Search results for: service oriented architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6139

Search results for: service oriented architecture

5629 Structuring and Visualizing Healthcare Claims Data Using Systems Architecture Methodology

Authors: Inas S. Khayal, Weiping Zhou, Jonathan Skinner

Abstract:

Healthcare delivery systems around the world are in crisis. The need to improve health outcomes while decreasing healthcare costs have led to an imminent call to action to transform the healthcare delivery system. While Bioinformatics and Biomedical Engineering have primarily focused on biological level data and biomedical technology, there is clear evidence of the importance of the delivery of care on patient outcomes. Classic singular decomposition approaches from reductionist science are not capable of explaining complex systems. Approaches and methods from systems science and systems engineering are utilized to structure healthcare delivery system data. Specifically, systems architecture is used to develop a multi-scale and multi-dimensional characterization of the healthcare delivery system, defined here as the Healthcare Delivery System Knowledge Base. This paper is the first to contribute a new method of structuring and visualizing a multi-dimensional and multi-scale healthcare delivery system using systems architecture in order to better understand healthcare delivery.

Keywords: health informatics, systems thinking, systems architecture, healthcare delivery system, data analytics

Procedia PDF Downloads 321
5628 Assertion-Driven Test Repair Based on Priority Criteria

Authors: Ruilian Zhao, Shukai Zhang, Yan Wang, Weiwei Wang

Abstract:

Repairing broken test cases is an expensive and challenging task in evolving software systems. Although an automated repair technique with intent preservation has been proposed, but it does not take into account the association between test repairs and assertions, leading to a large number of irrelevant candidates and decreasing the repair capability. This paper proposes an assertion-driven test repair approach. Furthermore, an intent-oriented priority criterion is raised to guide the repair candidate generation, making the repairs closer to the intent of the test. In more detail, repair targets are determined through post-dominance relations between assertions and the methods that directly cause compilation errors. Then, test repairs are generated from the target in a bottom-up way, guided by the intent-oriented priority criteria. Finally, the generated repair candidates are prioritized to match the original test intent. The approach is implemented and evaluated on the benchmark of 4 open-source programs and 91 broken test cases. The result shows that the approach can fix 89% (81/91) of broken test cases, which is more effective than the existing intentpreserved test repair approach, and our intent-oriented priority criteria work well.

Keywords: test repair, test intent, software test, test case evolution

Procedia PDF Downloads 96
5627 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture

Authors: Ilgoun Kim, Jongpil Jeong

Abstract:

Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.

Keywords: enterprise architecture, IT Finance, smart logistics, CIPs

Procedia PDF Downloads 138
5626 Mobile Cloud Middleware: A New Service for Mobile Users

Authors: K. Akherfi, H. Harroud

Abstract:

Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different technologies such as 3Gs). This paper presents a review on the concept of CC and MCC. Then, it discusses what has been done regarding middleware in CC and MCC. Later, it shows the architecture of our proposed middleware along with its functionalities which will be provided to mobile clients in order to overcome the well-known problems (such as low battery power, slow CPU speed and, little memory etc.).

Keywords: context-aware, cloud computing, middleware, mobile cloud computing

Procedia PDF Downloads 420
5625 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 312
5624 Realization of Autonomous Guidance Service by Integrating Information from NFC and MEMS

Authors: Dawei Cai

Abstract:

In this paper, we present an autonomous guidance service by combining the position information from NFC and the orientation information from a 6 axis acceleration and terrestrial magnetism sensor. We developed an algorithm to calculate the device orientation based on the data from acceleration and terrestrial magnetism sensor. If visitors want to know some explanation about an exhibit in front of him, what he has to do is just lift up his mobile device. The identification program will automatically identify the status based on the information from NFC and MEMS, and start playing explanation content for him. This service may be convenient for old people or disables or children.

Keywords: NFC, ubiquitous computing, guide sysem, MEMS

Procedia PDF Downloads 384
5623 Implementation of a Baseline RISC for the Realization of a Dynamically Reconfigurable Processor

Authors: Hajer Najjar, Riad Bourguiba, Jaouhar Mouine

Abstract:

Reduced instruction set computer (RISC) processors are widely used because of their multiple advantages. In fact, they are based on a simple instruction set so that they increase the speed of the processor and reduce its energy consumption. In this paper, we will present a basic RISC architecture processor that will be developed later to converge to a new architecture with runtime reconfiguration.

Keywords: processor, RISC, DLX, pipeline, runtime reconfiguration

Procedia PDF Downloads 383
5622 Social Media as a ‘Service’ for Value Co-Creation by Integrating Sponsoring Companies, Sports Entities and Fans

Authors: Harri Jalonen

Abstract:

Social media has changed the ways we communicate, collaborate and connect with each other. It has also influenced our habits of consuming sports. Social media has allowed direct interaction between sponsoring companies, athletes/players and fans. Drawing on the service dominant logic of value co-creation, the conceptual paper identifies three operant resources which are beneficial for value co-creation: i) social identity and sense of community, ii) congruence and brand personality, and iii) participatory culture and fan activation. The paper contributes to the theoretical discussion on how social can be media used for value co-creation purposes in the sports industry.

