophy of the research. Then s/he should make sure that s/he is adequately trained in the specific techniques, methods and statically programs that are used at the study. S/he should also believe in continually analysis for the data in the most current methods.

Keywords: research ethics, legal, rights, psychoneurolinguistics

Procedia PDF Downloads 36
25264 Protocol for Consumer Research in Academia for Community Marketing Campaigns

Authors: Agnes J. Otjen, Sarah Keller

Abstract:

A Montana university has used applied consumer research in experiential learning with non-profit clients for over a decade. Through trial and error, a successful protocol has been established from problem statement through formative research to integrated marketing campaign execution. In this paper, we describe the protocol and its applications. Analysis was completed to determine the effectiveness of the campaigns and the results of how pre- and post-consumer research mark societal change because of media.

Keywords: consumer, research, marketing, communications

Procedia PDF Downloads 128
25263 Role and Impact of Artificial Intelligence in Sales and Distribution Management

Authors: Kiran Nair, Jincy George, Suhaib Anagreh

Abstract:

Artificial intelligence (AI) in a marketing context is a form of a deterministic tool designed to optimize and enhance marketing tasks, research tools, and techniques. It is on the verge of transforming marketing roles and revolutionize the entire industry. This paper aims to explore the current dissemination of the application of artificial intelligence (AI) in the marketing mix, reviewing the scope and application of AI in various aspects of sales and distribution management. The paper also aims at identifying the areas of the strong impact of AI in factors of sales and distribution management such as distribution channel, purchase automation, customer service, merchandising automation, and shopping experiences. This is a qualitative research paper that aims to examine the impact of AI on sales and distribution management of 30 multinational brands in six different industries, namely: airline; automobile; banking and insurance; education; information technology; retail and telecom. Primary data is collected by means of interviews and questionnaires from a sample of 100 marketing managers that have been selected using convenient sampling method. The data is then analyzed using descriptive statistics, correlation analysis and multiple regression analysis. The study reveals that AI applications are extensively used in sales and distribution management, with a strong impact on various factors such as identifying new distribution channels, automation in merchandising, customer service, and purchase automation as well as sales processes. International brands have already integrated AI extensively in their day-to-day operations for better efficiency and improved market share while others are investing heavily in new AI applications for gaining competitive advantage.

Keywords: artificial intelligence, sales and distribution, marketing mix, distribution channel, customer service

Procedia PDF Downloads 151
25262 A General Framework for Measuring the Internal Fraud Risk of an Enterprise Resource Planning System

Authors: Imran Dayan, Ashiqul Khan

Abstract:

Internal corporate fraud, which is fraud carried out by internal stakeholders of a company, affects the well-being of the organisation just like its external counterpart. Even if such an act is carried out for the short-term benefit of a corporation, the act is ultimately harmful to the entity in the long run. Internal fraud is often carried out by relying upon aberrations from usual business processes. Business processes are the lifeblood of a company in modern managerial context. Such processes are developed and fine-tuned over time as a corporation grows through its life stages. Modern corporations have embraced technological innovations into their business processes, and Enterprise Resource Planning (ERP) systems being at the heart of such business processes is a testimony to that. Since ERP systems record a huge amount of data in their event logs, the logs are a treasure trove for anyone trying to detect any sort of fraudulent activities hidden within the day-to-day business operations and processes. This research utilises the ERP systems in place within corporations to assess the likelihood of prospective internal fraud through developing a framework for measuring the risks of fraud through Process Mining techniques and hence finds risky designs and loose ends within these business processes. This framework helps not only in identifying existing cases of fraud in the records of the event log, but also signals the overall riskiness of certain business processes, and hence draws attention for carrying out a redesign of such processes to reduce the chance of future internal fraud while improving internal control within the organisation. The research adds value by applying the concepts of Process Mining into the analysis of data from modern day applications of business process records, which is the ERP event logs, and develops a framework that should be useful to internal stakeholders for strengthening internal control as well as provide external auditors with a tool of use in case of suspicion. The research proves its usefulness through a few case studies conducted with respect to big corporations with complex business processes and an ERP in place.

