Search results for: embedded business intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5389

Search results for: embedded business intelligence

889 Mesovarial Morphological Changes in Offspring Exposed to Maternal Cold Stress

Authors: Ariunaa.S., Javzandulam E., Chimegsaikhan S., Altantsetseg B., Oyungerel S., Bat-Erdene T., Naranbaatar S., Otgonbayar B., Suvdaa N., Tumenbayar B.

Abstract:

Introduction: Prenatal stress has been linked to heightened allergy sensitivity in offspring. However, there is a notable absence of research on the mesovarium structure of offspring born from mothers subjected to cold stress during pregnancy. Understanding the impact of maternal cold stress on the mesovarium structure could provide valuable insights into reproductive health outcomes in offspring. Objective: This study aims to investigate structural changes in the mesovarium of offspring born from cold-stress affected rats. Material and Methods: 20 female Westar rats weighing around 200g were chosen and evenly divided into four containers; then, 2-3 male rats were introduced to each container. The Papanicolaou method was used to estimate the spermatozoa and estrus period from vaginal swabs taken from female rats at 8:00 a.m. Female rats examined with the presence of spermatozoa during the estrous phase of the estrous cycle are defined as pregnant. Pregnant rats are divided into experimental and control groups. The experimental group was stressed using the model of severe and chronic cold stress for 30 days. They were exposed to cold stress for 3 hours each morning between 8:00 and 11:00 o’clock at a temperature of minus 15 degrees Celsius. The control group was kept under normal laboratory conditions. Newborn female rats from both experimental and control groups were selected. At 2 months of age, rats were euthanized by decapitation, and their mesovaria were collected. Tissues were fixed in 4% formalin, embedded in paraffin, and sectioned into 5μm thick slices. The sections were stained with H&E and digitized by digital microscope. The area of brown fat and inflammatory infiltrations were quantified using Image J software. The blood cortisol levels were measured using ELISA. Data are expressed as the mean ± standard error of the mean (SEM). The Mann-Whitney test was used to compare the two groups. All analyses were performed using Prism (GraphPad Software). A p-value of < 0.05 was considered statistically significant. Result: Offspring born from stressed mothers exhibited significant physiological differences compared to the control group. Specifically, the body weight of offspring from stressed mothers was significantly lower than the control group (p=0.0002). Conversely, the cortisol level in offspring from stressed mothers was significantly higher (p=0.0446). Offspring born from stressed mothers showed a statistically significant increase in brown fat area compared to the control group (p=0.01). Additionally, offspring from stressed mothers had a significantly higher number of inflammatory infiltrates in their mesovarium compared to the control group (p<0.047). These results indicate the profound impact of maternal stress on offspring physiology, affecting body weight, stress hormone levels, metabolic characteristics, and inflammatory responses. Conclusion: Exposure to cold stress during pregnancy has significant repercussions on offspring physiology. Our findings demonstrate that cold stress exposure leads to increased blood cortisol levels, brown fat accumulation, and inflammatory cell infiltration in offspring. These results underscore the profound impact of maternal stress on offspring health and highlight the importance of mitigating environmental stressors during pregnancy to promote optimal offspring outcomes.

Keywords: brown fat, cold stress during pregnancy, inflammation, mesovarium

Procedia PDF Downloads 40
888 Gender Inequality in the Workplace: A Literature Review on the Discrimination of Women by Human Resources Instruments

Authors: Katja Wiedemann, Melinda Gainschnigg

Abstract:

This paper deals with gender inequality in companies. In the context of this paper, it is analyzed how women are discriminated by means of Human Resources instruments. The existing gender inequality is made apparent by the ‘Equal Pay Day. Women in Austria work without payment from 20 October onwards, which represents inequality of 21.7 percent points. This gender pay gap is due to the unequal distribution of paid and unpaid work between men and women. Since the majority of activities related to the family and care are carried out by women, there are human capital deficits on women’s side. In addition to the discrimination of women in compensation, there are also discrimination cases caused by other Human Resources instruments. The aim of this paper is to analyze the use of Human Resources instruments with regard to the discrimination of women and to identify measures to counteract this discrimination. Within the scope of this paper, possible instructions for companies on how to design and implement Human Resources instruments will be elaborated. Therefore personnel planning, recruiting, workforce management, compensation, and leadership are used as the basis for that analysis. The data were collected by a literature review and evaluated by means of a summary content analysis. The literature analysis includes papers of scientific journals from various business fields. On the basis of the results of the literature review, it is clear that women are discriminated by all analyzed Human Resources instruments. As a result, existing potentials are not optimally used. In order to limit or even prevent this loss of potential, companies must take specific measures to counteract the discrimination of women.

Keywords: employment issues, gender inequality , women's studies, workplace

Procedia PDF Downloads 242
887 Passing the Charity Walking Tours as a Poverty Reduction Establishment in Denpasar City, Bali

Authors: I. Wayan Wiwin

Abstract:

Poverty is one of the big problems faced by big cities in the world. Urbanization one cause, many rural communities trying to earn a living to the city in the hope that they can improve the level of economy, but not equipped with adequate skills so that it becomes an urban demographic problem. Denpasar as the capital of the province of Bali one of them, in the city area of Denpasar there are many slum dwellings inhabited by the poor, whereas Bali is known as one of the best tourist destinations in the world. This condition is very inversely proportional to the progress of tourism in Bali. For that it is necessary to attempt to overcome poverty in the city of Denpasar, one with the development of city tours in the form of charity walking tours, where tourists are invited to take a walk to see directly the state of the poor in the city of Denpasar and provide assistance to them in the form of home assistance, educational scholarships, health assistance, as well as skill and business capital assistance. This research is explorative-qualitative, that is exploring the potential of charity walking tour to overcome poverty in Denpasar City, which is written qualitatively. In the end based on potential data and information, then analyzed into a decision whether it is possible to develop. Therefore, this study only requires respondents or informants who are able to provide answers or qualitative information about matters related to the potential development of charity walking tour. Thus, informants in this study are tourism stakeholders, such as Municipal government officials, businessmen, community leaders and tourism actors, who are considered to be providing information relating to the development of urban tourism.

