Search results for: digital resources
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7728

Search results for: digital resources

2838 The Effect of Knowledge Management in Lean Organization

Authors: Mehrnoosh Askarizadeh

Abstract:

In an ever changeable and globalized world with new economic and global competitors competing for the same customers and resources, is increasing the pressure on organizations' competitiveness. In addition, organizations faces additional challenges due to an ever-growing amount of data and the ever-bigger challenge of analyzing that data and keeping the data secure. Successful companies are characterized by exploiting their intellectual capital in an efficient manner. Thus, the most valuable asset an organization has today has become its employees' knowledge. To enable this, there is a tool that supports easier handling and optimizes the use of knowledge, which is knowledge management. Based on the theoretical framework and careful review as well as analysis of interviews and observations resulted in six essential areas: structure, management, compensation, communication, trust and motivation. The analysis showed that the scientific articles and literature have different perspectives, different definitions and are based on different theories but the essence is that they all finally seems to arrive at the same result and conclusion, although with different viewpoints and perspectives. This is regardless of whether the focus is on management style, rewards or communication they all focus on the individual. The conclusion is that organizational culture affects knowledge management and dissemination of information, because of its direct impact on the individual. The largest and most important underlying factor why we choose to participate in improvement work or share knowledge is our motivation. Motivation is the reason for and the reason behind our actions.

Keywords: lean, lean production, knowledge management, information management, motivation

Procedia PDF Downloads 519
2837 Academic Influence of Social Network Sites on the Collegiate Performance of Technical College Students

Authors: Jameson McFarlane, Thorne J. McFarlane, Leon Bernard

Abstract:

Social network sites (SNS) is an emerging phenomenon that is here to stay. The popularity and the ubiquity of the SNS technology are undeniable. Because most SNS are free and easy to use people from all walks of life and from almost any age are attracted to that technology. College age students are by far the largest segment of the population using SNS. Since most SNS have been adapted for mobile devices, not only do you find students using this technology in their study, while working on labs or on projects, a substantial number of students have been found to use SNS even while listening to lectures. This study found that SNS use has a significant negative impact on the grade point average of college students particularly in the first semester. However, this negative impact is greatly diminished by the end of the third semester partly because the students have adjusted satisfactorily to the challenges of college or because they have learned how to adequately manage their time. It was established that the kinds of activities the students are engaged in during the SNS use are the leading factor affecting academic performance. Of those activities, using SNS during a lecture or while studying is the foremost contributing factor to lower academic performance. This is due to “cognitive” or “information” bottleneck, a condition in which the students find it very difficult to multitask or to switch between resources leading to inefficiency in information retention and thus, educational performance.

Keywords: social network sites, social network analysis, regression coefficient, psychological engagement

Procedia PDF Downloads 179
2836 Optimizing SCADA/RTU Control System Alarms for Gas Wells

Authors: Mohammed Ali Faqeeh

Abstract:

SCADA System Alarms Optimization Process has been introduced recently and applied accordingly in different implemented stages. First, MODBUS communication protocols between RTU/SCADA were improved at the level of I/O points scanning intervals. Then, some of the technical issues related to manufacturing limitations were resolved. Afterward, another approach was followed to take a decision on the configured alarms database. So, a couple of meetings and workshops were held among all system stakeholders, which resulted in an agreement of disabling unnecessary (Diagnostic) alarms. Moreover, a leap forward step was taken to segregate the SCADA Operator Graphics in a way to show only process-related alarms while some other graphics will ensure the availability of field alarms related to maintenance and engineering purposes. This overall system management and optimization have resulted in a huge effective impact on all operations, maintenance, and engineering. It has reduced unneeded open tickets for maintenance crews which led to reduce the driven mileages accordingly. Also, this practice has shown a good impression on the operation reactions and response to the emergency situations as the SCADA operators can be staying much vigilant on the real alarms rather than gets distracted by noisy ones. SCADA System Alarms Optimization process has been executed utilizing all applicable in-house resources among engineering, maintenance, and operations crews. The methodology of the entire enhanced scopes is performed through various stages.

Keywords: SCADA, RTU Communication, alarm management system, SCADA alarms, Modbus, DNP protocol

Procedia PDF Downloads 166
2835 Development of Wave-Dissipating Block Installation Simulation for Inexperienced Worker Training

Authors: Hao Min Chuah, Tatsuya Yamazaki, Ryosui Iwasawa, Tatsumi Suto

Abstract:

In recent years, with the advancement of digital technology, the movement to introduce so-called ICT (Information and Communication Technology), such as computer technology and network technology, to civil engineering construction sites and construction sites is accelerating. As part of this movement, attempts are being made in various situations to reproduce actual sites inside computers and use them for designing and construction planning, as well as for training inexperienced engineers. The installation of wave-dissipating blocks on coasts, etc., is a type of work that has been carried out by skilled workers based on their years of experience and is one of the tasks that is difficult for inexperienced workers to carry out on site. Wave-dissipating blocks are structures that are designed to protect coasts, beaches, and so on from erosion by reducing the energy of ocean waves. Wave-dissipating blocks usually weigh more than 1 t and are installed by being suspended by a crane, so it would be time-consuming and costly for inexperienced workers to train on-site. In this paper, therefore, a block installation simulator is developed based on Unity 3D, a game development engine. The simulator computes porosity. Porosity is defined as the ratio of the total volume of the wave breaker blocks inside the structure to the final shape of the ideal structure. Using the evaluation of porosity, the simulator can determine how well the user is able to install the blocks. The voxelization technique is used to calculate the porosity of the structure, simplifying the calculations. Other techniques, such as raycasting and box overlapping, are employed for accurate simulation. In the near future, the simulator will install an automatic block installation algorithm based on combinatorial optimization solutions and compare the user-demonstrated block installation and the appropriate installation solved by the algorithm.

Keywords: 3D simulator, porosity, user interface, voxelization, wave-dissipating blocks

Procedia PDF Downloads 103
2834 A Coevolutionary Framework of Business-IT Alignment through the Lens of Enterprise Architecture

Authors: Mengmeng Zhang, Honghui Chen, Kalle Lyytinen

Abstract:

The major challenges for sustainable business-IT alignment (BITA) in a company root in its volatile external competitive environment, increasingly complex internal relationships, and subversive IT roles. Failure to adequately address BITA results in wasting organizational resources, losing competitive advantages, and failing to produce adequate returns on investments. The coevolution is more suitable to describe the dynamic relationships of business and IT and has received certain attention in recent years. Multiple mechanisms for achieving BITC (e.g., sharing domain knowledge, modular design) were obtained. However, instead of a complete managing process, BITC achievement is still hard to operate in practice. This study emphasizes what the BITC management process looks like and how to execute this coevolution step-by-step. A practical coevolutionary framework that combines the enterprise architecture (EA) method with misalignment analysis is proposed in this paper. It contains steps of EA design, misalignment detection, misalignment correction, and EA management /misalignment prevention. The step of misalignment correction is especially discussed at length. This study also evaluates the proposed framework by comparing the characteristics, principles, and approaches of coevolution in the literature.

Keywords: business-IT alignment, business-IT coevolution, enterprise architecture, misalignment analysis, misalignment correction

Procedia PDF Downloads 150
2833 Life Stories: High Quality of Life until the End with the Narrative Medicine and the Storytelling

Authors: Danila Zuffetti, Lorenzo Chiesa

Abstract:

Background: A hospice narrative interview aims at putting the sick at the core of disease and treatment allowing them to explore their most intimate facets. The aim of this work is to favor authentic narration by leading towards awareness and acceptance of terminality and to face death with serenity. Narration in palliative care aims at helping to reduce the chaos generated by the disease and to elaborate interpretations on the course of reality, besides, the narration delivered to the doctor is fundamental and communicates the meaning given to symptoms. Methods: The narrative interview has become a regular activity in the Castellini Foundation since 2017. Patients take part every week, and for more days, in one hour sessions, in a welcoming and empathic setting and the interaction with the operator leads to a gradual awareness of their terminality. Patients are submitted with free answer questions with the purpose of facilitating and stimulating self-narration. Narration has not always been linear, but patients are left free to shift in time to revisit their disease process by making use of different tools, such as digital storytelling. Results: The answers provided by the patients show to which extent the narrative interview is an instrument allowing the analysis of the stories and gives the possibility to better understand and deepen the different implications of patient and caregiver’s background. Conclusion: The narration work in the hospice demonstrates that narrative medicine is an added value. This instrument has proven useful not only in the support of patients but also for the palliative doctor to identify wishes for accompanying them to the end with dignity and serenity. The narrative interview favors the construction of an authentic therapeutic relationship. The sick are taken wholly in charge, and they are guaranteed a high quality of life until their very last instant.

Keywords: construction of an authentic therapy relationship, gradual awareness of their terminality, narrative interview, reduce the chaos generated by the desease

Procedia PDF Downloads 176
2832 Two-Way Reminder Systems to Support Activities of Daily Living for Adults with Cognitive Impairments: A Scoping Review

Authors: Julia Brudzinski, Ashley Croswell, Jade Mardin, Hannah Shilling, Jennifer Berg-Carnegie

Abstract:

Adults with brain injuries and mental illnesses commonly experience cognitive impairments that interfere with their participation in activities of daily living (ADLs). Prior research states that electronic reminder systems can support adults with cognitive impairments; however, previous studies focus primarily on one-way reminder systems. Research on adults with chronic diseases reported that two-way reminder systems yield better health outcomes and disease self-management compared to one-way reminder systems. Literature was identified through systematically searching 7 databases and hand-searching relevant reference lists. Retrieved studies were independently screened and reviewed by at least two members of the research team. Data was extracted on study design, participant characteristics, intervention details, study objectives, outcome measures, and important results. 574 articles were screened and reviewed. Nine articles met all inclusion criteria and were included. The literature focused on three main areas: system feasibility (n=8), stakeholder satisfaction (n=6), and efficacy of the two-way reminder systems (n=6). Participants in eight of the studies had brain injuries, with participants in only one study having a mental illness (i.e., schizophrenia). Two-way reminder systems were used to support participation in a wide range of ADLs. The current literature on two-way reminder systems to support ADLs for adults with cognitive impairments focuses on feasibility, stakeholder satisfaction, and system efficacy. Future research should focus on addressing the barriers to accessing and implementing two-way reminder systems and identifying specific client characteristics that would benefit most from using these systems.

Keywords: brain injury, digital health, occupational therapy, activities of daily living, two-way reminder systems

Procedia PDF Downloads 74
2831 Assessment of the Frontline Services of the National Museum of the Philippines: Basis for an Improved Client-Oriented Service Package

Authors: Geneva Oaferina

Abstract:

The Philippines is striving to deliver professional and improved public services. The country is committed to making more effective use of its resources to fulfill its sectoral and development goals. Within the heritage field, the museum needs to have a strong focus on seeking excellence in its services to its many publics. The National Museum of the Philippines is mandated as an educational, scientific, and cultural institution. It is important that the museum is more accessible, understandable, and relevant to the public, and at the same time, it provides a quality experience for an improved client-oriented service package. This study assessed the service delivery of the National Museum using the modified HISTOQUAL model. The HISTOQUAL dimensions (Responsiveness, Tangibles, Communications, Consumables, and Empathy) were adapted that identify the service quality features in the museum sector from the poorest to the most outstanding factor that will be subject to improvement, as well as those factors that represent strong points of the museum’s services and which are important to the museum visitors. This also identified the gaps encountered by the respondents that caused such inconvenience and default on achieving the sectoral and organizational goals of the museum. As an output of the study, the researcher formulated the service package and adapted the HISTOQUAL dimensions and statements from the assessment through documentary analysis and data analysis/interpretation.

Keywords: museum, frontline, inclusivity, HISTOQUAL

Procedia PDF Downloads 100
2830 International and Intercultural Communication Design: Case Study of Manipulative Advertising

Authors: Faiqa Jalal

Abstract:

The purpose of the following research paper is to discuss the differentiating meanings of culture and how popular culture has maintained a great impact on intercultural and international behavior. The following discussion leads to the notion of communicating cultural impact on behavior through advertising and sub-cultural theory in advertising. Although towards the end of the research, the complexities that develop through the above discussion, lead to the solution that ‘advertising gives meaning to the otherwise meaningless and identical objects through linking them to our basic needs’. In today’s fast paced digital world, it is difficult to define culture, literally, since its meaning tends to shift through series of different perceptions such as ‘how’ and ‘why’ it should be used. This notion can be taken towards another notion of popular culture. It is dependent on ‘attitudes, ideas, images, perspectives and other phenomena within the mainstream of a given culture’. Since popular culture is influenced by mass media, it has a way of influencing an individual’s attitude towards certain topics. For example, tattoos are a form of human decorations, that have historic significance, and a huge spectrum of meanings. Advertising is one aspect of marketing that has evolved from the time when it was ‘production oriented’, up till the time it started using different mediums to make its impact more effective. However, this impact has confused us between our needs and desires. The focus in this paper is ‘we consume to acquire a sense of social identity and status, not just for the sake of consumption’. Every culture owns different expressions, which are then used by advertisers to create its impact on the behavior of people sub-culturally and globally, as culture grows through social interaction. Advertisers furthermore play a smart role in highlighting quality of life ranging from ‘survival to well-being’. Hence, this research paper concludes by highlighting that culture is considered as a ‘basic root’ of any community that also provides solution to certain problems; however, advertisers play their part in manipulating society’s literacy and beliefs by rationalizing how relevant certain products/brands are to their beliefs.

Keywords: mass media, popular culture, production oriented, sub-culture

Procedia PDF Downloads 227
2829 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
2828 Comparative Life Cycle Assessment of Roofing System for Abu Dhabi

Authors: Iyasu Eibedingil

Abstract:

The construction industry is one of the major factors responsible for causing a negative impact on the environment. It has the largest share in the use of natural resources including land use, material extraction, and greenhouse gases emissions. For this reason, it is imperative to reduce its environmental impact through the construction of sustainable buildings with less impact. These days, it is possible to measure the environmental impact by using different tools such as the life cycle assessment (LCA) approach. Given this premise, this study explored the environmental impact of two types of roofing systems through comparative life cycle assessment approach. The tiles were analyzed to select the most environmentally friendly roofing system for the villa at Khalifa City A, Abu Dhabi, United Arab Emirates. These products are available in various forms; however, in this study concrete roof tiles and clay roof tiles were considered. The results showed that concrete roof tiles have lower environmental impact. In all scenarios considered, manufacturing the roof tiles locally, using recovered fuels for firing clay tiles, and using renewable energy (electricity from PV plant) showed that the concrete roof tiles were found to be excellent in terms of its embodied carbon, embodied the energy and various other environmental performance indicators.