Keywords: enterprise resource planning, fraud risk framework, internal corporate fraud, process mining

Procedia PDF Downloads 327
25261 Design, Development, and Implementation of the Pediatric Physical Therapy Senior Clinical Internship Telerehabilitation Program of de la Salle Medical and Health Sciences Institute: The Pandemic Impetus

Authors: Ma. Cecilia D. Licuan

Abstract:

The pandemic situation continues to affect the lives of many people, including children with disabilities and their families, globally, especially in developing countries like the Philippines. The operations of health programs, industries, and economic sectors, as well as academic training institutions, are still challenged in terms of operations and delivery of services. The academic community of the Physical Therapy program is not spared by this circumstance. The restriction posted by the quarantine policies nearly terminated the onsite delivery of training programs for the senior internship level, which challenged the academic institutions to implement flexible learning programs to ensure the continuity of the instructional and learning processes with full consideration of safety and compliance to health protocols. This study aimed to develop a benchmark model that can be used by tertiary-level health institutions in the implementation of the Pediatric Senior Clinical Internship Training Program using Telerehabilitation. It is a descriptive-qualitative paper that utilized documentary analysis and focused on explaining the design, development, and implementation processes used by De La Salle Medical and Health Sciences Institute – College of Rehabilitation Sciences (DLSMHSI-CRS) Physical Therapy Department in its Pediatric Cluster Senior Clinical Internship Training Program covering the pandemic years spanning from the academic year 2020- 2021 to present anchored on needs analysis based on documentary reviews. Results of the study yielded the determination of the Pediatric Telerehabilitation Model; declaration of developed training program outcomes and thrusts and content; explanation of the process integral to the training program’s pedagogy in implementation; and the evaluation procedures conducted for the program. Since the study did not involve human participants, ethical considerations on the use of documents for review were done upon the endorsement of the management of the DLSMHSI-CRS to conduct the study. This paper presents the big picture of how a tertiary-level health sciences institution in the Philippines embraced the senior clinical internship challenges through the operations of its telerehabilitation program. It specifically presents the design, development and implementation processes used by De La Salle Medical and Health Sciences Institute – College of Rehabilitation Sciences Physical Therapy Department in its Pediatric Cluster Senior Clinical Internship Training Program, which can serve as a benchmark model for other institutions as they continue to serve their stakeholders amidst the pandemic.

Keywords: pediatric physical therapy, telerehabilitation, clinical internship, pandemic

Procedia PDF Downloads 120
25260 Evaluation of Regional Anaesthesia Practice in Plastic Surgery: A Retrospective Cross-Sectional Study

Authors: Samar Mousa, Ryan Kerstein, Mohanad Adam

Abstract:

Regional anaesthesia has been associated with favourable outcomes in patients undergoing a wide range of surgeries. Beneficial effects have been demonstrated in terms of postoperative respiratory and cardiovascular endpoints, 7-day survival, time to ambulation and hospital discharge, and postoperative analgesia. Our project aimed at assessing the regional anaesthesia practice in the plastic surgery department of Buckinghamshire trust and finding out ways to improve the service in collaboration with the anaesthesia team. It is a retrospective study associated with a questionnaire filled out by plastic surgeons and anaesthetists to get the full picture behind the numbers. The study period was between 1/3/2022 and 23/5/2022 (12 weeks). The operative notes of all patients who had an operation under plastic surgery, whether emergency or elective, were reviewed. The criteria of suitable candidates for the regional block were put by the consultant anaesthetists as follows: age above 16, single surgical site (arm, forearm, leg, foot), no drug allergy, no pre-existing neuropathy, no bleeding disorders, not on ant-coagulation, no infection to the site of the block. For 12 weeks, 1061 operations were performed by plastic surgeons. Local cases were excluded leaving 319 cases. Of the 319, 102 patients were suitable candidates for regional block after applying the previously mentioned criteria. However, only seven patients had their operations under the regional block, and the rest had general anaesthesia that could have been easily avoided. An online questionnaire was filled out by both plastic surgeons and anaesthetists of different training levels to find out the reasons behind the obvious preference for general over regional anaesthesia, even if this was against the patients’ interest. The questionnaire included the following points: training level, time taken to give GA or RA, factors that influence the decision, percentage of RA candidates that had GA, reasons behind this percentage, recommendations. Forty-four clinicians filled out the questionnaire, among which were 23 plastic surgeons and 21 anaesthetists. As regards the training level, there were 21 consultants, 4 associate specialists, 9 registrars, and 10 senior house officers. The actual percentage of patients who were good candidates for RA but had GA instead is 93%. The replies estimated this percentage as between 10-30%. 29% of the respondents thought that this percentage is because of surgeons’ preference to have GA rather than RA for their operations without medical support for the decision. 37% of the replies thought that anaesthetists prefer giving GA even if the patient is a suitable candidate for RA. 22.6% of the replies thought that patients refused to have RA, and 11.3% had other causes. The recommendations were in 5 main accesses, which are protocols and pathways for regional blocks, more training opportunities for anaesthetists on regional blocks, providing a separate block room in the hospital, better communication between surgeons and anaesthetists, patient education about the benefits of regional blocks.