Keywords: tourism, city tours, charity walking tours, poverty

Procedia PDF Downloads 157
886 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 278
885 Effect of Metarhizium robertsii in Rhipicephalus microplus hemocytes

Authors: Jessica P. Fiorotti, Maria C. Freitas, Caio J. B. Coutinho-Rodrigues, Mariana G. Camargo, Emily S. Mesquita, Amanda R. C. Corval, Ricardo O. B. Bitencourt, Allan F. Marciano, Diva D. Spadacci-Morena, Patricia S. Golo, Isabele C. Angelo, Vania R. E. P. Bittencourt

Abstract:

The bovine tick, Rhipicephalus microplus, is an arthropod of great importance in veterinary medicine leading to anemia, weight loss, animals' leather depreciation and also acting as a vector of many pathogens. In this way, the parasitism causes a loss of 3.24 billion dollars per year in Brazil. Knowingly, entomopathogenic fungi act as natural controller of some arthropods, acting mainly by active penetration through the cuticle. However, it can also act on the hemolymph and through the production of mycotoxins. Hemocytes are responsible for the cellular immune response and participate in the processes of phagocytosis, nodulation and encapsulation and may undergo changes when challenged by pathogens. The aim of the present study was to evaluate changes in R. microplus hemocytes after inoculation of Metarhizium robertsii using transmission electron microscopy. The isolate ARSEF 2575 and 200 engorged R. microplus females were used. The groups were divided into control, in which the females were inoculated with 5 μL of sterile distilled water solution and 0.1% Tween 80, and a group inoculated with 5 μL of fungal suspension at the concentration of 10⁷ conidia mL⁻¹. The experiment was performed in duplicate and each group contained 50 females. Twenty-four hours after fungal inoculation, hemolymph was collected through the cuticle dorsal surface perforation of the tick females. After collection, the hemolymph samples were centrifuged at 500 x g for 3 minutes at 4 °C, the plasma was discarded and the hemocyte pellet was resuspended in 50 μl PBS. The suspension material was fixed in 2% glutaraldehyde in Millonig buffer for three hours. After fixation, the material was centrifuged at 500 x g for 3 minutes, the supernatant was discarded and the cells were resuspended in a wash solution. Subsequently, the cells were post-fixed with 1% osmium tetroxide in phosphate buffer for one hour at room temperature and dehydrated in increasing concentrations of ethanol, and then embedded in Epon resin. The ultrathin sections were examined under the LEO EM 906E transmission electron microscopy at 80kV. The ultrastructural results revealed that.in control group, the cells were considered intact, in which the granulocytes were observed with granules of different electrodensities, intact mitochondria and cytoplasm without vacuolization. In addition, granulocytes showed plasma membrane projections similar to pseudopodia. Plasmatocytes presented as irregularly shaped cells, with the eccentric nucleus, agranular cytoplasm and some cells presented pseudopodia. Nevertheless, in the group exposed to the fungus, most of the cells presented in degeneration. The granulocytes found had fewer granules in the cytoplasm and more vacuoles. Plasmatocytes, after treatment, presented many vacuoles also in the cytoplasm and the lysosomes presented great amount of electrodense material in their interior. Thus, the results suggest that the fungus has a depressant action in the immune system of the tick, not only by the cell degranulation, but also suggesting that this leads to morphological changes in the hemocytes and may even trigger processes such as phagocytosis.

Keywords: bovine tick, cellular defense, entomopathogenic fungi, immune response

Procedia PDF Downloads 187
884 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 322
883 Pattern and Risk Factors of Menstrual Regulation Service Use among Ever-married Women in Bangladesh: Evidence from a Nationally Representative Cross-sectional Study

Authors: Md. Rashed Aalm, Md. Nuruzzaman Khan, Yothin Sawangdee

Abstract:

Background: Around 47% of the total pregnancies are unintended in Bangladesh, which lead to several adverse consequences, including maternal and child mortality. Use of menstrual regulation (MR) can help women to reduce unintended pregnancy related adverse consequences. We explored the prevalence and determinants of MR services among ever-married women in Bangladesh. Methods: Total of 14,346 ever-married women data were analysed from the 2017 Bangladesh Demographic and Health Survey. Our study variable was use or non-use of MR services. Individual, household, and community level factors were the explanatory factors. Multilevel mixed-effect Poisson regression model was used to determine the factors associated with MR services in Bangladesh. Results: Nearly 7% of the total women in Bangladesh use MR services. Use of MR services was found higher among women who were aged 20-30 ages (IRR 1.60, 95% CI: 1.17–2.17), who were overweight (IRR 1.43, 95% CI: 1.13–1.81), had at least 1 child (IRR 2.97, 95% CI: 2.34– 3.77) or > 2 children (IRR 3.22, 95% CI: 2.45–4.20), and the birth preceding birth interval was(2 – 4) years (IRR 1.56, 95% CI: 1.13–2.15). Around 1.39 times (95% CI: 1.11–1.73) higher likelihood of MR was found among women whose husbands were engage with business. At the community level, MR service was found lower among the women who resided in the community with higherilliteracy (IRR 0.67, 95% CI: 0.42–0.96) and the Mymensingh division (IRR 0.39, 95% CI: 0.31–0.91). Conclusion: Use of MR service is comparatively low, which indicate a significant proportion of unintended pregnancy continued toward life-birth. This could be responsible for higher adverse maternal and child health outcomes in Bangladesh. Initiatives should be taken to ensure MR services is available when women need this service.

Keywords: menstrual regulation, pattern, risk, maternal health, Bangladesh

Procedia PDF Downloads 155
882 Implementation of Unclos 1982 on Capture Fisheries in the Case of Illegal Fishing in the Waters of Indonesia’s Exclusive Economic Zone

Authors: Habson Batubara, Patawari, Lisa Mery, Mohammad Syaichuddin, Sitti Faridah, Hamzah, Akmal, Abdul Gafur, Iman Sudrajad, Lideman, Yuani Mundaya, Kamaruddin, Muslimin, Herlina Jompa, Joula Sondack, Nani Undap, Suciati, Elisa Winanda, Arfandi Amin, Suciati

Abstract:

This study aims to determine the status of the law, legislation, and its implementation against Foreign Nationals (WNA) Illegal Fishing Business Actors in the waters of the Indonesian Exclusive Economic Zone (EEZ), based on the Indonesian Positive Law and UNCLOS 1982. The research method used is normative juridical with a qualitative approach to study the Fisheries Criminal Verdict (Tipikan) and the Bitung District Court / Fisheries SIPP from 2019 to 2020. The results showed that cases of Illegal Fishing by Foreign Nationals (WNA) in the Indonesian Exclusive Economic Zone (EEZ) were examined, tried, and decided in accordance with the fisheries law, criminal sanctions were not in accordance with and contrary to Indonesian positive law, both criminal law and fisheries law, but followed and were in line with UNCLOS Year 1982. Legal status and responsibility are only imposed on the master as the leader on board the ship as the representative of the ship owner/company. Meanwhile, the application of Indonesia's positive law to Unclos in 1982 was only in the form of fines and confiscation of evidence as an effort to seek compensation for illegal fishing activities in the waters of the Indonesian Exclusive Zone (EEZ).

