Search results for: destination loyalty
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 672

Search results for: destination loyalty

222 The Barriers That ESOL Learners Face Accessing Further Education

Authors: Jamie David Hopkin

Abstract:

This study aims to contribute uniquely to help colleges and community learning and development institutes to help aid progression within ESOL learning. The study investigates the barriers that migrant and displaced learners face accessing further education in Scotland. The study also includes a set of recommendations both for colleges and CLD institutes to help ESOL learners in their journey to further education. The research found that integration into Scottish society is one of the biggest motivators for ESOL students to learn English. It also found that the place of gender and “gender roles” contribute to the barriers that learners face in terms of progression and learning. The study also reviews all literature related to ESOL learning in Scotland and found that there are only two main policies that support ESOL learning, and both are slightly outdated in terms of supporting progression. This study aims to help bridge the gap in knowledge around the progression from informal learning to formal education. The recommendations that are made in this study are aimed to help institutes and learners on their journey to a positive destination. The main beneficiaries of this research are current and future ESOL learners in Scotland, ESOL institutes, and TESOL professionals.

Keywords: community learning and development, English for speakers of other languages, further education, higher education TESOL, teaching English as a second language

Procedia PDF Downloads 93
221 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 242
220 The Effect of Corporate Social Responsibility in the National Commercial Bank in Saudi Arabia

Authors: Nada Azhar

Abstract:

The aim of the paper is to investigate the effect of corporate social responsibility (CSR) CSR on the National Commercial Bank (NCB) in Saudi Arabia. In order to achieve this, a case study was made of the CSR activities of this bank from the perspective of its branch managers. The NCB was chosen as it was one of the first Saudi banks to engage in CSR and currently has a wide range of CSR initiatives. A qualitative research method was used. Open-ended questionnaires were administered to eighty branch managers of the NCB, with fifty-five usable questionnaires returned and twenty managers were interviewed as part of the primary research. Data from both questionnaires and interviews were analysed using qualitative content analysis. Six themes emerged from the questionnaire findings were used to develop the interview questions. These themes are the following: Awareness of employees about CSR in the NCB; CSR activities as a type of investment; Government and media support; Increased employee loyalty in the NCB; Prestige and profit to the NCB; and View of CSR in Islam. This paper makes a theoretical contribution in that it investigates and increases understanding of the effect of CSR on the NCB in Saudi Arabia. In addition, it makes a practical contribution by making recommendations which can support the development of CSR in the NCB. A limitation of the paper is that it is a case study of only one bank. It is therefore recommended that future research could be conducted with other banks in Saudi Arabia, or indeed, with a range of other types of firm within the financial services area in Saudi Arabia. In this way, the same issues could be explored but with a greater potential generalisability of findings of CSR within the Saudi Arabian financial services industry. In addition, this paper takes a qualitative approach and it is suggested that future research be carried out using mixed methods, which could provide a greater depth of analysis.

Keywords: branch managers, corporate social responsibility, national commercial bank, Saudi Arabia

Procedia PDF Downloads 238
219 Agent-Based Modeling of Pedestrian Corridor Congestion on the Characteristics of Physical Space Form

Authors: Sun Shi, Sun Cheng

Abstract:

The pedestrian corridor is the most crowded area in the public space. The crowded severity has been focused on the field of evacuation strategies of the entrance in large public spaces. The aim of this paper is to analyze the walking efficiency in different spaces of pedestrian corridor with the variation of spatial parameters. The congestion condition caused by the variation of walking efficiency is modeled as well. This study established the space model of the walking corridor by setting the width, slope, turning form and turning angle of the pedestrian corridor. The pedestrian preference of walking mode varied with the difference of the crowded severity, walking speed, field of vision, sight direction and the expected destination, which is influenced by the characters of physical space form. Swarm software is applied to build Agent model. According to the output of the Agent model, the relationship between the pedestrian corridor width, ground slope, turning forms, turning angle and the walking efficiency, crowded severity is acquired. The results of the simulation can be applied to pedestrian corridor design in order to reduce the crowded severity and the potential safety risks caused by crowded people.