Keywords: regional anaesthesia, regional block, plastic surgery, general anaesthesia

Procedia PDF Downloads 81
25259 Study of Properties of Concretes Made of Local Building Materials and Containing Admixtures, and Their Further Introduction in Construction Operations and Road Building

Authors: Iuri Salukvadze

Abstract:

Development of Georgian Economy largely depends on its effective use of its transit country potential. The value of Georgia as the part of Europe-Asia corridor has increased; this increases the interest of western and eastern countries to Georgia as to the country that laid on the transit axes that implies transit infrastructure creation and development in Georgia. It is important to use compacted concrete with the additive in modern road construction industry. Even in the 21-century, concrete remains as the main vital constructive building material, therefore innovative, economic and environmentally protected technologies are needed. Georgian construction market requires the use of concrete of new generation, adaptation of nanotechnologies to the local realities that will give the ability to create multifunctional, nano-technological high effective materials. It is highly important to research their physical and mechanical states. The study of compacted concrete with the additives is necessary to use in the road construction in the future and to increase hardness of roads in Georgia. The aim of the research is to study the physical-mechanical properties of the compacted concrete with the additives based on the local materials. Any experimental study needs large number of experiments from one side in order to achieve high accuracy and optimal number of the experiments with minimal charges and in the shortest period of time from the other side. To solve this problem in practice, it is possible to use experiments planning static and mathematical methods. For the materials properties research we will use distribution hypothesis, measurements results by normal law according to which divergence of the obtained results is caused by the error of method and inhomogeneity of the object. As the result of the study, we will get resistible compacted concrete with additives for the motor roads that will improve roads infrastructure and give us saving rate while construction of the roads and their exploitation.

Keywords: construction, seismic protection systems, soil, motor roads, concrete

Procedia PDF Downloads 235
25258 A Content Analysis of Sustainability Reporting to Frame the Heterogeneity in Corporate Environment Sustainability Practices

Authors: Venkataraman Sankaranarayanan, Sougata Ray

Abstract:

While extant research has examined many aspects of differential corporate environmental outcomes and behavior, a holistic and integrated view of heterogeneity in corporate environment sustainability (CES) practices remains a puzzle to be fully unraveled – its extent and nature, its relationship to macro or micro level influences, or strategic orientations. Such a perspective would be meaningful for the field given notable strides in CES practices and the corporate social responsibility agenda over the last two decades, in the backdrop of altered global socio-political sensitivities and technological advances. To partly address this gap, this exploratory research adopted a content analysis approach to code patterns in the sustainability disclosures of the 160 largest global firms spread over 8 years. The sample of firms spanned seven industries, nine countries and three continents thereby presenting data rich and diverse enough in several dimensions to be representative of global heterogeneity in CES practices. Through a factor analysis of the coded data, four strategic CES orientations were extracted through the analysis, that effectively straddles most of the variation observed in current CES practices – one that seeks to reduce environmental damage on account of the firm’s operations, another that prioritizes minimalism, a third that focuses on broader ecological status quo, and a final one that champions the ‘business of green’, extending the CES agenda beyond the firm’s boundaries. These environment sustainability strategy orientations are further examined to elicit prominent patterns and explore plausible antecedents.