Keywords: EEZ, illegal fishing, WNA, positive law, Unclos 1982

Procedia PDF Downloads 65
881 Using Chatbots to Create Situational Content for Coursework

Authors: B. Bricklin Zeff

Abstract:

This research explores the development and application of a specialized chatbot tailored for a nursing English course, with a primary objective of augmenting student engagement through situational content and responsiveness to key expressions and vocabulary. Introducing the chatbot, elucidating its purpose, and outlining its functionality are crucial initial steps in the research study, as they provide a comprehensive foundation for understanding the design and objectives of the specialized chatbot developed for the nursing English course. These elements establish the context for subsequent evaluations and analyses, enabling a nuanced exploration of the chatbot's impact on student engagement and language learning within the nursing education domain. The subsequent exploration of the intricate language model development process underscores the fusion of scientific methodologies and artistic considerations in this application of artificial intelligence (AI). Tailored for educators and curriculum developers in nursing, practical principles extending beyond AI and education are considered. Some insights into leveraging technology for enhanced language learning in specialized fields are addressed, with potential applications of similar chatbots in other professional English courses. The overarching vision is to illuminate how AI can transform language learning, rendering it more interactive and contextually relevant. The presented chatbot is a tangible example, equipping educators with a practical tool to enhance their teaching practices. Methodologies employed in this research encompass surveys and discussions to gather feedback on the chatbot's usability, effectiveness, and potential improvements. The chatbot system was integrated into a nursing English course, facilitating the collection of valuable feedback from participants. Significant findings from the study underscore the chatbot's effectiveness in encouraging more verbal practice of target expressions and vocabulary necessary for performance in role-play assessment strategies. This outcome emphasizes the practical implications of integrating AI into language education in specialized fields. This research holds significance for educators and curriculum developers in the nursing field, offering insights into integrating technology for enhanced English language learning. The study's major findings contribute valuable perspectives on the practical impact of the chatbot on student interaction and verbal practice. Ultimately, the research sheds light on the transformative potential of AI in making language learning more interactive and contextually relevant, particularly within specialized domains like nursing.

Keywords: chatbot, nursing, pragmatics, role-play, AI

Procedia PDF Downloads 58
880 The Implementation of an E-Government System in Developing Countries: A Case of Taita Taveta County, Kenya

Authors: Tabitha Mberi, Tirus Wanyoike, Joseph Sevilla

Abstract:

The use of Information and Communication Technology (ICT) in Government is gradually becoming a major requirement to transform delivery of services to its stakeholders by improving quality of service and efficiency. In Kenya, the devolvement of government from local authorities to county governments has resulted in many counties adopting online revenue collection systems which can be easily accessed by its stakeholders. Strathmore Research and Consortium Centre (SRCC) implemented a revenue collection system in Taita Taveta, a County in coastal Kenya. It consisted of two systems that are integrated; an online system dubbed “CountyPro” for processing county services such as Business Permit applications, General Billing, Property Rates Payments and any other revenue streams from the county. The second part was a Point of Sale(PoS) system used by the county revenue collectors to charge for market fees and vehicle parking fees. This study assesses the success and challenges in adoption of the integrated system. Qualitative and quantitative data collection methods were used to collect data on the adoption of the system with the researcher using focus groups, interviews, and questionnaires to collect data from various users of the system An analysis was carried out and revealed that 87% of the county revenue officers who are situated in county offices describe the system as efficient and has made their work easier in terms of processing of transactions for customers.

Keywords: e-government, counties, information technology, online system, point of sale

Procedia PDF Downloads 244
879 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0

Authors: Harris Niavis, Dimitra Politaki

Abstract:

The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.

Keywords: blockchain, data quality, industry4.0, product quality

Procedia PDF Downloads 182
878 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 160
877 Embodied Empowerment: A Design Framework for Augmenting Human Agency in Assistive Technologies

Authors: Melina Kopke, Jelle Van Dijk

Abstract:

Persons with cognitive disabilities, such as Autism Spectrum Disorder (ASD) are often dependent on some form of professional support. Recent transformations in Dutch healthcare have spurred institutions to apply new, empowering methods and tools to enable their clients to cope (more) independently in daily life. Assistive Technologies (ATs) seem promising as empowering tools. While ATs can, functionally speaking, help people to perform certain activities without human assistance, we hold that, from a design-theoretical perspective, such technologies often fail to empower in a deeper sense. Most technologies serve either to prescribe or to monitor users’ actions, which in some sense objectifies them, rather than strengthening their agency. This paper proposes that theories of embodied interaction could help formulating a design vision in which interactive assistive devices augment, rather than replace, human agency and thereby add to a persons’ empowerment in daily life settings. It aims to close the gap between empowerment theory and the opportunities provided by assistive technologies, by showing how embodiment and empowerment theory can be applied in practice in the design of new, interactive assistive devices. Taking a Research-through-Design approach, we conducted a case study of designing to support independently living people with ASD with structuring daily activities. In three iterations we interlaced design action, active involvement and prototype evaluations with future end-users and healthcare professionals, and theoretical reflection. Our co-design sessions revealed the issue of handling daily activities being multidimensional. Not having the ability to self-manage one’s daily life has immense consequences on one’s self-image, and also has major effects on the relationship with professional caregivers. Over the course of the project relevant theoretical principles of both embodiment and empowerment theory together with user-insights, informed our design decisions. This resulted in a system of wireless light units that users can program as a reminder for tasks, but also to record and reflect on their actions. The iterative process helped to gradually refine and reframe our growing understanding of what it concretely means for a technology to empower a person in daily life. Drawing on the case study insights we propose a set of concrete design principles that together form what we call the embodied empowerment design framework. The framework includes four main principles: Enabling ‘reflection-in-action’; making information ‘publicly available’ in order to enable co-reflection and social coupling; enabling the implementation of shared reflections into an ‘endurable-external feedback loop’ embedded in the persons familiar ’lifeworld’; and nudging situated actions with self-created action-affordances. In essence, the framework aims for the self-development of a suitable routine, or ‘situated practice’, by building on a growing shared insight of what works for the person. The framework, we propose, may serve as a starting point for AT designers to create truly empowering interactive products. In a set of follow-up projects involving the participation of persons with ASD, Intellectual Disabilities, Dementia and Acquired Brain Injury, the framework will be applied, evaluated and further refined.