Keywords: clay roof tile, concrete roof tile, life cycle assessment, sensitivity analysis

Procedia PDF Downloads 392
2827 Chemical and Physical Properties and Biocompatibility of Ti–6Al–4V Produced by Electron Beam Rapid Manufacturing and Selective Laser Melting for Biomedical Applications

Authors: Bing–Jing Zhao, Chang-Kui Liu, Hong Wang, Min Hu

Abstract:

Electron beam rapid manufacturing (EBRM) or Selective laser melting is an additive manufacturing process that uses 3D CAD data as a digital information source and energy in the form of a high-power laser beam or electron beam to create three-dimensional metal parts by fusing fine metallic powders together.Object:The present study was conducted to evaluate the mechanical properties ,the phase transformation,the corrosivity and the biocompatibility of Ti-6Al-4V by EBRM,SLM and forging technique.Method: Ti-6Al-4V alloy standard test pieces were manufactured by EBRM, SLM and forging technique according to AMS4999,GB/T228 and ISO 10993.The mechanical properties were analyzed by universal test machine. The phase transformation was analyzed by X-ray diffraction and scanning electron microscopy. The corrosivity was analyzed by electrochemical method. The biocompatibility was analyzed by co-culturing with mesenchymal stem cell and analyzed by scanning electron microscopy (SEM) and alkaline phosphatase assay (ALP) to evaluate cell adhesion and differentiation, respectively. Results: The mechanical properties, the phase transformation, the corrosivity and the biocompatibility of Ti-6Al-4V by EBRM、SLM were similar to forging and meet the mechanical property requirements of AMS4999 standard. a­phase microstructure for the EBM production contrast to the a’­phase microstructure of the SLM product. Mesenchymal stem cell adhesion and differentiation were well. Conclusion: The property of the Ti-6Al-4V alloy manufactured by EBRM and SLM technique can meet the medical standard from this study. But some further study should be proceeded in order to applying well in clinical practice.

Keywords: 3D printing, Electron Beam Rapid Manufacturing (EBRM), Selective Laser Melting (SLM), Computer Aided Design (CAD)

Procedia PDF Downloads 454
2826 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 165
2825 Male Versatile Sexual Offenders in Taiwan

Authors: Huang Yueh Chen, Sheng Ang Shen

Abstract:

Purpose: Sexual assault has always been a highly anticipated crime in Taiwan. People assume that the career of sexual offenders tends to be highly specialized. This study hopes to analyze the crime career and risk factors of offenders by means of another classification. Methods: A total of 145 sexual offenders were sentenced on the parole or expiration date from 2009 to 2011, through analysis of official existing documents such as ‘Re-infringement risk assessment report’ and ‘case assessment report’. Results: The section ‘Various Types of Crimes ‘ of criminal career is analyzed. The highest number of ‘ versatile sexual offender’ followed by ‘adult sexual offender’ is about 2.5, representing more than 1.5 kinds of non-sex crimes besides sexual crimes. Different specialized sexual offenders have had extensive experience in the ‘Sexual Assault Experiences in Children and School’, ‘Static 99 Levels’, ‘Pre-Commuted Substance Use’, ‘Excited Deviant Sexual Behavior’, ‘Various Types of Crimes,’ and ‘Sexual Crime in Forerunner’ , ‘Type of Index Crime’ and other projects to achieve significant differences. Conclusions: Resources continue to be devoted to specialized offenders, the character of first-time sexual offender depends on further research and makes the public aware of the different assumptions of diversified offenders from traditional professional offenses that reduce unnecessary panic in society.

Keywords: versatile sexual offender, specialized sexual offender, criminal career, risk factor

Procedia PDF Downloads 166
2824 Strategic Fit between Higher Education Funding and the National Development Goals in Kazakhstan

Authors: Ali Ait Si Mhamed, Rita Kasa, Hans Vossensteyn

Abstract:

Kazakhstan is the eight largest country on the globe, in terms of the territory, it is rich in natural resources and is developing dynamically. Kazakhstan strives to become one of the top 30 global economies by 2050. This goal preconditions intensive reforms in all sectors of economy, including higher education. This paper focuses on the higher education funding reforms that take place in Kazakhstan and their alignment with the strategic goals of national development. Currently, the government funds higher education costs for only a limited number of students while the majority of students pay full cost covering tuition fees. Only students with high examination scores at the end of the secondary education are eligible to be admitted to publically funded study places in higher education. While this merit-based higher education funding model is overall well-received in the country, there is also a discourse calling to change the existing approach of higher education funding. This paper draws on interviews with national policy makers and leadership at institutions of higher education in Kazakhstan collected during 2016. It seeks to answer a question about how well the current higher education funding mechanism is aligned with the strategic development goals in higher education. The paper discusses how stakeholders see the fit between the current higher education funding mechanism and the ability of higher education institutions to achieve the aims of national strategic development.