Keywords: corporate social responsibility, corporate sustainability, environmental management, heterogeneity, strategic orientation

Procedia PDF Downloads 329
25257 Bi-objective Network Optimization in Disaster Relief Logistics

Authors: Katharina Eberhardt, Florian Klaus Kaiser, Frank Schultmann

Abstract:

Last-mile distribution is one of the most critical parts of a disaster relief operation. Various uncertainties, such as infrastructure conditions, resource availability, and fluctuating beneficiary demand, render last-mile distribution challenging in disaster relief operations. The need to balance critical performance criteria like response time, meeting demand and cost-effectiveness further complicates the task. The occurrence of disasters cannot be controlled, and the magnitude is often challenging to assess. In summary, these uncertainties create a need for additional flexibility, agility, and preparedness in logistics operations. As a result, strategic planning and efficient network design are critical for an effective and efficient response. Furthermore, the increasing frequency of disasters and the rising cost of logistical operations amplify the need to provide robust and resilient solutions in this area. Therefore, we formulate a scenario-based bi-objective optimization model that integrates pre-positioning, allocation, and distribution of relief supplies extending the general form of a covering location problem. The proposed model aims to minimize underlying logistics costs while maximizing demand coverage. Using a set of disruption scenarios, the model allows decision-makers to identify optimal network solutions to address the risk of disruptions. We provide an empirical case study of the public authorities’ emergency food storage strategy in Germany to illustrate the potential applicability of the model and provide implications for decision-makers in a real-world setting. Also, we conduct a sensitivity analysis focusing on the impact of varying stockpile capacities, single-site outages, and limited transportation capacities on the objective value. The results show that the stockpiling strategy needs to be consistent with the optimal number of depots and inventory based on minimizing costs and maximizing demand satisfaction. The strategy has the potential for optimization, as network coverage is insufficient and relies on very high transportation and personnel capacity levels. As such, the model provides decision support for public authorities to determine an efficient stockpiling strategy and distribution network and provides recommendations for increased resilience. However, certain factors have yet to be considered in this study and should be addressed in future works, such as additional network constraints and heuristic algorithms.

Keywords: humanitarian logistics, bi-objective optimization, pre-positioning, last mile distribution, decision support, disaster relief networks

Procedia PDF Downloads 76
25256 Perspectives of Computational Modeling in Sanskrit Lexicons

Authors: Baldev Ram Khandoliyan, Ram Kishor

Abstract:

India has a classical tradition of Sanskrit Lexicons. Research work has been done on the study of Indian lexicography. India has seen amazing strides in Information and Communication Technology (ICT) applications for Indian languages in general and for Sanskrit in particular. Since Machine Translation from Sanskrit to other Indian languages is often the desired goal, traditional Sanskrit lexicography has attracted a lot of attention from the ICT and Computational Linguistics community. From Nighaŋţu and Nirukta to Amarakośa and Medinīkośa, Sanskrit owns a rich history of lexicography. As these kośas do not follow the same typology or standard in the selection and arrangement of the words and the information related to them, several types of Kośa-styles have emerged in this tradition. The model of a grammar given by Aṣṭādhyāyī is well appreciated by Indian and western linguists and grammarians. But the different models provided by lexicographic tradition also have importance. The general usefulness of Sanskrit traditional Kośas is well discussed by some scholars. That is most of the matter made available in the text. Some also have discussed the good arrangement of lexica. This paper aims to discuss some more use of the different models of Sanskrit lexicography especially focusing on its computational modeling and its use in different computational operations.