Keywords: assistive technology, design, embodiment, empowerment

Procedia PDF Downloads 276
876 The Effects of Computer Game-Based Pedagogy on Graduate Students Statistics Performance

Authors: Eva Laryea, Clement Yeboah Authors

Abstract:

A pretest-posttest within subjects, experimental design was employed to examine the effects of a computerized basic statistics learning game on achievement and statistics-related anxiety of students enrolled in introductory graduate statistics course. Participants (N = 34) were graduate students in a variety of programs at state-funded research university in the Southeast United States. We analyzed pre-test posttest differences using paired samples t-tests for achievement and for statistics anxiety. The results of the t-test for knowledge in statistics were found to be statistically significant indicating significant mean gains for statistical knowledge as a function of the game-based intervention. Likewise, the results of the t-test for statistics-related anxiety were also statistically significant indicating a decrease in anxiety from pretest to posttest. The implications of the present study are significant for both teachers and students. For teachers, using computer games developed by the researchers can help to create a more dynamic and engaging classroom environment, as well as improve student learning outcomes. For students, playing these educational games can help to develop important skills such as problem solving, critical thinking, and collaboration. Students can develop interest in the subject matter and spend quality time to learn the course as they play the game without knowing that they are even learning the presupposed hard course. The future directions of the present study are promising, as technology continues to advance and become more widely available. Some potential future developments include the integration of virtual and augmented reality into educational games, the use of machine learning and artificial intelligence to create personalized learning experiences, and the development of new and innovative game-based assessment tools. It is also important to consider the ethical implications of computer game-based pedagogy, such as the potential for games to perpetuate harmful stereotypes and biases. As the field continues to evolve, it will be crucial to address these issues and work towards creating inclusive and equitable learning experiences for all students. This study has the potential to revolutionize the way basic statistics graduate students learn and offers exciting opportunities for future development and research. It is an important area of inquiry for educators, researchers, and policymakers, and will continue to be a dynamic and rapidly evolving field for years to come.

Keywords: pretest-posttest within subjects, experimental design, achievement, statistics-related anxiety

Procedia PDF Downloads 57
875 Investigating the Critical Drivers of Behavior: The Case of Online Taxi Services

Authors: Rosa Hendijani, Mohammadhesam Hajighasemi

Abstract:

As of late, the sharing economy has become an important type of business model. Online taxi services are one example that has grown rapidly around the world. This study examines the factors influencing the use of online taxis as one form of IT-enabled sharing services based on the theory of planned behavior (TPB). Based on the theory of planned behavior, these factors can be divided into three categories, including the ones related to attitude (e.g., image and perceived usefulness), normative believes (e.g., subjective norms), and behavioral control (e.g., technology facilitating conditions and self-efficacy). Three other factors were also considered based on the literature, including perceived economic benefits, openness towards using shared services, and perceived availability. The effect of all these variables was tested both directly and indirectly through intention as the mediating variable. A survey method was used to test the research hypotheses. In total, 361 individuals partook in the study. The results of a multiple regression analysis on behavior showed that perceived economic benefits, compatibility, and subjective norms were important factors influencing behavior among online taxi users. In addition, intention partially mediated the effect of perceived economic benefits and compatibility on behavior. It can be concluded that perceived economic benefits, compatibility, and subjective norms are the three main factors that influence behavior among online taxi users.

Keywords: collaborative consumption, IT-enabled sharing services model, online taxi, sharing economy, theory of planned behavior

Procedia PDF Downloads 133
874 Exploring a Net-Metering Policy Towards Solar Energy Technology Adoption and Sustainability

Authors: Jane Osei, Kerry Brown, Mehran Nejati

Abstract:

Numerous studies have established that solar energy is the second most prevalent form of alternative renewable energy globally, particularly in regions with abundant sunlight. The adoption and ongoing sustainability of solar technology are pivotal for the transition to renewable energy sources. However, the literature indicates that some countries, especially in the developing world, may impede this transition. Despite various policy initiatives aimed at supporting the adoption of solar technology, the long-term effectiveness of these policies remains uncertain. This study investigates the current policy drivers influencing the success or failure of solar energy technology adoption and sustainability. It employs a qualitative review approach to compare strategies for implementing the net-metering policy incentive in both developing and developed countries, identifying successful and unsuccessful strategies and drawing conclusions on the lessons learned. The study's findings reveal that the effective implementation of net metering depends on regional variations in solar radiation and differing levels of electricity demand across regions. Further, the study found that the implementation of net metering has faced challenges in some countries due to regulatory barriers and bottlenecks that hinder private sector involvement and business sustainability. Economic stability also significantly impacts net metering implementation. This study concludes that governments should strive to balance benefit-sharing to attract more private-sector investment in solar technology while ensuring the viability of government energy regulatory bodies.

Keywords: solar energy technology, adoption, sustainability, net-metering

Procedia PDF Downloads 23
873 Intercultural Trainings for Future Global Managers: Evaluating the Effect on the Global Mind-Set

Authors: Nina Dziatzko, Christopher Stehr, Franziska Struve

Abstract:

Intercultural competence as an explicit required skill nearly never appears in job advertisements in international or even global contexts. But especially those who have to deal with different nationalities and cultures in their everyday business need to have several intercultural competencies and further a global mind-set. This way the question arises how potential future global managers can be trained to learn these competencies. In this regard, it might be helpful to see if different types of intercultural trainings have different effects on those skills. This paper outlines lessons learned based on the evaluation of two different intercultural trainings for management students. The main differences between the observed intercultural trainings are the amount of theoretical input in relation to hands-on experiences, the number of trainers as well as the used methods to teach implicit cultural rules. Both groups contain management students with the willingness and perspective to work abroad or to work in international context. The research is carried out with a pre-training-survey and a post-training-survey which consists of questions referring the international context of the students and a self-estimation of 19 identified intercultural and global mind-set skills, such as: cosmopolitanism, empathy, differentiation and adaptability. Whereas there is no clear result which training gets overall a significant higher increase of skills, there is a clear difference between the focus of competencies trained by each of the intercultural trainings. This way this research provides a guideline for both academicals institutions as well as companies for the decision between different types of intercultural trainings, if the to be trained required skills are defined. Therefore the efficiency and the accuracy of fit of the education of future global managers get optimized.