Keywords: higher education reform, higher education funding, higher education policy, Kazakhstan

Procedia PDF Downloads 288
2823 Development of Time Series Forecasting Model for Dengue Cases in Nakhon Si Thammarat, Southern Thailand

Authors: Manit Pollar

Abstract:

Identifying the dengue epidemic periods early would be helpful to take necessary actions to prevent the dengue outbreaks. Providing an accurate prediction on dengue epidemic seasons will allow sufficient time to take the necessary decisions and actions to safeguard the situation for local authorities. This study aimed to develop a forecasting model on number of dengue incidences in Nakhon Si Thammarat Province, Southern Thailand using time series analysis. We develop Seasonal Autoregressive Moving Average (SARIMA) models on the monthly data collected between 2003-2011 and validated the models using data collected between January-September 2012. The result of this study revealed that the SARIMA(1,1,0)(1,2,1)12 model closely described the trends and seasons of dengue incidence and confirmed the existence of dengue fever cases in Nakhon Si Thammarat for the years between 2003-2011. The study showed that the one-step approach for predicting dengue incidences provided significantly more accurate predictions than the twelve-step approach. The model, even if based purely on statistical data analysis, can provide a useful basis for allocation of resources for disease prevention.

Keywords: SARIMA, time series model, dengue cases, Thailand

Procedia PDF Downloads 358
2822 The Influence of Collaboration on Individual Writing Quality: The Case of Iranian vs. Malaysian Freshers

Authors: Seyed Yasin Yazdi-Amirkhiz, Azirah Hashim

Abstract:

This study purported to comparatively investigate the influence of collaborative writing on the quality of individual writing of four female Iranian and four female Malaysian students. The first semester students at a private university in Malaysia, who were homogeneous in terms of age, gender, study discipline, and language proficiency, were divided into two Iranian and two Malaysian dyads. The dyads performed collaborative writing tasks for 15 sessions; after three consecutive collaborative writing sessions, each participant was asked to individually attempt a writing task. Both collaborative and individual writing tasks comprised isomorphic graphic prompts (IELTS Academic Module task 1). Writing quality of the five individually-produced texts during the study was scored in terms of task achievement (TA), cohesion/coherence (C/C), grammatical range/accuracy (GR/A), and lexical resources (LR). The findings indicated a hierarchy of development in TA and C/C among all the students, while LR showed minor improvement only among three of Malaysian students, and GR/A barely exhibited any progress among all the participants. Intermittent progressions and regressions were also discerned in the trajectory of their writing development. The findings are discussed in the light of the socio-cultural and emergentist perspectives, the typology of tasks used as well as the role of the participants’ level of language proficiency.

Keywords: collaborative writing, writing quality, individual writing, collaboration

Procedia PDF Downloads 458
2821 Computational Aided Approach for Strut and Tie Model for Non-Flexural Elements

Authors: Mihaja Razafimbelo, Guillaume Herve-Secourgeon, Fabrice Gatuingt, Marina Bottoni, Tulio Honorio-De-Faria

Abstract:

The challenge of the research is to provide engineering with a robust, semi-automatic method for calculating optimal reinforcement for massive structural elements. In the absence of such a digital post-processing tool, design office engineers make intensive use of plate modelling, for which automatic post-processing is available. Plate models in massive areas, on the other hand, produce conservative results. In addition, the theoretical foundations of automatic post-processing tools for reinforcement are those of reinforced concrete beam sections. As long as there is no suitable alternative for automatic post-processing of plates, optimal modelling and a significant improvement of the constructability of massive areas cannot be expected. A method called strut-and-tie is commonly used in civil engineering, but the result itself remains very subjective to the calculation engineer. The tool developed will facilitate the work of supporting the engineers in their choice of structure. The method implemented consists of defining a ground-structure built on the basis of the main constraints resulting from an elastic analysis of the structure and then to start an optimization of this structure according to the fully stressed design method. The first results allow to obtain a coherent return in the first network of connecting struts and ties, compared to the cases encountered in the literature. The evolution of the tool will then make it possible to adapt the obtained latticework in relation to the cracking states resulting from the loads applied during the life of the structure, cyclic or dynamic loads. In addition, with the constructability constraint, a final result of reinforcement with an orthogonal arrangement with a regulated spacing will be implemented in the tool.

