Search results for: rapid review
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6733

Search results for: rapid review

2173 A Framework to Assess the Maturity of Customer Involvement in the Service Design of Product-Service Systems

Authors: Taghreed Abu-Salim

Abstract:

This paper develops and investigates a framework for the assessment of customer involvement in the service design process of result oriented product-service systems in order to improve the service offering in a business to business (B2B) context. The framework comprises five main criteria and fifteen sub-criteria that contribute to customer involvement in a hierarchy using a maturity grid to highlight the strengths and weaknesses for each criterion. To develop the customer involvement framework, an extensive literature review related to service design, result oriented product-service system (PSS) and customer involvement in service design was carried out. Key factors that significantly influence customer involvement from industry and literature were identified to develop an initial framework. This framework was tested in six companies from four different sectors of industry: district cooling, medical equipment, transportation and oil storage. Validation of the framework was carried out using expert opinions and industrial case studies. A major contribution of the developed framework includes a hierarchy of appropriate criteria for assessing customer involvement in the service design process within results oriented PSS; the definition of four maturity levels which are suitable to describe the whole spectrum of customer involvement in the service design process; and finally, The paper concludes by enabling service providers to: take proactive decisions; screen and evaluate new services; improve perceived service quality; and provide barriers against imitation.

Keywords: customer involvement, maturity grid, new service development, result oriented product-service system, service design

Procedia PDF Downloads 515
2172 Effects of Drought Stress on Red Bean (Phaseolus vulgaris L.) Cultivars during Post-Flowering Growth Stage

Authors: Fariborz Shekari, Abdollah Javanmard, Amin Abbasi

Abstract:

A pot experiment conducted to evaluate the response of two red bean cultivars, Sayad and Derakhshan, to water deficit stress during post-flowering growth stage and recovery potential of plants after stress. Treatments were included regular irrigation or control, water deficit during flowering stage, water deficit during pod formation and water deficit during pod filling period. Results showed that plant height had positive effects on yield of cultivars so that, the tall cultivar, ‘Sayad’, had higher yields. Stress application during flowering stage showed the highest negative impact on plant height and subsequently yield. The longest and the higher number of pods as well as the greatest number of seeds in pods were recorded in control treatment in ‘Sayad’. Stress application during pod formation resulted in the minimum amount of all studied traits in both cultivars. Stress encountered during seed filling period had the least effect on number and length of pods and seed/pod. However, 100 seeds weight significantly decreased. The highest amount for 100 seeds weight was record in control plants in ‘Derakhshan’. Under all treatments, ‘Sayad’ had higher biologic and seed yield compared to ‘Derakhshan’. The least amount of yield was recorded during stress application in pod formation and flowering period for ‘Sayad’ and ‘Derakhshan’ respectively. Harvest index of ‘Sayad’ was more affect by stress application. Data related to photosynthetic rate showed that during stress application, ‘Derakhshan’ owned rapid decline in photosynthesis. Beyond stress alleviation and onset of irrigation, recovery potential of ‘Sayad’ was higher than ‘Derakhshan’ and this cultivar was able to rapidly restore the photosynthesis rate of stress faced plants near control ones. In total, stress had lower impacts on photosynthetic rate of ‘Sayad’ cultivar.

Keywords: common bean, water stress, yield, yield components, photosynthetic rate

Procedia PDF Downloads 280
2171 Micropollutant Carbamazepine: Its Occurrences, Toxicological Effects, and Possible Degradation Methods (Review)

Authors: Azad Khalid, Sifa Dogan

Abstract:

Because of its persistence in conventional treatment plants and broad prevalence in water bodies, the pharmaceutical chemical carbamazepine (CBZ) has been suggested as an anthropogenic marker to evaluate water quality. This study provides a thorough examination of the origins and occurrences of CBZ in water bodies, as well as the drug's toxicological effects and laws. Given CBZ's well-documented negative consequences on the human body when used medicinally, cautious monitoring in water is advised. CBZ residues in drinking water may enter embryos and newborns via intrauterine exposure or breast-feeding, causing congenital abnormalities and/or neurodevelopmental issues over time. The insufficiency of solo solutions was shown after an in-depth technical study of traditional and sophisticated treatment technologies. Nanofiltration and reverse osmosis membranes are more successful at removing CBZ than traditional activated sludge and membrane bioreactor techniques. Recent research has shown that severe chemical cleaning, which is essential to prevent membrane fouling, may lower long-term removal efficiency. Furthermore, despite the efficacy of activated carbon adsorption and advanced oxidation processes, a few issues such as chemical cost and activated carbon renewal must be carefully examined. Individual technology constraints lead to the benefits of combined and hybrid systems, namely the heterogeneous advanced oxidation process.

Keywords: carbamazepine, occurrence, toxicity, conventical treatment, advanced oxidation process (AOPs)

Procedia PDF Downloads 78
2170 Migrant Workers and the Challenge for Human Security in Southeast Asia since 1997

Authors: Hanen Khaldi

Abstract:

This paper aims to study the impact of international migration on human security in the Southeastern region of Asia, especially after Asian Financial Crisis 1997-98. International migration has impacts on many dimensions of security: the state security (sovereignty and autonomy); international relationships security (conflicts, terrorism, etc); and immigrants security. The paper aims to improve our comprehension of the impact of international migration on immigrant security in the region of Southeast Asia, particularly “vulnerable workers’’ whose number is growing very fast in the region. The literature review carried out on this matter led us to ask the following two question: 1) Did the creation of ASEAN Community matter on the evolution of immigrants in the region? And How governments try to resolve the gap between economic objectifs and security of immigrants in the region? To answer these two questions, the paper is subdivided in three parts: Firstly, we will show how the creation of the ASEAN Community, especially ASEAN Economic Community, had a significant impact on the pattern of evolution of immigration in this region. Secondly, we will paint a portrait illustrating the vulnerability of immigrants in Southeast Asia, particularly unskilled workers. Finally, using the theories of regional integration, we will assess how governments try to ensure the security and safety of the immigrants. Overall, our analysis illustrate the significant change of the official discourse of the leaders of the ASEAN member states, now more conciliator and especially more open to cooperation, as well as the proliferation of meetings and initiatives between these countries to control mobility flows in the region, and the ensure immigrants security.