Keywords: global mind-set, intercultural competencies, intercultural training, learning experiences

Procedia PDF Downloads 272
872 Tensile and Direct Shear Responses of Basalt-Fibre Reinforced Composite Using Alkali Activate Binder

Authors: S. Candamano, A. Iorfida, L. Pagnotta, F. Crea

Abstract:

Basalt fabric reinforced cementitious composites (FRCM) have attracted great attention because they result in being effective in structural strengthening and eco-efficient. In this study, authors investigate their mechanical behavior when an alkali-activated binder, with tuned properties and containing high amounts of industrial by-products, such as ground granulated blast furnace slag, is used. Reinforcement is made up of a balanced, coated bidirectional fabric made out of basalt fibres and stainless steel micro-wire, with a mesh size of 8x8 mm and an equivalent design thickness equal to 0.064 mm. Mortars mixes have been prepared by maintaining constant the water/(reactive powders) and sand/(reactive powders) ratios at 0.53 and 2.7 respectively. Tensile tests were carried out on composite specimens of nominal dimensions equal to 500 mm x 50 mm x 10 mm, with 6 embedded rovings in the loading direction. Direct shear tests (DST), aimed to the stress-transfer mechanism and failure modes of basalt-FRCM composites, were carried out on brickwork substrate using an externally bonded basalt-FRCM composite strip 10 mm thick, 50 mm wide and a bonded length of 300 mm. Mortars exhibit, after 28 days of curing, a compressive strength of 32 MPa and a flexural strength of 5.5 MPa. Main hydration product is a poorly crystalline CASH gel. The constitutive behavior of the composite has been identified by means of direct tensile tests, with response curves showing a tri-linear behavior. The first linear phase represents the uncracked (I) stage, the second (II) is identified by crack development and the third (III) corresponds to cracked stage, completely developed up to failure. All specimens exhibit a crack pattern throughout the gauge length and failure occurred as a result of sequential tensile failure of the fibre bundles, after reaching the ultimate tensile strength. The behavior is mainly governed by cracks development (II) and widening (III) up to failure. The main average values related to the stages are σI= 173 MPa and εI= 0.026% that are the stress and strain of the transition point between stages I and II, corresponding to the first mortar cracking; σu = 456 MPa and εu= 2.20% that are the ultimate tensile strength and strain, respectively. The tensile modulus of elasticity in stage III is EIII= 41 GPa. All single-lap shear test specimens failed due to composite debonding. It occurred at the internal fabric-to-matrix interface, and it was the result of fracture of the matrix between the fibre bundles. For all specimens, transversal cracks were visible on the external surface of the composite and involved only the external matrix layer. This cracking appears when the interfacial shear stresses increase and slippage of the fabric at the internal matrix layer interface occurs. Since the external matrix layer is bonded to the reinforcement fabric, it translates with the slipped fabric. Average peak load around 945 N, peak stress around 308 MPa, and global slip around 6 mm were measured. The preliminary test results allow affirming that Alkali Activated Binders can be considered a potentially valid alternative to traditional mortars in designing FRCM composites.

Keywords: alkali activated binders, basalt-FRCM composites, direct shear tests, structural strengthening

Procedia PDF Downloads 119
871 Tensile and Bond Characterization of Basalt-Fabric Reinforced Alkali Activated Matrix

Authors: S. Candamano, A. Iorfida, F. Crea, A. Macario

Abstract:

Recently, basalt fabric reinforced cementitious composites (FRCM) have attracted great attention because they result to be effective in structural strengthening and cost/environment efficient. In this study, authors investigate their mechanical behavior when an inorganic matrix, belonging to the family of alkali-activated binders, is used. In particular, the matrix has been designed to contain high amounts of industrial by-products and waste, such as Ground Granulated Blast Furnace Slag (GGBFS) and Fly Ash. Fresh state properties, such as workability, mechanical properties and shrinkage behavior of the matrix have been measured, while microstructures and reaction products were analyzed by Scanning Electron Microscopy and X-Ray Diffractometry. Reinforcement is made up of a balanced, coated bidirectional fabric made out of basalt fibres and stainless steel micro-wire, with a mesh size of 8x8 mm and an equivalent design thickness equal to 0.064 mm. Mortars mixes have been prepared by maintaining constant the water/(reactive powders) and sand/(reactive powders) ratios at 0.53 and 2.7 respectively. An appropriate experimental campaign based on direct tensile tests on composite specimens and single-lap shear bond test on brickwork substrate has been thus carried out to investigate their mechanical behavior under tension, the stress-transfer mechanism and failure modes. Tensile tests were carried out on composite specimens of nominal dimensions equal to 500 mm x 50 mm x 10 mm, with 6 embedded rovings in the loading direction. Direct shear tests (DST) were carried out on brickwork substrate using an externally bonded basalt-FRCM composite strip 10 mm thick, 50 mm wide and a bonded length of 300 mm. Mortars exhibit, after 28 days of curing, an average compressive strength of 32 MPa and flexural strength of 5.5 MPa. Main hydration product is a poorly crystalline aluminium-modified calcium silicate hydrate (C-A-S-H) gel. The constitutive behavior of the composite has been identified by means of direct tensile tests, with response curves showing a tri-linear behavior. Test results indicate that the behavior is mainly governed by cracks development (II) and widening (III) up to failure. The ultimate tensile strength and strain were respectively σᵤ = 456 MPa and ɛᵤ= 2.20%. The tensile modulus of elasticity in stage III was EIII= 41 GPa. All single-lap shear test specimens failed due to composite debonding. It occurred at the internal fabric-to-matrix interface, and it was the result of a fracture of the matrix between the fibre bundles. For all specimens, transversal cracks were visible on the external surface of the composite and involved only the external matrix layer. This cracking appears when the interfacial shear stresses increase and slippage of the fabric at the internal matrix layer interface occurs. Since the external matrix layer is bonded to the reinforcement fabric, it translates with the slipped fabric. Average peak load around 945 N, peak stress around 308 MPa and global slip around 6 mm were measured. The preliminary test results allow affirming that Alkali-Activated Materials can be considered a potentially valid alternative to traditional mortars in designing FRCM composites.