Keywords: strut and tie, optimization, reinforcement, massive structure

Procedia PDF Downloads 141
2820 Land Suitability Assessment for Vineyards in Afghanistan Based on Physical and Socio-Economic Criteria

Authors: Sara Tokhi Arab, Tariq Salari, Ryozo Noguchi, Tofael Ahamed

Abstract:

Land suitability analysis is essential for table grape cultivation in order to increase its production and productivity under the dry condition of Afghanistan. In this context, the main aim of this paper was to determine the suitable locations for vineyards based on satellite remote sensing and GIS (geographical information system) in Kabul Province of Afghanistan. The Landsat8 OLI (operational land imager) and thermal infrared sensor (TIRS) and shuttle radar topography mission digital elevation model (SRTM DEM) images were processed to obtain the normalized difference vegetation index (NDVI), normalized difference moisture index (NDMI), land surface temperature (LST), and topographic criteria (elevation, aspect, and slope). Moreover, Jaxa rainfall (mm per hour), soil properties information are also used for the physical suitability of vineyards. Besides, socio-economic criteria were collected through field surveys from Kabul Province in order to develop the socio-economic suitability map. Finally, the suitable classes were determined using weighted overly based on a reclassification of each criterion based on AHP (Analytical Hierarchy Process) weights. The results indicated that only 11.1% of areas were highly suitable, 24.8% were moderately suitable, 35.7% were marginally suitable and 28.4% were not physically suitable for grapes production. However, 15.7% were highly suitable, 17.6% were moderately suitable, 28.4% were marginally suitable and 38.3% were not socio-economically suitable for table grapes production in Kabul Province. This research could help decision-makers, growers, and other stakeholders with conducting precise land assessments by identifying the main limiting factors for the production of table grapes management and able to increase land productivity more precisely.

Keywords: vineyards, land physical suitability, socio-economic suitability, AHP

Procedia PDF Downloads 170
2819 Pubertal Development among 10-Year-Olds: The Role of Parent's Attachment Style

Authors: Hanit Ohana, Anat Scher

Abstract:

For decades, attachment research examined how mothers’ attachment styles shape parenting and specific aspects of child development. Only limited research addressed pubertal development from the perspective of attachment relationships. The current study focused on pubertal development at 10 years of age, as defined by Tanner (PDS), and examined the associations with both mothers’ and fathers’ attachment styles (ECR-S). Sixty-nine parents and their children from a medium SES participated in the study. It was found that whereas mothers’ attachment was not related to the child’s puberty development, fathers’ attachment was associated with their daughter’s pubertal development. Specifically, in girls, but not boys, advanced pubertal development was positively correlated with fathers’ avoidance (r = .37, p = 0.05), and negatively correlated with anxiety scores (r = -.36, p = 0.05). This result raises the possibility that for girls, a relationship with fathers may serve as a psychological stressor, and in turn, induce concerns regarding resources and availability of interpersonal support. Such processes may contribute to different reproductive timing and strategies, including delayed and accelerated pubertal development. As more data are collected, we will be able to address with more power the role of parent’s attachment in shaping the pubertal development of their young adolescents. Expanding the understanding of aspects of pubertal development –an important milestone of human development- and the possible linkages with parental attachment is important for researchers and clinicians.

Keywords: attachment style, children, gender, parents, puberty

Procedia PDF Downloads 145
2818 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 331
2817 Sustainable Solutions for Enhancing Efficiency, Safety, and Quality of Construction Value Chain Services Integration

Authors: Lo Kar Yin

Abstract:

In view of the increasing speed and quantity of the housing supply, building, and civil engineering infrastructure works triggered by the pandemic across the globe, contractors, professional services providers (PSP), including consultants (e.g., architect, project manager, civil/geotechnical/structural engineer, building services engineer, quantity surveyor/cost manager, etc.) and suppliers have faced tremendous challenges of the fierce market, limited manpower, and resources under contract prices fluctuation and competitive fee and price. With qualitative analysis, this paper is to review the available information from the industry stakeholders with a view to finding solutions for enhancing efficiency, safety, and quality of construction value chain services for public and private organizations/companies’ sustainable growth, not limited to checking the deliverables and data transfer from multi-disciplinary parties. Technology, contracts, and people are the key requirements for shaping the construction industry. With the integration of a modern engineering contract (e.g., NEC) collaborative approach, practical workflows are designed to address loopholes together with different levels of people employment/retention and technology adoption to achieve the best value for money.