Keywords: crowded severity, multi-agent, pedestrian preference, urban space design

Procedia PDF Downloads 193
218 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol

Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani

Abstract:

Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.

Keywords: heuristics routing, intelligent routing, VANET, route optimization

Procedia PDF Downloads 155
217 The Role of Leader, Member Exchange on Psychological Capital, Mediated by Person-Organisational Fit

Authors: Sonja Grobler

Abstract:

Background: Leadership and specifically Leader, member exchange has a definite impact on employee behaviour and attitudes, and specifically their state of psychological capital. The interactionist construct of person-organisational fit (P-O fit), consisting of a combination of supplementary fit (indirect fit or value congruence) and complementary fit (direct or person-job fit, as well as needs-supply fit) may, however, impact on the relationship between LMX and psychological capital. The unique permutations of these relationships are important not only for conceptualisation purposes but also for intervention design to enhance the employees’ psychological capital; this would contribute to positive employee behaviour and attitudes. Aim: The purpose of this study was to determine whether a relationship exists between Leader, Member Exchange (LMX) and psychological capital, with possible mediation by P-O fit. Setting: The research was conducted with ± 60 employees from each of 43 private sectors and four public sector organisations in South Africa. Method: This study utilised a positivist methodology based on an empirical approach while using a cross-sectional design and quantitative analysis. The sample is relatively representative (in terms of race, gender, and the South African work force), as it consisted of 60 employees from each of the 43 South African organisations that participated in the study, with 2 486 respondents in total. Results: Significant, positive relationships were found between LMX, P-O fit, and psychological capital. Additionally, it was found that P-O fit partially mediates the relationship between ethical leadership and supervisory trust, confirming the proposed model. Conclusion: A strong, positive relationship exists between LMX (consisting of Affect, Loyalty, Contribution, and Professional Respect) and psychological capital (consisting of Self-efficacy, Hope, Resilience and Optimism) which is partially mediated by P-O fit (consisting of supplementary fit and complementary fit).

Keywords: leader and member exchange, person-organisational fit, psychological capital, positive psychology, interactionist approach

Procedia PDF Downloads 133
216 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India

Authors: Mohammed Bashir Uddin

Abstract:

Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.

Keywords: globalization, human security, human trafficking, political economy

Procedia PDF Downloads 446
215 Comparison of Tourist Shopping Patterns in Korea, 2009-2015: A Case of China and Japan

Authors: Miju Choi, Ava Seo

Abstract:

Japan has been positioned as a major inbound market to Korea, accounting for about 31% of total inbound visitors until 2012. The percentage has sharply dropped each year since and remained in second place, reaching 13.33% in 2016. Meanwhile, China has been boosted as a major inbound market, reaching 46.79% in 2016. Chinese tourists mainly visit Korea with the major purpose of shopping. They consume Korean cosmetic/beauty products and clothes while Japanese tourists prefer to purchase healthy food such as ginseng and seaweed. This study aims to investigate and compare tourist shopping patterns across two major inbound markets, China and Japan. A quantitative approach using survey was applied from 2009 to 2016. Findings suggest Chinese visit Korea due to quality of product, value for money, and accessibility, and trust. Meanwhile, Japanese choose Korea as a shopping destination mainly due to convenience, affordability, and tourist attractions. Also, there were significant differences in shopping venues. For example, Japanese tourists prefer shopping at department stores while Chinese tourists prefer retail outlets and local markets. This study contributes to deeper understanding on two major inbound markets to Korea and suggests future marketing strategies.

Keywords: tourist shopping patterns, Korea, China, Japan, historical data

Procedia PDF Downloads 176
214 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks

Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi

Abstract:

In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.

Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward

Procedia PDF Downloads 553
213 Comparative Study on Manet Using Soft Computing Techniques

Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri

Abstract:

Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.

Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network

Procedia PDF Downloads 319
212 Comparative Assessment of Bus Rapid Transit System in India

Authors: Namrata Ghosh, Sapan Tiwari

Abstract:

Public transport service plays an important role in people's transportation needs in urban areas. Bus Rapid Transit System (BRTS) is a transport service that provides passengers with a quick and efficient mode of transport. It is developed by changing the existing infrastructure, vehicles, route, or by developing a new dedicated corridor for the bus route. This dedicated lanes transport passengers to their destination quickly and efficiently and flexible in meeting demand. However, with rapid urbanization and increasing population density in Indian cities, traffic congestion has become a significant issue. In a few Indian cities, the BRTS concept is implemented to address the issue of traffic congestion that eventually resulted in less road congestion. The research aims to provide a literature review on the overall outlook of the BRTS system and its practical implementation in mass urban transit. First, it reflects a literature review on the concept of the BRTS system in both developed and developing countries. Afterward, comparative analysis of BRTS, hindrances associated with the permanent integrated system, and the need for establishing the Bus Rapid Transit System in Indian cities is demonstrated. The research concludes with some recommendations that could help in improving the loopholes in the existing system.

Keywords: bus rapid transit system(BRTS), dedicated corridor, public transport, traffic congestion

Procedia PDF Downloads 265
211 Assessment of Tourist and Community Perception with Regard to Tourism Sustainability Indicators: A Case Study of Sinharaja World Heritage Rainforest, Sri Lanka

Authors: L. P. K. Liyanage, N. R. P. Withana, A. L. Sandika

Abstract:

The purpose of this study was to determine tourist and community perception-based sustainable tourism indicators as well as Human Pressure Index (HPI) and Tourist Activity Index (TAI). Study was carried out in Sinharaja forest which is considered as one of the major eco-tourism destination in Sri Lanka. Data were gathered using a pre-tested semi-structured questionnaire as well as records from Forest department. Convenient sampling technique was applied. For the majority of issues, the responses were obtained on multi-point Likert-type scales. Visual portrayal was used for display analyzed data. The study revealed that the host community of the Kudawa gets many benefits from tourism. Also, tourism has caused negative impacts upon the environment and community. The study further revealed the need of proper waste management and involvement of local cultural events for the tourism business in the Kudawa conservation center. The TAI, which accounted to be 1.27 and monthly evolution of HPI revealed that congestion can be occurred in the Sinharaja rainforest during peak season. The results provide useful information to any party involved with tourism planning anywhere, since such attempts would be more effective once the people’s perceptions on these aspects are taken into account.

Keywords: Kudawa Conservation Center, Sinharaja World Heritage Rainforest, sustainability indicators, community perception

Procedia PDF Downloads 129
210 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 35
209 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks

Authors: A. Khan, H. Mahmood

Abstract:

In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.

Keywords: energy holes, interference, routing, underwater

Procedia PDF Downloads 391
208 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 236
207 Examining the Role of Brand Equity and Explore the Influence of Consumers' Brand Relationship Quality

Authors: Jim Shih-Chiao Chin , Tsai Lin Hsu, Shui Lien Chen

Abstract:

This article extends the relation between company’s employee and customers in market. According to the previous researches, most researchers analyzed and focused on customers’ brand perception. In the recently, some scholars star to explore the brand management from company viewpoint. The aim of this study is to explore whether consumers perception would be affected by the firm brand. This research would like to examine the relationship between individual consumers and corporate brands in the business-to-consumers sector. First, the study develops a framework that the connection with consumer and company. Second, this article uses three dimensions, brand knowledge, brand commitment, and brand equity to measure employees’ loyalty of brand and applies brand relationship quality to gauge the level of brand’s importance in consumer’s mind. This paper uses SPSS 20.0 and AMOS 20.0 to test consumers’ minds toward the brand equity which the company provides. There are totally 862 valid questionnaires returned, and 431 participants are consumers; the other 431 participants are employees. Those questionnaires are one-by-one to consumer and employee so those are 431 pairs questionnaires. Based on 431 pairs of consumers and company’s employees, analyzed results show that brand knowledge and brand commitment play important roles influencing brand equity. The results also demonstrate the extra-role brand equity positively impact on the brand relationship quality of consumers. In addition, the findings reveal that the company can improve brand relationship quality of consumers by enhancing extra-role brand equity. There is a sufficient evidence denote that brand relationship quality not only shows about the brand of customers’ thought but also implies company how to build the brand to impress on consumers. These findings provide the degree of the brand in consumers’ cognition. The brand-owner employee can reference the conclusion to creative new strategic to the next time or can be one of the company’s competitive advantages. Those results and conclusions are contributed to management practice and future.