Keywords: migrant workers, human security, human rights

Procedia PDF Downloads 148
2169 Career Guidance System Using Machine Learning

Authors: Mane Darbinyan, Lusine Hayrapetyan, Elen Matevosyan

Abstract:

Artificial Intelligence in Education (AIED) has been created to help students get ready for the workforce, and over the past 25 years, it has grown significantly, offering a variety of technologies to support academic, institutional, and administrative services. However, this is still challenging, especially considering the labor market's rapid change. While choosing a career, people face various obstacles because they do not take into consideration their own preferences, which might lead to many other problems like shifting jobs, work stress, occupational infirmity, reduced productivity, and manual error. Besides preferences, people should properly evaluate their technical and non-technical skills, as well as their personalities. Professional counseling has become a difficult undertaking for counselors due to the wide range of career choices brought on by changing technological trends. It is necessary to close this gap by utilizing technology that makes sophisticated predictions about a person's career goals based on their personality. Hence, there is a need to create an automated model that would help in decision-making based on user inputs. Improving career guidance can be achieved by embedding machine learning into the career consulting ecosystem. There are various systems of career guidance that work based on the same logic, such as the classification of applicants, matching applications with appropriate departments or jobs, making predictions, and providing suitable recommendations. Methodologies like KNN, Neural Networks, K-means clustering, D-Tree, and many other advanced algorithms are applied in the fields of data and compute some data, which is helpful to predict the right careers. Besides helping users with their career choice, these systems provide numerous opportunities which are very useful while making this hard decision. They help the candidate to recognize where he/she specifically lacks sufficient skills so that the candidate can improve those skills. They are also capable to offer an e-learning platform, taking into account the user's lack of knowledge. Furthermore, users can be provided with details on a particular job, such as the abilities required to excel in that industry.

Keywords: career guidance system, machine learning, career prediction, predictive decision, data mining, technical and non-technical skills

Procedia PDF Downloads 66
2168 Mineral Deposits in Spatial Planning Systems – Review of European Practices

Authors: Alicja Kot-Niewiadomska

Abstract:

Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.

Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices

Procedia PDF Downloads 158
2167 A Review of Paleo-Depositional Environment and Thermal Alteration Index of Carboniferous, Permian, and Triassic of A1-9 Well, NW Libya

Authors: M. A. Alrabib, Y. Sherif, A. K. Mohamed, E. A. Elfandi, E. I. Fandi

Abstract:

This paper introduces a paleo-environmental and hydrocarbon show in this well was identified in the interval of Dembaba formation to the Hassaona Formation was poor to very poor oil show. And from palaeo-environmental analysis there is neither particularly good reservoir nor source rock have been developed in the area. Recent palaeo-environment work undertakes that the sedimentary succession in this area comprises the Upper Paleozoic rock of the Carboniferous and Permian and the Mesozoic (Triassic) sedimentary sequences. No early Paleozoic rocks have been found in this area, these rocks were eroding during the Late Carboniferous and Early Permian time. During Latest Permian and earliest Triassic time evidence for major marine transgression has occurred. From depths 5930-5940 feet, to 10800-10810 feet, the TAI of the Al Guidr, the Bir Al Jaja Al Uotia, Hebilia and the top varies between 3+ to 4-(mature-dry gas). This interval corporate the rest part of the Dembaba Formation. From depth 10800- 10810 feet, until total sediment depth (11944 feet Log) which corporate the rest of the Dembaba and underlying equivalents of the Assedjefar and M Rar Formations and the underlying Indeterminate unit (Hassouna Formation) the TAI varies between 4 and 5 (dry gas-black and deformed).

Keywords: paleoenvironmental, thermal alteration index, north western Libya, hydrocarbon

Procedia PDF Downloads 453
2166 Human Pressure Threaten Swayne’s Hartebeest to Point of Local Extinction from the Savannah Plains of Nech Sar National Park, South Rift Valley, Ethiopia

Authors: Simon Shibru, Karen Vancampenhout, Jozef Deckers, Herwig Leirs

Abstract:

We investigated the population size of the endemic and endangered Swayne’s Hartebeest (Alcelaphus buselaphus swaynei) in Nech Sar National Park from 2012 to 2014 and document the major threats why the species is on the verge of local extinction. The park was once known for its abundant density of Swayne’s Hartebeest. We used direct total count methods for a census. We administered semi-structured interviews and open-ended questionnaires with senior scouts who are the member of the local communities. Historical records were obtained to evaluate the population trends of the animals since 1974. The density of the animal decreased from 65 in 1974 to 1 individual per 100 km2 in 2014 with a decline of 98.5% in the past 40 years. The respondents agreed that the conservation status of the park was in its worst condition ever now with only 2 Swayne’s Hartebeest left, with a rapid decline from 4 individuals in 2012 and 12 individuals in 2009. Mainly hunting and habitat loss, but also the unsuitable season of reproduction and shortage of forage as minor factors were identified as threats for a local extinction of the Swayne’s Hartebeests. On the other hand, predation, fire, disease, and ticks were not considered a cause for the declining trend. Hunting happens mostly out of some kind of revenge since the local community thought that they were pushed out from the land because of the presence of Swayne's Hartebeest in the area. Respondents agreed that the revenge action of the local communities was in response to their unwillingness to be displaced from the park in 1982/3. This conflict situation is resulting from the exclusionary wildlife management policy of the country. We conclude that the human interventions in general and illegal hunting, in particular, pushed the Swayne’s Hartebeest to a point of local extinction. Therefore, we recommend inclusive wildlife management approach for continuing existence of the park together with its natural resources so that sustainable use of the resources is in place.