Keywords: Alkali-activated binders, Basalt-FRCM composites, direct shear tests, structural strengthening

Procedia PDF Downloads 127
870 Understanding Natural Resources Governance in Canada: The Role of Institutions, Interests, and Ideas in Alberta's Oil Sands Policy

Authors: Justine Salam

Abstract:

As a federal state, Canada’s constitutional arrangements regarding the management of natural resources is unique because it gives complete ownership and control of natural resources to the provinces (subnational level). However, the province of Alberta—home to the third largest oil reserves in the world—lags behind comparable jurisdictions in levying royalties on oil corporations, especially oil sands royalties. While Albertans own the oil sands, scholars have argued that natural resource exploitation in Alberta benefits corporations and industry more than it does Albertans. This study provides a systematic understanding of the causal factors affecting royalties in Alberta to map dynamics of power and how they manifest themselves during policy-making. Mounting domestic and global public pressure led Alberta to review its oil sands royalties twice in less than a decade through public-commissioned Royalty Review Panels, first in 2007 and again in 2015. The Panels’ task was to research best practices and to provide policy recommendations to the Government through public consultations with Albertans, industry, non-governmental organizations, and First Nations peoples. Both times, the Panels recommended a relative increase to oil sands royalties. However, irrespective of the Reviews’ recommendations, neither the right-wing 2007 Progressive Conservative Party (PC) nor the left-wing 2015 New Democratic Party (NDP) government—both committed to increase oil sands royalties—increased royalty intake. Why did two consecutive political parties at opposite ends of the political spectrum fail to account for the recommendations put forward by the Panel? Through a qualitative case-study analysis, this study assesses domestic and global causal factors for Alberta’s inability to raise oil sands royalties significantly after the two Reviews through an institutions, interests, and ideas framework. Indeed, causal factors can be global (e.g. market and price fluctuation) or domestic (e.g. oil companies’ influence on the Alberta government). The institutions, interests, and ideas framework is at the intersection of public policy, comparative studies, and political economy literatures, and therefore draws multi-faceted insights into the analysis. To account for institutions, the study proposes to review international trade agreements documents such as the North American Free Trade Agreement (NAFTA) because they have embedded Alberta’s oil sands into American energy security policy and tied Canadian and Albertan oil policy in legal international nods. To account for interests, such as how the oil lobby or the environment lobby can penetrate governmental decision-making spheres, the study draws on the Oil Sands Oral History project, a database of interviews from government officials and oil industry leaders at a pivotal time in Alberta’s oil industry, 2011-2013. Finally, to account for ideas, such as how narratives of Canada as a global ‘energy superpower’ and the importance of ‘energy security’ have dominated and polarized public discourse, the study relies on content analysis of Alberta-based pro-industry newspapers to trace the prevalence of these narratives. By mapping systematically the nods and dynamics of power at play in Alberta, the study sheds light on the factors that influence royalty policy-making in one of the largest industries in Canada.

Keywords: Alberta Canada, natural resources governance, oil sands, political economy

Procedia PDF Downloads 131
869 Tourism Area Development Optimation Based on Solar-Generated Renewable Energy Technology at Karimunjawa, Central Java Province, Indonesia

Authors: Yanuar Tri Wahyu Saputra, Ramadhani Pamapta Putra

Abstract:

Karimunjawa is one among Indonesian islands which is lacking of electricity supply. Despite condition above, Karimunjawa is an important tourism object in Indonesia's Central Java Province. Solar Power Plant is a potential technology to be applied in Karimunjawa, in order to fulfill the island's electrical supply need and to increase daily life and tourism quality among tourists and local population. This optimation modeling of Karimunjawa uses HOMER software program. The data we uses include wind speed data in Karimunjawa from BMKG (Indonesian Agency for Meteorology, Climatology and Geophysics), annual weather data in Karimunjawa from NASA, electricity requirements assumption data based on number of houses and business infrastructures in Karimunjawa. This modeling aims to choose which three system categories offer the highest financial profit with the lowest total Net Present Cost (NPC). The first category uses only PV with 8000 kW of electrical power and NPC value of $6.830.701. The second category uses hybrid system which involves both 1000 kW PV and 100 kW generator which results in total NPC of $6.865.590. The last category uses only generator with 750 kW of electrical power that results in total NPC of $ 16.368.197, the highest total NPC among the three categories. Based on the analysis above, we can conclude that the most optimal way to fulfill the electricity needs in Karimunjawa is to use 8000 kW PV with lower maintenance cost.

Keywords: Karimunjawa, renewable energy, solar power plant, HOMER

Procedia PDF Downloads 461
868 Patterns of Sustainable Financial Incentives Utilisation among Fashion Design Entrepreneurs in Nigeria

Authors: O. B. Urhibo, D. Imhonopi, T. George

Abstract:

The global rate of decline in entrepreneurial activities, and the prevalence in Africa, especially Nigeria, is more worrisome. In recent times, these problems, such as the lack of accessibility and utilization of financial incentives needed to promote entrepreneurial activities, have led to a decrease in entrepreneurial activities. The causes of the decline have been evaluated from a different perspective and have further confirmed the relevance and need for the sustainability of the Fashion industry. With the increasing rate of unemployment and poverty in Nigeria and the literature gap in the social context, this study investigated the patterns of sustainable financial incentives utilisation among fashion design entrepreneurs in Nigeria through a qualitative approach. The Eastern part of Nigeria was considered in this study because of the high rate of market activity for textile and clothing firms. Specifically, Delta state was considered in this study. A purposive sampling technique was used to select key informants consisting of twelve (12) executives of the associations (i.e., Fashion Designer & Exhibitors Association, Delta Fashion Designers, and Fashion Designers Association of Nigeria for the interview sessions. Four themes emanate from the thematic analysis -lack of sufficient collateral, difficulties and duration of loan application processes, unacceptable business proposal/plan, and the absence of audited financial accounts were found to be the patterns of sustainable financial incentives utilisation among fashion design entrepreneurs in Nigeria. The promotion of sustainable patterns and supports has been suggested to reduce the challenges of sustainable financial incentives utilisation among fashion design entrepreneurs.

Keywords: entrepreneurship, fashion design, financial incentives, patterns, sustainability, utilisation

Procedia PDF Downloads 72
867 A Hybrid Artificial Intelligence and Two Dimensional Depth Averaged Numerical Model for Solving Shallow Water and Exner Equations Simultaneously

Authors: S. Mehrab Amiri, Nasser Talebbeydokhti

Abstract:

Modeling sediment transport processes by means of numerical approach often poses severe challenges. In this way, a number of techniques have been suggested to solve flow and sediment equations in decoupled, semi-coupled or fully coupled forms. Furthermore, in order to capture flow discontinuities, a number of techniques, like artificial viscosity and shock fitting, have been proposed for solving these equations which are mostly required careful calibration processes. In this research, a numerical scheme for solving shallow water and Exner equations in fully coupled form is presented. First-Order Centered scheme is applied for producing required numerical fluxes and the reconstruction process is carried out toward using Monotonic Upstream Scheme for Conservation Laws to achieve a high order scheme.  In order to satisfy C-property of the scheme in presence of bed topography, Surface Gradient Method is proposed. Combining the presented scheme with fourth order Runge-Kutta algorithm for time integration yields a competent numerical scheme. In addition, to handle non-prismatic channels problems, Cartesian Cut Cell Method is employed. A trained Multi-Layer Perceptron Artificial Neural Network which is of Feed Forward Back Propagation (FFBP) type estimates sediment flow discharge in the model rather than usual empirical formulas. Hydrodynamic part of the model is tested for showing its capability in simulation of flow discontinuities, transcritical flows, wetting/drying conditions and non-prismatic channel flows. In this end, dam-break flow onto a locally non-prismatic converging-diverging channel with initially dry bed conditions is modeled. The morphodynamic part of the model is verified simulating dam break on a dry movable bed and bed level variations in an alluvial junction. The results show that the model is capable in capturing the flow discontinuities, solving wetting/drying problems even in non-prismatic channels and presenting proper results for movable bed situations. It can also be deducted that applying Artificial Neural Network, instead of common empirical formulas for estimating sediment flow discharge, leads to more accurate results.