Keywords: brand knowledge, brand commitment, brand equity, brand relationship quality

Procedia PDF Downloads 422
206 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network

Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz

Abstract:

Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.

Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle

Procedia PDF Downloads 219
205 Aggregation Scheduling Algorithms in Wireless Sensor Networks

Authors: Min Kyung An

Abstract:

In Wireless Sensor Networks which consist of tiny wireless sensor nodes with limited battery power, one of the most fundamental applications is data aggregation which collects nearby environmental conditions and aggregates the data to a designated destination, called a sink node. Important issues concerning the data aggregation are time efficiency and energy consumption due to its limited energy, and therefore, the related problem, named Minimum Latency Aggregation Scheduling (MLAS), has been the focus of many researchers. Its objective is to compute the minimum latency schedule, that is, to compute a schedule with the minimum number of timeslots, such that the sink node can receive the aggregated data from all the other nodes without any collision or interference. For the problem, the two interference models, the graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR), have been adopted with different power models, uniform-power and non-uniform power (with power control or without power control), and different antenna models, omni-directional antenna and directional antenna models. In this survey article, as the problem has proven to be NP-hard, we present and compare several state-of-the-art approximation algorithms in various models on the basis of latency as its performance measure.

Keywords: data aggregation, convergecast, gathering, approximation, interference, omni-directional, directional

Procedia PDF Downloads 203
204 Enhancing Experiential Education in Teacher Education Classes Through Simulated Person Methodology

Authors: Karen Armstrong

Abstract:

This study is a narrative inquiry into the use of simulated person methodology (SPM) in teacher education classes. This methodology -often used in medical schools- has tremendous benefits in terms of enhancing experiential education in teacher education classes. Literacy education is a major focus in elementary schools. New teachers must work with parents to ensure that children learn to read and expand their literacy horizons. The classes used in this narrative inquiry research consist of one graduate class on family literacy and two pre-service teacher education classes: literacy and culture and early and family literacy. Two scenarios were devised, both of which simulated a parent-teacher interview. In the first scenario, the parent is a reluctant father who is ashamed of his lack of reading ability and does not understand why literacy is important. His seven-year-old son, wanting to emulate his father, has suddenly transformed from an eager student to one who rejects the value of reading in loyalty to his father who cannot read. In the second scenario, a father is called in by the teacher because his son has started acting out in class. The mother in this scenario is temporarily absent from the home, and the father is now the sole caregiver. In each of the scenarios, students are the teachers who are problem-solving these dilemmas in a safe environment with the 'parent' who is a specially trained simulated person. Teacher candidates enact, with the trained simulated person, their strategies for encouraging parents to engage in the literacy development of their children. Teacher candidates attempt to offer support and encouragement to parents. This simulation strategy offers both beginning and more experienced teachers the opportunity to practice an interview with two distinct and contrasting family situations with regard to the literacy of young children. The paper discusses the details of the scenarios enacted in class and the reflective discussion through which students learn from the simulation.

Keywords: experiential education, literacy, simulated person methodology, teacher education

Procedia PDF Downloads 89
203 Air Connectivity in Promoting Association of Southeast Asian Nations Integration: The Role of Low Cost-Carriers

Authors: Gabriella Fardhiyanti, Victor Wee

Abstract:

Air connectivity is the crucial factors to boost a region economics growth. It will open the accessibility to support regional competitiveness and helps to achieve ASEAN (Association of Southeast Asian Nations) integration in term of economic integration, business investment, promote intra-regional trade, and creates the sense of belongingness among ASEAN people in the region. An increasing number of air connectivity and transportation will be benefiting the region because air transportation is a vital hub for ASEAN. The aim of this paper is to address the importance of air connectivity in promoting ASEAN Integration, by focusing on the ASEAN vision for a more integrated region. The assessment uses based on the Netscan Air connectivity model based on the flight destination and airport connectivity index, further analysis present that air connectivity significantly influence ASEAN tourism sector. Follow by the implications of open skies policy for the liberation of the aviation industry and the growth of low cost-carriers (LCCs) in the region. This paper provides recommendation and strategy for overcoming the challenges faced by ASEAN to boost ASEAN tourism integration successfully. The findings can assist in guiding policy and industry stakeholders in the future decision relating to air liberalization and more integrated system in the region.