Keywords: hunting, habitat destruction, local extinction, Nech Sar National Park, Swayne’s Hartebeest

Procedia PDF Downloads 454
2165 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 36
2164 A Comparative Study of Mechanisms across Different Online Social Learning Types

Authors: Xinyu Wang

Abstract:

In the context of the rapid development of Internet technology and the increasing prevalence of online social media, this study investigates the impact of digital communication on social learning. Through three behavioral experiments, we explore both affective and cognitive social learning in online environments. Experiment 1 manipulates the content of experimental materials and two forms of feedback, emotional valence, sociability, and repetition, to verify whether individuals can achieve online emotional social learning through reinforcement using two social learning strategies. Results reveal that both social learning strategies can assist individuals in affective, social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 2 similarly manipulates the content of experimental materials and two forms of feedback to verify whether individuals can achieve online knowledge social learning through reinforcement using two social learning strategies. Results show that similar to online affective social learning, individuals adopt both social learning strategies to achieve cognitive social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 3 simultaneously observes online affective and cognitive social learning by manipulating the content of experimental materials and feedback at different levels of social pressure. Results indicate that online affective social learning exhibits different learning effects under different levels of social pressure, whereas online cognitive social learning remains unaffected by social pressure, demonstrating more stable learning effects. Additionally, to explore the sustained effects of online social learning and differences in duration among different types of online social learning, all three experiments incorporate two test time points. Results reveal significant differences in pre-post-test scores for online social learning in Experiments 2 and 3, whereas differences are less apparent in Experiment 1. To accurately measure the sustained effects of online social learning, the researchers conducted a mini-meta-analysis of all effect sizes of online social learning duration. Results indicate that although the overall effect size is small, the effect of online social learning weakens over time.

Keywords: online social learning, affective social learning, cognitive social learning, social learning strategies, social reinforcement, social pressure, duration

Procedia PDF Downloads 18
2163 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 192
2162 High Heating Value Bio-Chars from a Bio-Oil Upgrading Process

Authors: Julius K. Gane, Mohamad N. Nahil, Paul T. Williams

Abstract:

In today’s world of rapid population growth and a changing climate, one way to mitigate various negative effects is via renewable energy solutions. Energy and power as basic requirements in almost all human endeavours are also the banes of the changing climate and the impacts thereof. Thus it is crucial to develop innovative and environmentally friendly energy options to ameliorate various negative repercussions. Upgrading of fast pyrolysis bio-oil via hydro-treatment offers such opportunities, as quality renewable liquid transportation fuels can be produced. The process, however, is typically accompanied by bio-char formation as a by-product. The goal of this work was to study the yield and some properties of bio-chars formed from a hydrotreatment process, with an overall aim to promote the valuable utilization of wastes or by-products from renewable energy technologies. It is assumed that bio-chars that have comparable energy contents with coals will be more desirable as solid energy materials due to renewability and environmental friendliness. Therefore, the analytical work in this study focused mainly on determining the higher heating value (HHV) of the chars. The method involved the reaction of bio-oil in an autoclave supplied by the Parr Instrument Company, IL, USA. Two main parameters (different temperatures and resident times) were investigated. The chars were characterized using a Thermo EA2000 CHNS analyser, then oxygen contents and HHVs computed based on the literature. From the results, these bio-chars can readily serve as feedstocks for the production of renewable solid fuels. Their HHVs ranged between 29.26-39.18 MJ/kg, affected by different temperatures and retention times. There was an inverse relationship between the oxygen content and the HHVs of the chars. It can, therefore, be concluded that it is possible to optimize the process efficiency of the hydrotreatment process used through the production of renewable energy materials from the 'waste’ char by-products. Future work should consider developing a suitable balance between the primary objective of bio-oil upgrading processes (which is to improve the quality of the liquid fuels) and the conversion of its solid wastes into value-added products such as smokeless briquettes.

Keywords: bio-char, renewable solid biofuels, valorisation, waste-to-energy

Procedia PDF Downloads 112
2161 Career Guidance System Using Machine Learning

Authors: Mane Darbinyan, Lusine Hayrapetyan, Elen Matevosyan

Abstract:

Artificial Intelligence in Education (AIED) has been created to help students get ready for the workforce, and over the past 25 years, it has grown significantly, offering a variety of technologies to support academic, institutional, and administrative services. However, this is still challenging, especially considering the labor market's rapid change. While choosing a career, people face various obstacles because they do not take into consideration their own preferences, which might lead to many other problems like shifting jobs, work stress, occupational infirmity, reduced productivity, and manual error. Besides preferences, people should evaluate properly their technical and non-technical skills, as well as their personalities. Professional counseling has become a difficult undertaking for counselors due to the wide range of career choices brought on by changing technological trends. It is necessary to close this gap by utilizing technology that makes sophisticated predictions about a person's career goals based on their personality. Hence, there is a need to create an automated model that would help in decision-making based on user inputs. Improving career guidance can be achieved by embedding machine learning into the career consulting ecosystem. There are various systems of career guidance that work based on the same logic, such as the classification of applicants, matching applications with appropriate departments or jobs, making predictions, and providing suitable recommendations. Methodologies like KNN, neural networks, K-means clustering, D-Tree, and many other advanced algorithms are applied in the fields of data and compute some data, which is helpful to predict the right careers. Besides helping users with their career choice, these systems provide numerous opportunities which are very useful while making this hard decision. They help the candidate to recognize where he/she specifically lacks sufficient skills so that the candidate can improve those skills. They are also capable of offering an e-learning platform, taking into account the user's lack of knowledge. Furthermore, users can be provided with details on a particular job, such as the abilities required to excel in that industry.

Keywords: career guidance system, machine learning, career prediction, predictive decision, data mining, technical and non-technical skills

Procedia PDF Downloads 53
2160 The Hierarchical Model of Fitness Services Quality Perception in Serbia

Authors: Mirjana Ilic, Dragan Zivotic, Aleksandra Perovic, Predrag Gavrilovic

Abstract:

The service quality perception depends on many factors, such as the area in which the services are provided, socioeconomic status, educational status, experience, age and gender of consumers, as well as many others. For this reason, it is not possible to apply instrument for establishing the service quality perception that is developed in other areas and in other populations. The aim of the research was to form an instrument for assessing the quality perception in the field of fitness in Serbia. After analyzing the available literature and conducting a pilot research, there were 15 isolated areas in which it was possible to observe the service quality perception. The areas included: material and technical basis, secondary facilities, coaches, programs, reliability, credibility, security, rapid response, compassion, communication, prices, satisfaction, loyalty, quality outcomes and motives. These areas were covered by a questionnaire consisted of 100 items where the number of items varied from area to area from 3 up to 11. The questionnaire was administered to 350 subjects of both genders (174 men and 176 women) aged from 18 to 68 years, being beneficiaries of fitness services for at least 1 year. In each of the areas was conducted a factor analysis in its exploratory form by principal components method. The number of significant factors has been determined in accordance with the Kaiser Guttman criterion. The initial factor solutions were simplified using the Varimax rotation. Analyses per areas have produced from 1 to 4 factors. Afterward, the factor analysis of factor scores on the first principal component of each of the respondents in each of the analyzed area was performed, and the factor structure was obtained with four latent dimensions interpreted as offer, the relationship with the coaches, the experience of quality and the initial impression. This factor structure was analysed by hierarchical analysis of Oblique factors, which in the second order space produced single factor interpreted as a general factor of the service quality perception. The resulting questionnaire represents an instrument which can serve managers in the field of fitness to optimize the centers development, raising the quality of services in line with consumers needs and expectations.

Keywords: fitness, hierarchical model, quality perception, factor analysis

Procedia PDF Downloads 294
2159 Comparative Analysis of Local Acceptance of Renewable Energy Facilities and Spent Nuclear Fuel Repositories

Authors: Taehyun Kim, Hyunjoo Park, Taehyun Kim

Abstract:

Public deliberation committee on Shin-Gori Nuclear Reactors No. 5 & 6 in South Korea recently suggested policy recommendation in July 2017 including complementary measures for resumption of construction: 1) nuclear power generation reduction, 2) expansion of investment to increase proportion of renewable energy, 3) repositories of spent nuclear fuel. Even when constructing eco-friendly renewable energy facilities such as solar and wind power plants, local residents are opposed to construction of these facilities due to environmental pollution and health impacts. In order to transform eco-friendly energy, it is necessary to convert nuclear energy into renewable energy and to take measures to increase the acceptance of residents through the participation of citizens. Therefore, this study aims to compare the factors of local acceptance of renewable energy facilities and spent nuclear fuel repositories through literature review and in-depth interview. The results show that environmental and economic concerns, risk perceptions, sociality, demographic characteristics and subjective recognition types affect the local acceptance for spent nuclear fuel repository. The factors of local acceptance for renewable energy facilities are partially coincide with those for spent nuclear fuel repository. The results of this study will contribute to improving residents' acceptance and reducing conflicts when determining the location of facilities in the future.

Keywords: local acceptance, renewable energy facility, spent nuclear fuel repository, interview

Procedia PDF Downloads 285
2158 Metoo in China: An Analysis of the Metoo Movement in China's Social Media

Authors: Xinrui Zhao

Abstract:

Connective actions acquired a completely different outlook of a social movement which credited with the rapid developed of social media technologies. New social movements amalgamate and mobilize around hashtags, memes, and personalized action frames. In 2017, the #MeToo movements from America spread to a variety of countries as a hashtag on social media. It attempted to demonstrate the widespread prevalence of sexual assault and harassment movement. It also encouraged Chinese women to participate by devoting and contributing their voices and acts. Furthermore, China’s #MeToo movement shows certain characteristics which are strongly shaped by particular political and cultural backgrounds, that also need to be studied. This paper serves as supplementary materials of connective action studies by addressing the #MeToo movement issues in China, which is rarely mentioned previously in the literature, it also supports a view that suggests that ideological and cultural drivers both strategically contribute to personalized action frames. This paper combines textual analysis methods, collecting attached materials from search engines in China’s social media, portrays the structure of China’s #MeToo movements by showing prominent activists, scholars, organization and the public’s action frame in China’s social media(Weibo, wechat, zhihu, douban). In doing so, it seeks to find how China’s #MeToo movements are organized and reveal diversities of social action approaches among those three subjects, digs out the correlations of their actions related to different social media platforms. This analysis suggests that while facing the government's censorship and moral judgments from the public, China’s #MeToo movement combines with few influential sexual assault and harassment events and is lead by the prominent activists who also are the victims in the events. The debates and critiques among Chinese scholars concerned the outcomes and significance of China’s #MeToo movement are divided into sides. Organizations still show less power in participating China’s movement social media. Public’s participation is varied of platforms which hugely affected by their personal experiences and knowledge.