Keywords: efficiency, safety, quality, technology, contract, people, sustainable solutions, construction, services, integration

Procedia PDF Downloads 135
2816 Health Sector Budgetary Allocations and Their Implications on Health Service Delivery and Universal Health Coverage in Uganda

Authors: Richard Ssempala, Francis Kintu, Christine K. Tashobya

Abstract:

Funding for health remains a key constraint facing many developing countries, Uganda inclusive. Uganda’s health sector budget to the national budgetary allocation has stagnated between 8.2% to 10% over the years. Using data collected from different government documents, we sought to establish the implications of the budget allocation over the period (FY2010/11-2018/19) on health services delivery in Uganda to inform policymakers specifically Members of Parliament who are critical in making sectorial allocation on the steps they can adapt to change the terrain of health financing in Uganda. Findings revealed that the contribution of public funding to the health sector is low (15.7%) with private sources (42.6%) and donors contributing much more, with the bulk of private funds, are out of pocket. The study further revealed that low budget allocation had been manifested in inadequate and poorly motivated health workers, essential drug stock-outs that ultimately contribute to poor access to services, catastrophic health expenditures, and high morbidity rates. We recommend for a substantial and sustained increase in the government health budget, optimizing the available resources by addressing wastages, prioritizing health promotion, prevention and finally, institutionalizing the National Health Insurance Scheme.

Keywords: budget allocations, universal health coverage, health service delivery, Uganda

Procedia PDF Downloads 190
2815 An Empirical Evaluation of Performance of Machine Learning Techniques on Imbalanced Software Quality Data

Authors: Ruchika Malhotra, Megha Khanna

Abstract:

The development of change prediction models can help the software practitioners in planning testing and inspection resources at early phases of software development. However, a major challenge faced during the training process of any classification model is the imbalanced nature of the software quality data. A data with very few minority outcome categories leads to inefficient learning process and a classification model developed from the imbalanced data generally does not predict these minority categories correctly. Thus, for a given dataset, a minority of classes may be change prone whereas a majority of classes may be non-change prone. This study explores various alternatives for adeptly handling the imbalanced software quality data using different sampling methods and effective MetaCost learners. The study also analyzes and justifies the use of different performance metrics while dealing with the imbalanced data. In order to empirically validate different alternatives, the study uses change data from three application packages of open-source Android data set and evaluates the performance of six different machine learning techniques. The results of the study indicate extensive improvement in the performance of the classification models when using resampling method and robust performance measures.

Keywords: change proneness, empirical validation, imbalanced learning, machine learning techniques, object-oriented metrics

Procedia PDF Downloads 418
2814 The Development of Shariah-Based Cooperative and Its Governance System: Cases in Thailand, Malaysia, and Indonesia

Authors: Zurina Shafii, Mohamed Obaidullah, Rochania Ayu Yunanda, Nor Farha Zubair

Abstract:

Cooperative members (also known as user-owners) are responsible in running the cooperative businesses in order to improve their socio economic well-being. Cooperatives have always been recognized as a vehicle to elevate the standard of living of the poor and low-income earners by improving their ability to mobilize resources among the people within the urban and rural sectors of the population. To improve its performance and role, the cooperative should ensure the existence of its specific governance. Using narrative analysis and quasi-statistics, this paper describes the state of operation, growth and nature of products and services offered in Sakofah Savings Co-op (the largest Islamic cooperative in Krabi), Koperasi Muslimin Malaysia Berhad (KMMB) in Malaysia and KOSPIN Jasa Keuangan in Indonesia. Furthermore, it identifies and evaluates the current governance system in each cooperatives and proposes governance framework which may enhance the performance of the cooperatives. The paper, in turn discusses the challenges to cooperative growth and investment from the aspects of governance and monitoring, transparency and human capital. The paper will be useful for regulators and governance organs of cooperatives, namely Board of Members, Management and Shariah Committee in order for these parties to strengthen the governance within cooperatives to further grow this economic sector.

Keywords: Islamic cooperatives, governance, Shariah governance, case study

Procedia PDF Downloads 361
2813 Assessment of the Impacts of Climate Change on Watershed Runoff Using Soil and Water Assessment Tool Model in Southeast Nigeria

Authors: Samuel Emeka Anarah, Kingsley Nnaemeka Ogbu, Obasi Arinze

Abstract:

Quantifying the hydrological response due to changes in climate change is imperative for proper management of water resources within a watershed. The impact of climate change on the hydrology of the Upper Ebony River (UER) watershed, South East Nigeria, was studied using the Soil and Water Assessment Tool (SWAT) hydrological model. A climatological time series analysis from 1985 - 2014 using non-parametric test showed significant negative trends in precipitation and relative humidity trend while minimum and maximum temperature, solar radiation and wind speed showed significant positive trends. Future hypothetical land-use change scenarios (Scenarios 1, 2, 3 and 4) representing urbanization and conversion of forest to agricultural land were combined with future downscaled climate model (CSIRO-Mk3-6-0) and simulated in SWAT model. Relative to the Baseline scenario (2005 - 2014), the results showed a decrease in streamflow by 10.29%, 26.20%, 11.80% and 26.72% for Scenarios 1, 2, 3, and 4 respectively. Model results suggest development of adaptation strategies to cope with the predicted hydrological conditions under future climate change in the watershed.