Keywords: air connectivity, ASEAN integration, low-cost carries, NetScan connectivity model, open skies policy

Procedia PDF Downloads 197
202 Comparison of Nitrogen Dioxide Pollution for Different Commuting Modes in Kaunas

Authors: A. Dėdelė, A. Miškinytė

Abstract:

The assessment of air pollution exposure in different microenvironments is important for better understanding the relationship between health effects caused by air pollution. The recent researches revealed that the level of air pollution in transport microenvironment contributes considerably to the total exposure of air pollution. The aim of the study was to determine air pollution of nitrogen dioxide and to assess the exposure of NO2 dependence on the chosen commuting mode using a global positioning system (GPS). The same travel destination was chosen and 30 rides in three different commuting modes: cycling, walking, and public transport were made. Every different mean of transport is associated with different route. GPS device and travel diary data were used to track all routes of different commuting modes. Air pollution of nitrogen dioxide was determined using the ADMS-Urban dispersion model. The average annual concentration of nitrogen dioxide was modeled for 2011 year in Kaunas city. The geographical information systems were used to visualize the travel routes, to create maps indicating the route of different commuting modes and to combine modelled nitrogen dioxide data. The results showed that there is a significant difference between the selected commuting mode and the exposure of nitrogen dioxide. The concentrations in the microenvironments were 22.4 μg/m3, 21.4 μg/m3, and 25.9 μg/m3 for cycling, walking and public transport respectively. Of all the modes of commuting, the highest average exposure of nitrogen dioxide was found travelling by public transport, while the lowest average concentration of NO2 was determined by walking.

Keywords: nitrogen dioxide, dispersion model, commuting mode, GPS

Procedia PDF Downloads 414
201 Design and Development of Multi-Functional Intelligent Robot Arm Gripper

Authors: W. T. Asheber, L. Chyi-Yeu

Abstract:

An intelligent robot arm is expected to recognize the desired object, grasp it with appropriate force without dropping or damaging it, and also manipulate and deliver the object to the desired destination safely. This paper presents an intelligent multi-finger robot arm gripper design along with vision, proximity, and tactile sensor for efficient grasping and manipulation tasks. The generic design of the gripper makes it convenient for improved parts manipulation, multi-tasking and ease for components assembly. The proposed design emulates the human’s hand fingers structure using linkages and direct drive through power screw like transmission. The actuation and transmission mechanism is designed in such a way that it has non-back-drivable capability, which makes the fingers hold their position when even unpowered. The structural elements are optimized for a finest performance in motion and force transmissivity of the gripper fingers. The actuation mechanisms is designed specially to drive each finger and also rotate two of the fingers about the palm to form appropriate configuration to grasp various size and shape objects. The gripper has an automatic tool set fixture incorporated into its palm, which will reduce time wastage and do assembling in one go. It is equipped with camera-in-hand integrated into its palm; subsequently an image based visual-servoing control scheme is employed.

Keywords: gripper, intelligent gripper, transmissivity, vision sensor

Procedia PDF Downloads 339
200 Leveraging on Application of Customer Relationship Management Strategy as Business Driving Force: A Case Study of Major Industries

Authors: Odunayo S. Faluse, Roger Telfer

Abstract:

Customer relationship management is a business strategy that is centred on the idea that ‘Customer is the driving force of any business’ i.e. Customer is placed in a central position in any business. However, this belief coupled with the advancement in information technology in the past twenty years has experienced a change. In any form of business today it can be concluded that customers are the modern dictators to whom the industry always adjusts its business operations due to the increase in availability of information, intense market competition and ever growing negotiating ideas of customers in the process of buying and selling. The most vital role of any organization is to satisfy or meet customer’s needs and demands, which eventually determines customer’s long-term value to the industry. Therefore, this paper analyses and describes the application of customer relationship management operational strategies in some of the major industries in business. Both developed and up-coming companies nowadays value the quality of customer services and client’s loyalty, they also recognize the customers that are not very sensitive when it comes to changes in price and thereby realize that attracting new customers is more tasking and expensive than retaining the existing customers. However, research shows that several factors have recently amounts to the sudden rise in the execution of CRM strategies in the marketplace, such as a diverted attention of some organization towards integrating ideas in retaining existing customers rather than attracting new one, gathering data about customers through the use of internal database system and acquiring of external syndicate data, also exponential increase in technological intelligence. Apparently, with this development in business operations, CRM research in Academia remain nascent; hence this paper gives detailed critical analysis of the recent advancement in the use of CRM and key research opportunities for future development in using the implementation of CRM as a determinant factor for successful business optimization.

Keywords: agriculture, banking, business strategies, CRM, education, healthcare

Procedia PDF Downloads 207
199 Fruits and Vegetable Consumers' Behaviour towards Organised Retailers: Evidence from India

Authors: K. B. Ramappa, A. V. Manjunatha

Abstract:

Consumerism in India is witnessing unprecedented growth driven by favourable demographics, rising young and working population, rising income levels, urbanization and growing brand orientation. In addition, the increasing level of awareness on health, hygiene and quality has made the consumers to think on the fairly traded goods and brands. This has made retailing extremely important to everyone because without retailers’ consumers would not have access to day-to-day products. The increased competition among different retailers has contributed significantly towards rising consumer awareness on quality products and brand loyalty. Many existing empirical studies have mainly focused on net saving of consumers at organised retail via-a-vis unorganised retail shops. In this article, authors have analysed the Bangalore consumers' attitudes towards buying of fruits and vegetables and their choice of retail outlets. The primary data was collected from 100 consumers belonging to the Bangalore City during October 2014. Sample consumers buying at supermarkets, convenience stores and hypermarkets were purposively selected. The collected data was analyzed using descriptive statistics and multinomial logit model. It was found that among all variables, quality and prices were major accountable factors for buying fruits and vegetables at organized retail shops. The empirical result of multinomial logit model reveals that annual net income was positively associated with the Big Bazar and Food World consumers and negatively associated with the Reliance Fresh, More and Niligiris consumers, as compared with the HOPCOMS consumers. Per month expenditure on fruits and vegetables was positively and age of the consumer was negatively related to the consumers’ choice of buying at modern retail markets. Consumers were willing to buy at modern retail outlets irrespective of the distance.

Keywords: organized retailers, consumers' attitude, consumers' preference, fruits, vegetables, multinomial logit, Bangalore

Procedia PDF Downloads 390
198 The Analysis of Underground Economy Transaction Existence of Junk Night Market (JNM) in Malang City

Authors: Sebastiana Viphindratin, Silvi Asna

Abstract:

The under ground economy phenomenon is exist in Indonesia. There are some factors which affect the existence this underground economy activity. One of them is a hierarchy power structure that handles the underground economy existence. The example of the existence of underground economy is the occurring informal market in Indonesia. Malang city is one of the city which has this kind of market. Junk night market (JNM) as an underground economy activity is arising in that city. The JNM is located in Gatot Subroto Sidewalk Street. The JNM is a illegal market which sell thrift, antique, imitation and black market goods. The JNM is interesting topic to be discussed, because this market is running in long time without any policy from local government. The JNM activity has their own “power” that run the market rules. Thus, it is important to analyze how the existence and power structure of JNM actors community are in Malang city. This research using qualitative method with phenomenological approach where we try to understand the phenomenon and related actors deeply. The aim of this research is to know the existence and power structure of JNM actors community in Malang. In JNM, there is no any entry barriers and tax charge from Malang government itself. Price competition also occurs because the buyer can do a bargain with the seller. In maintaining buyer loyalty, the JNM actors also do pre-order system. Even though, this market is an illegal market but the JNM actors also give the goods guarantee (without legal contract) as a formal market. In JNM actor’s community, there is no hierarchy and formal power structure. The role in JNM is managed by informal leaders who come up from the trading activity problems that are sidewalk and parking area dividing. Therefore, can be concluded that even the JNM is illegal market but it can survive with natural market pattern. In JNM development, JNM has positive and negative impact for Malang city. The positive impact of JNM is this market can open a new employment but the negative impact is there is no tax income from that market. Therefore, suggested that the government of Malang city should manage and give appropriate policies in this case.