Keywords: connective action, China, MeToo movement, social media

Procedia PDF Downloads 100
2157 Magnetic Resonance Imaging in Children with Brain Tumors

Authors: J. R. Ashrapov, G. A. Alihodzhaeva, D. E. Abdullaev, N. R. Kadirbekov

Abstract:

Diagnosis of brain tumors is one of the challenges, as several central nervous system diseases run the same symptoms. Modern diagnostic techniques such as CT, MRI helps to significantly improve the surgery in the operating period, after surgery, after allowing time to identify postoperative complications in neurosurgery. Purpose: To study the MRI characteristics and localization of brain tumors in children and to detect the postoperative complications in the postoperative period. Materials and methods: A retrospective study of treatment of 62 children with brain tumors in age from 2 to 5 years was performed. Results of the review: MRI scan of the brain of the 62 patients 52 (83.8%) case revealed a brain tumor. Distribution on MRI of brain tumors found in 15 (24.1%) - glioblastomas, 21 (33.8%) - astrocytomas, 7 (11.2%) - medulloblastomas, 9 (14.5%) - a tumor origin (craniopharyngiomas, chordoma of the skull base). MRI revealed the following characteristic features: an additional sign of the heterogeneous MRI signal of hyper and hypointensive T1 and T2 modes with a different perifocal swelling degree with involvement in the process of brain vessels. The main objectives of postoperative MRI study are the identification of early or late postoperative complications, evaluation of radical surgery, the identification of the extended-growing tumor that (in terms of 3-4 weeks). MRI performed in the following cases: 1. Suspicion of a hematoma (3 days or more) 2. Suspicion continued tumor growth (in terms of 3-4 weeks). Conclusions: Magnetic resonance tomography is a highly informative method of diagnostics of brain tumors in children. MRI also helps to determine the effectiveness and tactics of treatment and the follow up in the postoperative period.

Keywords: brain tumors, children, MRI, treatment

Procedia PDF Downloads 126
2156 Women Entrepreneurship in Poland and Its Impact on the Country’s Economic Development

Authors: Sabina Klimek

Abstract:

In general, entrepreneurs are viewed as agents of change whose goal is to ensure that resources are efficiently utilized. They are very important in the global economy; they create wealth and provide jobs. At the same time, many policymakers say that women entrepreneurs are a ‘special group’ worthy of their own research and policies. The status of Polish women has been changing as well, even though, to a large extent, it is still defined by the double role that women are expected to fill according to the dominant stereotypical model of family life. However, in the past decade, Polish women’s economic activities have experienced rapid growth and today are at a high level. In the article, the author presents the results of a survey conducted among women entrepreneurs in Poland concerning the functioning of their enterprises, motivation in setting up a company, and barriers that hinder them in business. The questionnaire (300 questionnaires were provided) and case studies carried out by the author have proven that female entrepreneurs in Poland are characterized by commonalities. Mostly they run small or micro-enterprises, operate in larger cities, are well-educated, and run service companies. Their main motivation to run their own business is mostly indicated by their need for independence. However, one of their biggest barriers and hesitations is the apprehension of non-payment. Entrepreneurs want to develop their companies, go to foreign markets and implement new solutions. They are not afraid of the future; they are only trying to create it. Detailed hypothesis, which reads as follows. The author additionally conducted a macroeconomic analysis calculating what part of GDP in Poland is produced by female entrepreneurs. The results of the study presented in this article prove that female entrepreneurship in Poland has a stable impact on the economy of the country, and women entrepreneurs produce over 13% of the national GDP. After years of growth in the number of female entrepreneurs in Poland, there has been a period of stabilization. However, there has also been a reduction in the number of self-employed people as well as the number of women in total employment. In the article, the author analyses the reasons for decreasing number of self-employed women and the total employment of women in Poland and provides suggestions for steps and incentives that should be made in order to encourage female entrepreneurship to grow in the country.

Keywords: women entrepreneurship, women in business, women entrepreneurship in Poland, Poland, GDP of Poland

Procedia PDF Downloads 67
2155 Biogas as a Renewable Energy Fuel: A Review of Biogas Upgrading, Utilization and Storage

Authors: Imran Ullah Khana, Mohd Hafiz Dzarfan Othmanb, Haslenda Hashima, Takeshi Matsuurad, A.F. Ismailb, M. Rezaei-DashtArzhandib, I. Wan Azelee

Abstract:

Biogas upgrading is a widely studied and discussed topic, and its utilization as a natural gas substitute has gained significant attention in recent years. The production of biomethane provides a versatile application in both heat and power generation and as a vehicular fuel. This paper systematically reviews the state of the art of biogas upgrading technologies with upgrading efficiency, methane (CH4) loss, environmental effect, development and commercialization, and challenges in terms of energy consumption and economic assessment. The market situation for biogas upgrading has changed rapidly in recent years, giving membrane separation a significant market share with traditional biogas upgrading technologies. In addition, the potential utilization of biogas, efficient conversion into bio-compressed natural gas (bio-CNG), and storage systems are investigated in depth. Two storing systems for bio-CNG at filling stations, namely buffer and cascade storage systems are used. The best storage system should be selected on the basis of the advantages of both systems. Also, the fuel economy and mass emissions for bio-CNG and CNG-filled vehicles are studied. There is the same fuel economy and less carbon dioxide (CO2) emission for bio-CNG. Based on the results of comparisons between the technical features of upgrading technologies, various specific requirements for biogas utilization and the relevant investment, and operating and maintenance costs, future recommendations are made for biogas upgrading.