Keywords: computational lexicography, Sanskrit Lexicons, nighanṭu, kośa, Amarkosa

Procedia PDF Downloads 160
25255 Standardization of Solar Water Pumping System for Remote Areas in Indonesia

Authors: Danar Agus Susanto, Hermawan Febriansyah, Meilinda Ayundyahrini

Abstract:

The availability of spring water to meet people demand is often a problem, especially in tropical areas with very limited surface water sources, or very deep underground water. Although the technology and equipment of pumping system are available and easy to obtain, but in remote areas, the availability of pumping system is difficult, due to the unavailability of fuel or the lack of electricity. Solar Water Pumping System (SWPS) became one of the alternatives that can overcome these obstacles. In the tropical country, sunlight can be obtained throughout the year, even in remote areas. SWPS were already widely built in Indonesia, but many encounter problems during operations, such as decreased of efficiency; pump damaged, damaged of controllers or inverters, and inappropriate photovoltaic performance. In 2011, International Electrotechnical Commission (IEC) issued the IEC standard 62253:2011 titled Photovoltaic pumping systems - Design qualification and performance measurements. This standard establishes design qualifications and performance measurements related to the product of a solar water pumping system. National Standardization Agency of Indonesia (BSN) as the national standardization body in Indonesia, has not set the standard related to solar water pumping system. This research to study operational procedures of SWPS by adopting of IEC Standard 62253:2011 to be Indonesia Standard (SNI). This research used literature study and field observation for installed SWPS in Indonesia. Based on the results of research on SWPS already installed in Indonesia, IEC 62253: 2011 standard can improve efficiency and reduce operational failure of SWPS. SWPS installed in Indonesia still has GAP of 51% against parameters in IEC standard 62253: 2011. The biggest factor not being met is related to operating and maintenance handbooks for personnel that included operation and repair procedures. This may result in operator ignorance in installing, operating and maintaining the system. The Photovoltaic (PV) was also the most non-compliance factor of 71%, although there are 22 Indonesia Standard (SNI) for PV (modules, installation, testing, and construction). These research samples (installers, manufacturers/distributors, and experts) agreed on the parameter in the IEC standard 62253: 2011 able to improve the quality of SWPS in Indonesia. Recommendations of this study, that is required the adoption of IEC standard 62253:2011 into SNI to support the development of SWPS for remote areas in Indonesia.

Keywords: efficiency, inappropriate installation, remote areas, solar water pumping system, standard

Procedia PDF Downloads 197
25254 The Sea Striker: The Relevance of Small Assets Using an Integrated Conception with Operational Performance Computations

Authors: Gaëtan Calvar, Christophe Bouvier, Alexis Blasselle

Abstract:

This paper presents the Sea Striker, a compact hydrofoil designed with the goal to address some of the issues raised by the recent evolutions of naval missions, threats and operation theatres in modern warfare. Able to perform a wide range of operations, the Sea Striker is a 40-meter stealth surface combatant equipped with a gas turbine and aft and forward foils to reach high speeds. The Sea Striker's stealthiness is enabled by the combination of composite structure, exterior design, and the advanced integration of sensors. The ship is fitted with a powerful and adaptable combat system, ensuring a versatile and efficient response to modern threats. Lightly Manned with a core crew of 10, this hydrofoil is highly automated and can be remoted pilote for special force operation or transit. Such a kind of ship is not new: it has been used in the past by different navies, for example, by the US Navy with the USS Pegasus. Nevertheless, the recent evolutions in science and technologies on the one hand, and the emergence of new missions, threats and operation theatres, on the other hand, put forward its concept as an answer to nowadays operational challenges. Indeed, even if multiples opinions and analyses can be given regarding the modern warfare and naval surface operations, general observations and tendencies can be drawn such as the major increase in the sensors and weapons types and ranges and, more generally, capacities; the emergence of new versatile and evolving threats and enemies, such as asymmetric groups, swarm drones or hypersonic missile; or the growing number of operation theatres located in more coastal and shallow waters. These researches were performed with a complete study of the ship after several operational performance computations in order to justify the relevance of using ships like the Sea Striker in naval surface operations. For the selected scenarios, the conception process enabled to measure the performance, namely a “Measure of Efficiency” in the NATO framework for 2 different kinds of models: A centralized, classic model, using large and powerful ships; and A distributed model relying on several Sea Strikers. After this stage, a was performed. Lethal, agile, stealth, compact and fitted with a complete set of sensors, the Sea Striker is a new major player in modern warfare and constitutes a very attractive response between the naval unit and the combat helicopter, enabling to reach high operational performances at a reduced cost.