Keywords: junk night market (JNM), Malang city, underground economy, illegal

Procedia PDF Downloads 387
197 Mediterranean Urbanism: Migration, Tourism and Public Space in the Mediterranean City

Authors: Smoki Musaraj

Abstract:

Classic studies of the Mediterranean as a cultural and geographic unit of analysis have emphasized the theme of cosmopolitan urbanism as a key feature of the Mediterranean city. This paper explores the Mediterranean city today, considering continuities and ruptures from images of the Mediterranean of the past. The paper seeks to address the following questions: What are some defining characteristics of Mediterranean cities today? What are some of the shared challenges? The paper focuses on two interrelated themes: public space and tourism management. Several examples of protest and contestation in Mediterranean cities will be analyzed. These examples include cities where tourism presents opportunities and challenges to city planning and management; and where new private and public developments threaten the management of public space. The paper draws on ethnographic research in the city of Saranda, Albania, a small attractive tourist destination on the border with Greece, and Barcelona, Spain, a leading example of urban transformation and tourism massification. While different in size and popularity, both cities share some similar developments and contestations. In both cities, authorities have taken up different strategies to manage tourism and restore public space. The comparison will focus on social movements in the respective cities that target tourism and urban development in the name of preserving theirMediterraneaness. These examples are used to reflect more broadly on what are some features of the Mediterranean city today and how they can be preserved in the current climate of tourism expansion of urban development boom.

Keywords: mediterranean, urbanism, tourism, public space, anthropology, human geography, sustainability

Procedia PDF Downloads 85
196 Enhancing Self-Assessment and Management Potentials by Modifying Option Selections on Hartman’s Personality Test

Authors: Daniel L. Clinciu, IkromAbdulaev, Brian D. Oscar

Abstract:

Various personality profile tests are used to identify personality strengths and limits in individuals, helping both individuals and managers to optimize work and team effort in organizations. One such test, Hartman’s personality profile emphasizes four driving "core motives" influenced or affected by both strengths and limitations. The driving core motives are classified into four colors: Red-motivated by power; Blue-discipline and loyalty; White-peace; and Yellow–fun loving. Two shortcomings of Hartman’s personality test are noted; 1) only one choice for every item/situation allowed and 2) selection of a choice even if not applicable. A test taker may be as much nurturing as he is opinionated but since “opinionated” seems less attractive the individual would likely select nurturing, causing a misidentification in personality strengths and limits. Since few individuals have a "strong" personality, it is difficult to assess their true personality strengths and limits allowing either only one choice or requiring unwanted choices, undermining the potential of the test. We modified Hartman’s personality profile allowing test takers to make either multiple choices for any item/situation or leave them blank when not applying. Sixty-eight participants (38 males and 30 females), 17-49 years old, from countries in Asia, Europe, N. America, CIS, Africa, Latin America, and Oceania were included. 58 participants (85.3%) reported the modified test, allowing either multiple or no choices better identified their personality strengths and limits, while 10 participants (14.7%) expressed the original (one choice version) is sufficient. The overall results show our modified test enhanced the identification and balance of personality strengths and limits, aiding test takers, managers, and firms to better understand personality strengths and limits, particularly useful in making task-related, teamwork, and management decisions.