Keywords: climate change, hydrology, runoff, SWAT model

Procedia PDF Downloads 143
2812 Object Detection in Digital Images under Non-Standardized Conditions Using Illumination and Shadow Filtering

Authors: Waqqas-ur-Rehman Butt, Martin Servin, Marion Pause

Abstract:

In recent years, object detection has gained much attention and very encouraging research area in the field of computer vision. The robust object boundaries detection in an image is demanded in numerous applications of human computer interaction and automated surveillance systems. Many methods and approaches have been developed for automatic object detection in various fields, such as automotive, quality control management and environmental services. Inappropriately, to the best of our knowledge, object detection under illumination with shadow consideration has not been well solved yet. Furthermore, this problem is also one of the major hurdles to keeping an object detection method from the practical applications. This paper presents an approach to automatic object detection in images under non-standardized environmental conditions. A key challenge is how to detect the object, particularly under uneven illumination conditions. Image capturing conditions the algorithms need to consider a variety of possible environmental factors as the colour information, lightening and shadows varies from image to image. Existing methods mostly failed to produce the appropriate result due to variation in colour information, lightening effects, threshold specifications, histogram dependencies and colour ranges. To overcome these limitations we propose an object detection algorithm, with pre-processing methods, to reduce the interference caused by shadow and illumination effects without fixed parameters. We use the Y CrCb colour model without any specific colour ranges and predefined threshold values. The segmented object regions are further classified using morphological operations (Erosion and Dilation) and contours. Proposed approach applied on a large image data set acquired under various environmental conditions for wood stack detection. Experiments show the promising result of the proposed approach in comparison with existing methods.

Keywords: image processing, illumination equalization, shadow filtering, object detection

Procedia PDF Downloads 216
2811 Knowledge Diffusion via Automated Organizational Cartography (Autocart)

Authors: Mounir Kehal

Abstract:

The post-globalization epoch has placed businesses everywhere in new and different competitive situations where knowledgeable, effective and efficient behavior has come to provide the competitive and comparative edge. Enterprises have turned to explicit - and even conceptualizing on tacit - knowledge management to elaborate a systematic approach to develop and sustain the intellectual capital needed to succeed. To be able to do that, you have to be able to visualize your organization as consisting of nothing but knowledge and knowledge flows, whilst being presented in a graphical and visual framework, referred to as automated organizational cartography. Hence, creating the ability of further actively classifying existing organizational content evolving from and within data feeds, in an algorithmic manner, potentially giving insightful schemes and dynamics by which organizational know-how is visualized. It is discussed and elaborated on most recent and applicable definitions and classifications of knowledge management, representing a wide range of views from mechanistic (systematic, data driven) to a more socially (psychologically, cognitive/metadata driven) orientated. More elaborate continuum models, for knowledge acquisition and reasoning purposes, are being used for effectively representing the domain of information that an end user may contain in their decision making process for utilization of available organizational intellectual resources (i.e. Autocart). In this paper, we present an empirical research study conducted previously to try and explore knowledge diffusion in a specialist knowledge domain.

Keywords: knowledge management, knowledge maps, knowledge diffusion, organizational cartography

Procedia PDF Downloads 309
2810 Concept to Enhance the Project Success and Promote the Implementation of Success Factors in Infrastructure Projects

Authors: A. Elbaz, K. Spang

Abstract:

Infrastructure projects are often subjected to delays and cost overruns and mistakenly described as unsuccessful projects. These projects have many peculiarities such as public attention, impact on the environment, subjected to special regulations, etc. They also deal with several stakeholders with different motivations and face unique risks. With this in mind we need to reconsider our approach to manage them, define their success factors and implement these success factors. Infrastructure projects are not only lacking a unified meaning of project success or a definition of success factors, but also a clear method to implement these factors. This paper investigates this gap and introduces a concept to implement success factors in an efficient way, taking into consideration the specific characteristics of infrastructure projects. This concept consists of six enablers such as project organization, project team, project management workflow, contract management, communication and knowledge transfer and project documentations. These enablers allow other success factors to be efficiently implemented in projects. In conclusion, this paper provides project managers as well as company managers with a tool to define and implement success factors efficiently in their projects, along with upgrading their assets for the coming projects. This tool consists of processes and validated checklists to ensure the best use of company resources and knowledge. Due to the special features of infrastructure projects this tool will be tested in the German infrastructure market. However, it is meant to be adaptable to other markets and industries.

Keywords: infrastructure projects, operative success factors, project success, success factors, transportation projects

Procedia PDF Downloads 129
2809 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 75