Keywords: surface combatant, compact, hydrofoil, stealth, velocity, lethal

Procedia PDF Downloads 116
25253 Shooting Gas Cylinders to Prevent Their Explosion in Fire

Authors: Jerzy Ejsmont, Beata Świeczko-Żurek, Grzegorz Ronowski

Abstract:

Gas cylinders in general and particularly cylinders containing acetylene constitute a great potential danger for fire and rescue services involved in salvage operations. Experiments show that gas cylinders with acetylene, oxygen, hydrogen, CNG, LPG or CO2 may blow after short exposition to heat with very destructive effect as fragments of blown cylinder may fly even several hundred meters. In the case of acetylene, the explosion may occur also several hours after the cylinder is cooled down. One of the possible neutralization procedures that in many cases may be used to prevent explosions is shooting dangerous cylinders by rifle bullets. This technique is used to neutralize acetylene cylinders in a few European countries with great success. In Poland research project 'BLOW' was launched in 2014 with the aim to investigate phenomena related to fire influence on industrial and home used cylinders and to evaluate usefulness of the shooting technique. All together over 100 gas cylinders with different gases were experimentally tested at the military blasting grounds and in shelters. During the experiments cylinder temperature and pressure were recorded. In the case of acetylene that is subjected to thermal decomposition also concentration of hydrogen was monitored. Some of the cylinders were allowed to blow and others were shot by snipers. It was observed that shooting hot cylinders has never created more dangerous situations than letting the cylinders to explode spontaneously. In a great majority of cases cylinders that were punctured by bullets released gas in a more or less violent but relatively safe way. The paper presents detailed information about experiments and presents particularities of behavior of cylinders containing different gases. Extensive research was also done in order to select bullets that may be safely and efficiently used to puncture different cylinders. The paper shows also results of those experiments as well as gives practical information related to techniques that should be used during shooting.

Keywords: fire, gas cylinders, neutralization, shooting

Procedia PDF Downloads 257
25252 Effects of Clinical Practice Guidelines for Central Venous Catheter to Infection Rate and Nurse’s Satisfaction in Medicine Intensive Care Unit 240 Hat Yai Hospital, Thailand

Authors: Jiranun Sreecharit, Anongnat Boonrut, Kunvadee Munvaradee, Phechnoy Singchungchai

Abstract:

Hatyai Hospital as center of hospital with a capacity of 670 beds. Medicine intensive care units (MICU240) provide care for critically ill patients who are at high risk need to be monitored closely. Intravenous catheter is vital to help assess the level of water in the body fluids and medications. Potential complications such as infection. We need to have guidelines for the care of patients who received intravenous catheter used to achieve good results. The operations research in this study was intended 1) To study the effects of practice for nurses in caring for patients with central venous catheter to infection rate and 2) To assess the satisfaction of nurses and patient care practices in central venous catheterization patients in the MICU 240. The sample of the patient's central venous catheter crisis that everyone who admitted in MICU 240 during the period from October 2013 to May 2014. Samples prior to practice and 148 samples with 249 case of practice. A systematic review of the research NSWHealth Statewide Guideline for Intensive Care. Data were analyzed by statistics, percentages and frequency NON-PARAMETRICS with Mann-Whitney U. The finding revealed that: 1. Results of the practice patient care central venous catheter infection rates were found to be reduced from 35.14 percent to 25.3 percent. 2. The results of the evaluation of nurses and patients in the patient care practices central venous catheter found to be satisfied and happy to work 85 percent.