Keywords: organizational behavior, personality tests, personality limitations, personality strengths, task management, team work

Procedia PDF Downloads 339
195 Differential Proteomic Profile and Terpenoid Production in Somatic Embryos of Jatropha curcas

Authors: Anamarel Medina-Hernandez, Teresa Ponce-Noyola, Ileana Vera-Reyes, Ana C. Ramos-Valdivia

Abstract:

Somatic embryos reproduce original seed characteristics and could be implemented in biotechnological studies. Jatropha curcas L. is an important plant for biodiesel production, but also is used in traditional medicine. Seeds from J. curcas are toxic because contain diterpenoids called phorbol esters, but in Mexico exist a non-toxic variety. Therefore, somatic embryos suspension cultures from non-toxic J. curcas variety were induced. In order to investigate the characteristics of somatic embryos, a differential proteomic analysis was made between pre-globular and globular stages by 2-D gel electrophoresis. 108 spots were differentially expressed (p<0.02), and 20 spots from globular somatic embryos were sequenced by MALDI-TOF-TOF mass spectrometry. A comparative analysis of terpenoids production between the two stages was made by RP-18 TLC plates. The sequenced proteins were related to energy production (68%), protein destination and storage (9%), secondary metabolism (9%), signal transduction (5%), cell structure (5%) and aminoacid metabolism (4%). Regarding terpenoid production, in pre-globular and globular somatic embryos were identified sterols and triterpenes of pharmacological interest (alpha-amyrin and betulinic acid) but also it was found compounds that were unique to each stage. The results of this work are the basis to characterize at different levels the J. curcas somatic embryos so that this system can be used efficiently in biotechnological processes.

Keywords: Jatropha curcas, proteomics, somatic embryo, terpenoids

Procedia PDF Downloads 230
194 Risk and Vulnerability Assessment of Agriculture on Climate Change: Bangnampriao District, Thailand

Authors: Charuvan Kasemsap

Abstract:

This research was studied in Bangnampriao District, Chachernsao Province, Thailand. The primary data relating to flooding, drought, and saline intrusion problem on agriculture were collected by surveying, focus group, and in-depth interview with agricultural officers, technical officers of irrigation department, and local government leader of Bangnampriao District. The likelihood and consequence of risk were determined the risk index by risk assessment matrix. In addition, the risk index and the total coping capacity scores were investigated the vulnerability index by vulnerability matrix. It was found that the high-risk drought and saline intrusion was dramatically along Bang Pakong River owing to the end destination of Chao Phraya Irrigation system of Central Thailand. This leads yearly the damage of rice paddy, mango tree, orchard, and fish pond. Therefore, some agriculture avoids rice growing during January to May, and also pumps fresh water from a canal into individual storage pond. However, Bangnampriao District will be strongly affected by the impacts of climate change. Monthly precipitations are expected to decrease in number; dry seasons are expected to be more in number and longer in duration. Thus, the risk and vulnerability of agriculture are also increasing. Adaptation strategies need to be put in place in order to enhance the resilience of the agriculture.

Keywords: agriculture, bangnampriao, climate change, risk assessment

Procedia PDF Downloads 400
193 Making New Theoretical Insights into Violence: The Temporal and Spatial Relevance of Blood Spatter Crime Scene Investigations

Authors: Simone Jane Dennis

Abstract:

This paper leverages the spatial and temporal investigative strategy utilized by crime scene investigators – blood spatter work– to engage with the real and metaphorical memorialization of blood-soaked places. It uses this key trope with phenomenological sensibility, to trace the physical and temporal movement of blood outbound from the human body to sites beyond. Working backward, as crime scene investigators do, this paper traces the importance of both space and time and their confluence, to developing a comprehensive theory of violence. To do this work, the paper engages a range of geo-violent scales, from murder scenes to genocides, to both engage an extraordinarily replete literature of bloodshed across history and to move beyond analyses of how significance is assigned to the sites in which blood comes to rest to instead consider the importance of space and time to the structure of violence itself. It is in this regard that the kind of investigative work upon which blood spatter analysis depends is crucial: it engages time and space in reverse to understand the microscopic relations between bodies, places, and numerous (biological, clock, and seasonal) temporalities. Considering the circumstances under which blood escaped a body, the details of its destination in place, and the temporal circumstances of corporal departure, is crucial to making new knowledge about the peculiar temporality and spatiality of violence itself.

Keywords: blood, crime scenes, temporality, violence

Procedia PDF Downloads 44