Keywords: artificial neural network, morphodynamic model, sediment continuity equation, shallow water equations

Procedia PDF Downloads 184
866 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 259
865 A Recommender System for Job Seekers to Show up Companies Based on Their Psychometric Preferences and Company Sentiment Scores

Authors: A. Ashraff

Abstract:

The increasing importance of the web as a medium for electronic and business transactions has served as a catalyst or rather a driving force for the introduction and implementation of recommender systems. Recommender Systems play a major role in processing and analyzing thousands of data rows or reviews and help humans make a purchase decision of a product or service. It also has the ability to predict whether a particular user would rate a product or service based on the user’s profile behavioral pattern. At present, Recommender Systems are being used extensively in every domain known to us. They are said to be ubiquitous. However, in the field of recruitment, it’s not being utilized exclusively. Recent statistics show an increase in staff turnover, which has negatively impacted the organization as well as the employee. The reasons being company culture, working flexibility (work from home opportunity), no learning advancements, and pay scale. Further investigations revealed that there are lacking guidance or support, which helps a job seeker find the company that will suit him best, and though there’s information available about companies, job seekers can’t read all the reviews by themselves and get an analytical decision. In this paper, we propose an approach to study the available review data on IT companies (score their reviews based on user review sentiments) and gather information on job seekers, which includes their Psychometric evaluations. Then presents the job seeker with useful information or rather outputs on which company is most suitable for the job seeker. The theoretical approach, Algorithmic approach and the importance of such a system will be discussed in this paper.

Keywords: psychometric tests, recommender systems, sentiment analysis, hybrid recommender systems

Procedia PDF Downloads 104
864 Enhancing Large Language Models' Data Analysis Capability with Planning-and-Execution and Code Generation Agents: A Use Case for Southeast Asia Real Estate Market Analytics

Authors: Kien Vu, Jien Min Soh, Mohamed Jahangir Abubacker, Piyawut Pattamanon, Soojin Lee, Suvro Banerjee

Abstract:

Recent advances in Generative Artificial Intelligence (GenAI), in particular Large Language Models (LLMs) have shown promise to disrupt multiple industries at scale. However, LLMs also present unique challenges, notably, these so-called "hallucination" which is the generation of outputs that are not grounded in the input data that hinders its adoption into production. Common practice to mitigate hallucination problem is utilizing Retrieval Agmented Generation (RAG) system to ground LLMs'response to ground truth. RAG converts the grounding documents into embeddings, retrieve the relevant parts with vector similarity between user's query and documents, then generates a response that is not only based on its pre-trained knowledge but also on the specific information from the retrieved documents. However, the RAG system is not suitable for tabular data and subsequent data analysis tasks due to multiple reasons such as information loss, data format, and retrieval mechanism. In this study, we have explored a novel methodology that combines planning-and-execution and code generation agents to enhance LLMs' data analysis capabilities. The approach enables LLMs to autonomously dissect a complex analytical task into simpler sub-tasks and requirements, then convert them into executable segments of code. In the final step, it generates the complete response from output of the executed code. When deployed beta version on DataSense, the property insight tool of PropertyGuru, the approach yielded promising results, as it was able to provide market insights and data visualization needs with high accuracy and extensive coverage by abstracting the complexities for real-estate agents and developers from non-programming background. In essence, the methodology not only refines the analytical process but also serves as a strategic tool for real estate professionals, aiding in market understanding and enhancement without the need for programming skills. The implication extends beyond immediate analytics, paving the way for a new era in the real estate industry characterized by efficiency and advanced data utilization.

Keywords: large language model, reasoning, planning and execution, code generation, natural language processing, prompt engineering, data analysis, real estate, data sense, PropertyGuru

Procedia PDF Downloads 83
863 Evaluating the Implementation of Public Procurement Principles at Tendering Stage: SME Contractors' Perspective

Authors: Charles Poleni Mukumba, Kahilu Kajimo-Shakantu

Abstract:

Purpose: Principles of public procurement are the foundation of good public procurement, representing best practices in delivering public services by the government and its organs. They provide guidance in the public procurement cycle to achieve the best value for public resources. Tendering stage in the procurement cycle is the most critical, as tendering information is made available to bidders. The paper evaluates the implementation of public procurement principles at the tendering stage. Design/Methodology/Approach: The research was conducted by using qualitative methods with 18 SME contractors in Lusaka as the sample. The samples are business owners and managers of purposively selected SME contractors. The collected data was analysed using thematic and content analysis. Findings: The findings indicate inconsistency in accessing information critical for tendering success by bidders. Further, the findings suggest that adjustments to technical specifications are made to suit certain preferred bidders by procuring officials. Research Limitations/Implications: The interviews were limited to SME contractors registered with the national council for construction and involved in public sector construction works in Lusaka, Zambia. Practical Implications: Implementing principles of public procurement at the tendering stage creates equal, open, and fair competition for the bidders in cost terms to deliver standardised and quality works to the public sector. Original/Value: The findings reveal how principles of public procurement play a critical role in enhancing the efficient performance of the procurement cycle at the tendering stage.