Keywords: biogas upgrading, cost, utilization, bio-CNG, storage, energy

Procedia PDF Downloads 31
2154 Branding and Posting Strategy on Facebook Pages of Higher Education Institutions in Ontario, Canada in 2019-2020: A Quantitative and Qualitative Investigation

Authors: Mai To

Abstract:

Higher education institutions (HEIs) in Ontario, Canada have invested in social media presence for multiple purposes, such as branding, student’ engagement, and recruitment. To have a full picture of the social media strategy implemented by HEIs in Ontario, Canada, this study used a mixed-method approach to analyze Facebook posts’ characteristics and content. A total of 1789 Facebook posts from September 2019 to April 2020 of six selected HEIs were collected for analysis and coding based on five pre-determined branding positions: Elite, Nurturing, Campus, Outcome, and Commodity. Besides, the study also calculated the engagement rate for each social media practice to measure its effectiveness. The results show that there were not many differences in practices such as posting frequency, length, types, and timing among HEIs. However, the distribution of branding positions and content targeting future students versus current students was varied, although the HEIs employed all five branding positions and targeted the same lists of audiences. Some practices such as evening post for colleges and nurturing branding for universities attracted significantly higher engagement. This study provides a review of current social media practices and branding strategy, as well as informs the practices that can better engage the audiences.

Keywords: branding, higher education, social media, student engagement, student recruitment

Procedia PDF Downloads 109
2153 Using Building Information Modeling in Green Building Design and Performance Optimization

Authors: Moataz M. Hamed, Khalid S. M. Al Hagla, Zeyad El Sayad

Abstract:

Thinking in design energy-efficiency and high-performance green buildings require a different design mechanism and design approach than conventional buildings to achieve more sustainable result. By reasoning about specific issues at the correct time in the design process, the design team can minimize negative impacts, maximize building performance and keep both first and operation costs low. This paper attempts to investigate and exploit the sustainable dimension of building information modeling (BIM) in designing high-performance green buildings that require less energy for operation, emit less carbon dioxide and provide a conducive indoor environment for occupants through early phases of the design process. This objective was attained by a critical and extensive literature review that covers the following issues: the value of considering green strategies in the early design stage, green design workflow, and BIM-based performance analysis. Then the research proceeds with a case study that provides an in-depth comparative analysis of building performance evaluation between an office building in Alexandria, Egypt that was designed by the conventional design process with the same building if taking into account sustainability consideration and BIM-based sustainable analysis integration early through the design process. Results prove that using sustainable capabilities of building information modeling (BIM) in early stages of the design process side by side with green design workflow promote buildings performance and sustainability outcome.

Keywords: BIM, building performance analysis, BIM-based sustainable analysis, green building design

Procedia PDF Downloads 321
2152 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 451
2151 Trend Analysis of Africa’s Entrepreneurial Framework Conditions

Authors: Sheng-Hung Chen, Grace Mmametena Mahlangu, Hui-Cheng Wang

Abstract:

This study aims to explore the trends of the Entrepreneurial Framework Conditions (EFCs) in the five African regions. The Global Entrepreneur Monitor (GEM) is the primary source of data. The data drawn were organized into a panel (2000-2021) and obtained from the National Expert Survey (NES) databases as harmonized by the (GEM). The Methodology used is descriptive and uses mainly charts and tables; this is in line with the approach used by the GEM. The GEM draws its data from the National Expert Survey (NES). The survey by the NES is administered to experts in each country. The GEM collects entrepreneurship data specific to each country. It provides information about entrepreneurial ecosystems and their impact on entrepreneurship. The secondary source is from the literature review. This study focuses on the following GEM indicators: Financing for Entrepreneurs, Government support and Policies, Taxes and Bureaucracy, Government programs, Basic School Entrepreneurial Education and Training, Post school Entrepreneurial Education and Training, R&D Transfer, Commercial And Professional Infrastructure, Internal Market Dynamics, Internal Market Openness, Physical and Service Infrastructure, and Cultural And Social Norms, based on GEM Report 2020/21. The limitation of the study is the lack of updated data from some countries. Countries have to fund their own regional studies; African countries do not regularly participate due to a lack of resources.

Keywords: trend analysis, entrepreneurial framework conditions (EFCs), African region, government programs

Procedia PDF Downloads 51
2150 Neglected Omphalocele Presented as Ventral Hernia in 56-Year-Old Ugandan Female: Case Report and Review of Literature

Authors: Ssembatya Joseph Mary

Abstract:

Introduction: Omphalocele, an abdominal wall defect, occurs in 1 out of 4,000 to 6,000 live births. It is characterized by visceral herniation of small and large intestines, liver, and sometimes spleen and gonads are involved. The viscera is always covered by a three-layered sac. The defect in the mesoderm is mainly due to the failure of lateral abdominal wall folds to unite. About 350,000 ventral hernia repairs are done annually in the united states of America. Surgical repair with a mesh is the gold standard surgical method. With conservative management of Omphalocele, children are eventually closed between the age of 1 and 5 years. Herein, we present a late manifestation of ventral hernia following Omphalocele in a female Ugandan. Case presentation: A 56-year-old female with no known chronic illnesses and normal perinatal history presented with an umbilical swelling since birth with no associated symptoms. She is a married woman to one husband and has five children, and all of them are in good general condition with no such symptoms. She had normal vitals with an umbilical defect measuring about 20cm from the xiphoid process and 10 cm from the symphysis pubis. Surgery was done (component separation) on the second inpatient day, and it was uneventful. The patient was discharged on the 4th postoperative day in good general condition with a dry and clean surgical site. Conclusion: Despite adequate literature about Omphalocele and clear management guidelines, there have been reported cases of adult presentation of ventral hernias secondary to Omphalocele.