Keywords: clinical practice guidelines, central venous catheter, infection satisfaction

Procedia PDF Downloads 473
25251 Ethical Decision-Making in AI and Robotics Research: A Proposed Model

Authors: Sylvie Michel, Emmanuelle Gagnou, Joanne Hamet

Abstract:

Researchers in the fields of AI and Robotics frequently encounter ethical dilemmas throughout their research endeavors. Various ethical challenges have been pinpointed in the existing literature, including biases and discriminatory outcomes, diffusion of responsibility, and a deficit in transparency within AI operations. This research aims to pinpoint these ethical quandaries faced by researchers and shed light on the mechanisms behind ethical decision-making in the research process. By synthesizing insights from existing literature and acknowledging prevalent shortcomings, such as overlooking the heterogeneous nature of decision-making, non-accumulative results, and a lack of consensus on numerous factors due to limited empirical research, the objective is to conceptualize and validate a model. This model will incorporate influences from individual perspectives and situational contexts, considering potential moderating factors in the ethical decision-making process. Qualitative analyses were conducted based on direct observation of an AI/Robotics research team focusing on collaborative robotics for several months. Subsequently, semi-structured interviews with 16 team members were conducted. The entire process took place during the first semester of 2023. Observations were analyzed using an analysis grid, and the interviews underwent thematic analysis using Nvivo software. An initial finding involves identifying the ethical challenges that AI/robotics researchers confront, underlining a disparity between practical applications and theoretical considerations regarding ethical dilemmas in the realm of AI. Notably, researchers in AI prioritize the publication and recognition of their work, sparking the genesis of these ethical inquiries. Furthermore, this article illustrated that researchers tend to embrace a consequentialist ethical framework concerning safety (for humans engaging with robots/AI), worker autonomy in relation to robots, and the societal implications of labor (can robots displace jobs?). A second significant contribution entails proposing a model for ethical decision-making within the AI/Robotics research sphere. The model proposed adopts a process-oriented approach, delineating various research stages (topic proposal, hypothesis formulation, experimentation, conclusion, and valorization). Across these stages and the ethical queries, they entail, a comprehensive four-point comprehension of ethical decision-making is presented: recognition of the moral quandary; moral judgment, signifying the decision-maker's aptitude to discern the morally righteous course of action; moral intention, reflecting the ability to prioritize moral values above others; and moral behavior, denoting the application of moral intention to the situation. Variables such as political inclinations ((anti)-capitalism, environmentalism, veganism) seem to wield significant influence. Moreover, age emerges as a noteworthy moderating factor. AI and robotics researchers are continually confronted with ethical dilemmas during their research endeavors, necessitating thoughtful decision-making. The contribution involves introducing a contextually tailored model, derived from meticulous observations and insightful interviews, enabling the identification of factors that shape ethical decision-making at different stages of the research process.

Keywords: ethical decision making, artificial intelligence, robotics, research

Procedia PDF Downloads 77
25250 A Review of Recent Studies on Advanced Technologies for Water Treatment

Authors: Deniz Sahin

Abstract:

Growing concern for the presence and contamination of heavy metals in our water supplies has steadily increased over the last few years. A number of specialized technologies including precipitation, coagulation/flocculation, ion exchange, cementation, electrochemical operations, have been developed for the removal of heavy metals from wastewater. However, these technologies have many limitations in the application, such as high cost, low separation efficiency, Recently, numerous approaches have been investigated to overcome these difficulties and membrane filtration, advanced oxidation technologies (AOPs), and UV irradiation etc. are sufficiently developed to be considered as alternative treatments. Many factors come into play when selecting wastewater treatment technology, such as type of wastewater, operating conditions, economics etc. This study describes these various treatment technologies employed for heavy metal removal. Advantages and disadvantages of these technologies are also compared to highlight their current limitations and future research needs. For example, we investigated the applicability of the ultrafiltration technology for treating of heavy metal ions (e.g., Cu(II), Pb(II), Cd(II), Zn(II)) from synthetic wastewater solutions. Results shown that complete removal of metal ions, could be achieved.

Keywords: heavy metal, treatment methodologies, water, water treatment

Procedia PDF Downloads 164