Keywords: evaluating, implementation, public procurement principles, tendering stage, SME contractors

Procedia PDF Downloads 82
862 Technology Road Mapping in the Fourth Industrial Revolution: A Comprehensive Analysis and Strategic Framework

Authors: Abdul Rahman Hamdan

Abstract:

The Fourth Industrial Revolution (4IR) has brought unprecedented technological advancements that have disrupted many industries worldwide. In keeping up with the technological advances and rapid disruption by the introduction of many technological advancements brought forth by the 4IR, the use of technology road mapping has emerged as one of the critical tools for organizations to leverage. Technology road mapping can be used by many companies to guide them to become more adaptable and anticipate future transformation and innovation, and avoid being redundant or irrelevant due to the rapid changes in technological advancement. This research paper provides a comprehensive analysis of technology road mapping within the context of the 4IR. The objectives of the paper are to provide companies with practical insights and a strategic framework of technology road mapping for them to navigate the fast-changing nature of the 4IR. This study also contributes to the understanding and practice of technology road mapping in the 4IR and, at the same time, provides organizations with the necessary tools and critical insight to navigate the 4IR transformation by leveraging technology road mapping. Based on the literature review and case studies, the study analyses key principles, methodologies, and best practices in technology road mapping and integrates them with the unique characteristics and challenges of the 4IR. The research paper gives the background of the fourth industrial revolution. It explores the disruptive potential of technologies in the 4IR and the critical need for technology road mapping that consists of strategic planning and foresight to remain competitive and relevant in the 4IR era. It also highlights the importance of technology road mapping as an organisation’s proactive approach to align the organisation’s objectives and resources to their technology and product development in meeting the fast-evolving technological 4IR landscape. The paper also includes the theoretical foundations of technology road mapping and examines various methodological approaches, and identifies external stakeholders in the process, such as external experts, stakeholders, collaborative platforms, and cross-functional teams to ensure an integrated and robust technological roadmap for the organisation. Moreover, this study presents a comprehensive framework for technology road mapping in the 4IR by incorporating key elements and processes such as technology assessment, competitive intelligence, risk analysis, and resource allocation. It provides a framework for implementing technology road mapping from strategic planning, goal setting, and technology scanning to road mapping visualisation, implementation planning, monitoring, and evaluation. In addition, the study also addresses the challenges and limitations related to technology roadmapping in 4IR, including the gap analysis. In conclusion of the study, the study will propose a set of practical recommendations for organizations that intend to leverage technology road mapping as a strategic tool in the 4IR in driving innovation and becoming competitive in the current and future ecosystem.

Keywords: technology management, technology road mapping, technology transfer, technology planning

Procedia PDF Downloads 64
861 Being Funny is a Serious Business for Feminine Brands

Authors: Mohammed Murtuza Soofi

Abstract:

Purpose: Marketers and Researchers alike have simultaneously, yet in mutually exclusive instances, promote the use of humour by brands in their communication and gendering of brands, as both enhance brand equity and can generate positive attitudinal responses from customers. However, the gendering of brands comes with associated gendered stereotypical expectations. The current paper consolidates the long standing literature on gender role/stereotype theory and brand gender theories establishing a theoretical framework for understanding how gender-based stereotypes about humour can influence consumers’ attitudinal responses towards brands. Design/methodology/approach: Using parallel constrain satisfaction theory as domain theory to explain the highhandedness of stereotypes and gender stereotype theories (particularly around feminine use of humour), we explain why gender based stereotypes could constrain brand behaviors, and in turn, feminine brands get penalised for using witty, aggressive and self-enhancing humor. Findings: Extension of gender stereotypes to anthropomorphised brands will lead consumers to judge the use of negative humour by a feminine brand as less appropriate, which will trigger the causal chain of reduced sense of communal appropriateness and brand warmth which will result in a negative attitude towards the brand. Originality/value: Brand gendering being susceptible to gender based stereotypes, has very little attention in the literature and hence use of negative humour (stereotypical male behaviour), has never been studied in the context of gendered brands. It also helps understand to what extent stereotypes will impact attitudinal responses to the brand. Our work can help understand when heavily gendered brands can optimise the use of humour and when they can avoid it.

Keywords: brand femininity, brand gender, gender stereotypes, humour

Procedia PDF Downloads 200
860 Simulation and Analysis of Mems-Based Flexible Capacitive Pressure Sensors with COMSOL

Authors: Ding Liangxiao

Abstract:

The technological advancements in Micro-Electro-Mechanical Systems (MEMS) have significantly contributed to the development of new, flexible capacitive pressure sensors,which are pivotal in transforming wearable and medical device technologies. This study employs the sophisticated simulation tools available in COMSOL Multiphysics® to develop and analyze a MEMS-based sensor with a tri-layered design. This sensor comprises top and bottom electrodes made from gold (Au), noted for their excellent conductivity, a middle dielectric layer made from a composite of Silver Nanowires (AgNWs) embedded in Thermoplastic Polyurethane (TPU), and a flexible, durable substrate of Polydimethylsiloxane (PDMS). This research was directed towards understanding how changes in the physical characteristics of the AgNWs/TPU dielectric layer—specifically, its thickness and surface area—impact the sensor's operational efficacy. We assessed several key electrical properties: capacitance, electric potential, and membrane displacement under varied pressure conditions. These investigations are crucial for enhancing the sensor's sensitivity and ensuring its adaptability across diverse applications, including health monitoring systems and dynamic user interface technologies. To ensure the reliability of our simulations, we applied the Effective Medium Theory to calculate the dielectric constant of the AgNWs/TPU composite accurately. This approach is essential for predicting how the composite material will perform under different environmental and operational stresses, thus facilitating the optimization of the sensor design for enhanced performance and longevity. Moreover, we explored the potential benefits of innovative three-dimensional structures for the dielectric layer compared to traditional flat designs. Our hypothesis was that 3D configurations might improve the stress distribution and optimize the electrical field interactions within the sensor, thereby boosting its sensitivity and accuracy. Our simulation protocol includes comprehensive performance testing under simulated environmental conditions, such as temperature fluctuations and mechanical pressures, which mirror the actual operational conditions. These tests are crucial for assessing the sensor's robustness and its ability to function reliably over extended periods, ensuring high reliability and accuracy in complex real-world environments. In our current research, although a full dynamic simulation analysis of the three-dimensional structures has not yet been conducted, preliminary explorations through three-dimensional modeling have indicated the potential for mechanical and electrical performance improvements over traditional planar designs. These initial observations emphasize the potential advantages and importance of incorporating advanced three-dimensional modeling techniques in the development of Micro-Electro-Mechanical Systems (MEMS)sensors, offering new directions for the design and functional optimization of future sensors. Overall, this study not only highlights the powerful capabilities of COMSOL Multiphysics® for modeling sophisticated electronic devices but also underscores the potential of innovative MEMS technology in advancing the development of more effective, reliable, and adaptable sensor solutions for a broad spectrum of technological applications.

Keywords: MEMS, flexible sensors, COMSOL Multiphysics, AgNWs/TPU, PDMS, 3D modeling, sensor durability

Procedia PDF Downloads 36