Keywords: omphalocele, ventral hernia, uganda, late presentation

Procedia PDF Downloads 49
2149 Dipeptide Functionalized Nanoporous Anodic Aluminium Oxide Membrane for Capturing Small Molecules

Authors: Abdul Mutalib Md Jani, Abdul Hadi Mahmud, Mohd Tajuddin Mohd Ali

Abstract:

The rapid growth of interest in surface modification of nanostructures materials that exhibit improved structural and functional properties is attracting more researchers. The unique properties of highly ordered nanoporous anodic aluminium oxide (NAAO) membrane have been proposed as a platform for biosensing applications. They exhibit excellent physical and chemical properties with high porosity, high surface area, tunable pore sizes and excellent chemical resistance. In this study, NAAO was functionalized with 3-aminopropyltriethoxysilane (APTES) to prepared silane-modified NAAO. Amine functional groups are formed on the surface of NAAO during silanization and were characterized using Fourier Transform Infrared spectroscopy (FTIR). The synthesis of multi segment of peptide on NAAO surfaces can be realized by changing the surface chemistry of the NAAO membrane via click chemistry. By click reactions, utilizing alkyne terminated with amino group, various peptides tagged on NAAO can be envisioned from chiral natural or unnatural amino acids using standard coupling methods (HOBt, EDCI and HBTU). This strategy seemly versatile since coupling strategy of dipeptide with another amino acids, leading to tripeptide, tetrapeptide or pentapeptide, can be synthesized without purification. When an appropriate terminus is selected, multiple segments of amino acids can be successfully synthesized on the surfaces. The immobilized NAAO should be easily separated from the reaction medium by conventional filtration, thus avoiding complicated purification methods. Herein, we proposed to synthesize multi fragment peptide as a model for capturing and attaching various small biomolecules on NAAO surfaces and can be also applied as biosensing device, drug delivery systems and biocatalyst.

Keywords: nanoporous anodic aluminium oxide, silanization, peptide synthesise, click chemistry

Procedia PDF Downloads 264
2148 Synthesis of Fluorescent PET-Type “Turn-Off” Triazolyl Coumarin Based Chemosensors for the Sensitive and Selective Sensing of Fe⁺³ Ions in Aqueous Solutions

Authors: Aidan Battison, Neliswa Mama

Abstract:

Environmental pollution by ionic species has been identified as one of the biggest challenges to the sustainable development of communities. The widespread use of organic and inorganic chemical products and the release of toxic chemical species from industrial waste have resulted in a need for advanced monitoring technologies for environment protection, remediation and restoration. Some of the disadvantages of conventional sensing methods include expensive instrumentation, well-controlled experimental conditions, time-consuming procedures and sometimes complicated sample preparation. On the contrary, the development of fluorescent chemosensors for biological and environmental detection of metal ions has attracted a great deal of attention due to their simplicity, high selectivity, eidetic recognition, rapid response and real-life monitoring. Coumarin derivatives S1 and S2 (Scheme 1) containing 1,2,3-triazole moieties at position -3- have been designed and synthesized from azide and alkyne derivatives by CuAAC “click” reactions for the detection of metal ions. These compounds displayed a strong preference for Fe3+ ions with complexation resulting in fluorescent quenching through photo-induced electron transfer (PET) by the “sphere of action” static quenching model. The tested metal ions included Cd2+, Pb2+, Ag+, Na+, Ca2+, Cr3+, Fe3+, Al3+, Cd2+, Ba2+, Cu2+, Co2+, Hg2+, Zn2+ and Ni2+. The detection limits of S1 and S2 were determined to be 4.1 and 5.1 uM, respectively. Compound S1 displayed the greatest selectivity towards Fe3+ in the presence of competing for metal cations. S1 could also be used for the detection of Fe3+ in a mixture of CH3CN/H¬2¬O. Binding stoichiometry between S1 and Fe3+ was determined by using both Jobs-plot and Benesi-Hildebrand analysis. The binding was shown to occur in a 1:1 ratio between the sensor and a metal cation. Reversibility studies between S1 and Fe3+ were conducted by using EDTA. The binding site of Fe3+ to S1 was determined by using 13 C NMR and Molecular Modelling studies. Complexation was suggested to occur between the lone-pair of electrons from the coumarin-carbonyl and the triazole-carbon double bond.

Keywords: chemosensor, "click" chemistry, coumarin, fluorescence, static quenching, triazole

Procedia PDF Downloads 139
2147 Variability of Hydrological Modeling of the Blue Nile

Authors: Abeer Samy, Oliver C. Saavedra Valeriano, Abdelazim Negm

Abstract:

The Blue Nile Basin is the most important tributary of the Nile River. Egypt and Sudan are almost dependent on water originated from the Blue Nile. This multi-dependency creates conflicts among the three countries Egypt, Sudan, and Ethiopia making the management of these conflicts as an international issue. Good assessment of the water resources of the Blue Nile is an important to help in managing such conflicts. Hydrological models are good tool for such assessment. This paper presents a critical review of the nature and variability of the climate and hydrology of the Blue Nile Basin as a first step of using hydrological modeling to assess the water resources of the Blue Nile. Many several attempts are done to develop basin-scale hydrological modeling on the Blue Nile. Lumped and semi distributed models used averages of meteorological inputs and watershed characteristics in hydrological simulation, to analyze runoff for flood control and water resource management. Distributed models include the temporal and spatial variability of catchment conditions and meteorological inputs to allow better representation of the hydrological process. The main challenge of all used models was to assess the water resources of the basin is the shortage of the data needed for models calibration and validation. It is recommended to use distributed model for their higher accuracy to cope with the great variability and complexity of the Blue Nile basin and to collect sufficient data to have more sophisticated and accurate hydrological modeling.

Keywords: Blue Nile Basin, climate change, hydrological modeling, watershed

Procedia PDF Downloads 344
2146 Operations Guide Implementation Practice in Information Technology Organizations

Authors: Ziad M. Hejazi, Hani F. Mokhtar, Mohammed S. Bahabri, Mohammed H. Ghafouri, Ahmed S. Bahaitham

Abstract:

This paper demonstrates the efforts taken by an Information Technology (IT) organization at Saudi Aramco to establish Operations Guide in a practical manner. Review of related work and literature revealed several important aspects to be considered when implementing the operation guide including Identify supporting IT groups, specify each group roles and responsibilities, formulate the IT operations in terms of processes (input/output), list each process main steps, provide the details of each process main step, develop the RACI (Responsible, Accountable, Consulted, and Informed) chart, highlight the process KPI’s, utilized systems, and forms. Identified aspects were then addressed in the actual implementation via several practices, including developing the operation guide for all IT supported operations, creating a shared folder for the operations guide, and announcing the implementation to all IT staff. The implementation of the mentioned practice was benchmarked, identified as best in class, and adopted by other internal organizations. Moreover, it was evident and appreciated by IT management. The significance of this study stems from the fact that it might be among the first studies in Saudi Arabia that propose a practical guideline to implement IT operations guide by IT organizations. Additional research significance comes from the study being conducted in Saudi Aramco, one of the world’s biggest integrated energy and petrochemical companies.

Keywords: operations guide, process implementation, Saudi Aramco company, information technology, standard of procedure

Procedia PDF Downloads 79
2145 Digital Marketing Maturity Models: Overview and Comparison

Authors: Elina Bakhtieva

Abstract:

The variety of available digital tools, strategies and activities might confuse and disorient even an experienced marketer. This applies in particular to B2B companies, which are usually less flexible in uptaking of digital technology than B2C companies. B2B companies are lacking a framework that corresponds to the specifics of the B2B business, and which helps to evaluate a company’s capabilities and to choose an appropriate path. A B2B digital marketing maturity model helps to fill this gap. However, modern marketing offers no widely approved digital marketing maturity model, and thus, some marketing institutions provide their own tools. The purpose of this paper is building an optimized B2B digital marketing maturity model based on a SWOT (strengths, weaknesses, opportunities, and threats) analysis of existing models. The current study provides an analytical review of the existing digital marketing maturity models with open access. The results of the research are twofold. First, the provided SWOT analysis outlines the main advantages and disadvantages of existing models. Secondly, the strengths of existing digital marketing maturity models, helps to identify the main characteristics and the structure of an optimized B2B digital marketing maturity model. The research findings indicate that only one out of three analyzed models could be used as a separate tool. This study is among the first examining the use of maturity models in digital marketing. It helps businesses to choose between the existing digital marketing models, the most effective one. Moreover, it creates a base for future research on digital marketing maturity models. This study contributes to the emerging B2B digital marketing literature by providing a SWOT analysis of the existing digital marketing maturity models and suggesting a structure and main characteristics of an optimized B2B digital marketing maturity model.

Keywords: B2B digital marketing strategy, digital marketing, digital marketing maturity model, SWOT analysis

Procedia PDF Downloads 322
2144 Mining User-Generated Contents to Detect Service Failures with Topic Model

Authors: Kyung Bae Park, Sung Ho Ha

Abstract:

Online user-generated contents (UGC) significantly change the way customers behave (e.g., shop, travel), and a pressing need to handle the overwhelmingly plethora amount of various UGC is one of the paramount issues for management. However, a current approach (e.g., sentiment analysis) is often ineffective for leveraging textual information to detect the problems or issues that a certain management suffers from. In this paper, we employ text mining of Latent Dirichlet Allocation (LDA) on a popular online review site dedicated to complaint from users. We find that the employed LDA efficiently detects customer complaints, and a further inspection with the visualization technique is effective to categorize the problems or issues. As such, management can identify the issues at stake and prioritize them accordingly in a timely manner given the limited amount of resources. The findings provide managerial insights into how analytics on social media can help maintain and improve their reputation management. Our interdisciplinary approach also highlights several insights by applying machine learning techniques in marketing research domain. On a broader technical note, this paper illustrates the details of how to implement LDA in R program from a beginning (data collection in R) to an end (LDA analysis in R) since the instruction is still largely undocumented. In this regard, it will help lower the boundary for interdisciplinary researcher to conduct related research.

Keywords: latent dirichlet allocation, R program, text mining, topic model, user generated contents, visualization

Procedia PDF Downloads 171