Keywords: sports, value co-creation, social media, service

Procedia PDF Downloads 256
5621 Value Co-Creation in Used-Car Auctions: A Service Scientific Perspective

Authors: Safdar Muhammad Usman, Youji Kohda, Katsuhiro Umemoto

Abstract:

Electronic market place plays an important intermediary role for connecting dealers and retail customers. The main aim of this paper is to design a value co-creation model in used-car auctions. More specifically, the study has been designed in order to describe the process of value co-creation in used-car auctions, to explore the co-created values in used-car auctions, and finally conclude the paper indicating the future research directions. Our analysis shows that economic values as well as non-economic values are co-created in used-car auctions. In addition, this paper contributes to the academic society broadening the view of value co-creation in service science.

Keywords: value co-creation, used-car auctions, non-financial values, service science

Procedia PDF Downloads 328
5620 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection

Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman

Abstract:

The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.

Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture

Procedia PDF Downloads 551
5619 GIS Based Public Transport Accessibility of Lahore using PTALs Model

Authors: Naveed Chughtai, Salman Atif, Azhar Ali Taj, Murtaza Asghar Bukhari

Abstract:

Accessible transport systems play a crucial role in infrastructure management and ease of access to destinations. Thus, the necessity of knowledge of service coverage and service deprived areas is a prerequisite for devising policies. Integration of PTALs model with GIS network analysis models (Service Area Analysis, Closest Facility Analysis) facilitates the analysis of deprived areas. In this research, models presented determine the accessibility. The empirical evidence suggests that current bus network system caters only 18.5% of whole population. Using network analysis results as inputs for PTALs, it is seen that excellent accessibility indexed bands cover a limited areas, while 78.8% of area is totally deprived of any service. To cater the unserved catchment, new route alignments are proposed while keeping in focus the Socio-economic characteristics, land-use type and net population density of the deprived area. Change in accessibility with proposed routes show a 10% increment in service delivery and enhancement in terms of served population is up to 20.4%. PTALs result shows a decrement of 60 Km2 in unserved band. The result of this study can be used for planning, transport infrastructure management, allocation of new route alignments in combination with future land-use development and for adequate spatial distribution of service access points.

Keywords: GIS, public transport accessibility, PTALs, accessibility index, service area analysis, closest facility analysis

Procedia PDF Downloads 410
5618 Chicago School of Architecture 1900

Authors: Lula Chou

Abstract:

At the turn of the 20th century, Chicago faced a large real estate boom and technological advances through industrialization that led to the rise of the commercial skyscrapers. Focusing on creating a Midwest regional character and new functional meanings of structural art, architects like Sullivan, Adler, Burnham, and Root dominated the first Chicago School of Architecture. After they spearheaded the arena of modern skyscrapers, other cities in the United States like New York soon followed the trend. While battling with eclecticism and Beaux-Arts beliefs in decorative style, Chicago architects adapted Classical monumentality into their modern expressions that emphasized organicism and functionalism. With various experiments of material possibilities in the steel-framed constructions, Chicago architecture succeeded in forming humanitarian aesthetics alongside fulfilling functional requirements of the new generation.

Keywords: Chicago school, modernity, monumentality, skyscrapers, Sullivan

Procedia PDF Downloads 115
5617 Layers of Identities in Nahdliyyin Mosque Architecture and Some Related Socio-Political Context Within

Authors: Yulia Eka Putrie, Widjaja Martokusumo

Abstract:

The development of architecture today indicates that an architectural object often does not represent one single identity only. One architectural object could represents layers of multiple identities of an increasingly complex society. Mosque architecture for example, is mainly associated with one religious identity; that mosque architecture serves as the representation of Islamic identity. However, on many occasions, mosque architecture also serves as the representation of other motives, such as political, social, even individual identity. In normal circumstances, these layers of identities are not always seen or realized by common people outside the community. They are only represented implicitly in some symbolic forms, activities, and events. On the other hand, in specific circumstances, these kinds of identities were represented explicitly in mosque architecture. This paper is a part of an initial research on the representation of socio-political identities in Nahdliyyin mosques in East Java, Indonesia. Nahdliyyin mosques were chosen as the object of research because of its significance in Indonesian socio-political context, because majority of Indonesian muslims are culturally associated with Nahdlatul Ulama (NU) with its aswaja doctrine. Some frictions in mosque ownership and management between Nahdliyyin and other islamic school of thoughts, has resulted in preventive efforts, where some of the efforts are related to the representation of their identity in their mosque architecture. The research is a field research that took place in Malang, East Java. Malang is one of main cities in East Java; a cultural and regional basis of NU and Nahdliyyin people. Formal analysis were conducted in ten large Nahdliyyin mosques in Malang. Some structured and in-depth interviews were also held to explore the motives of identity representation in some architectural aspects of the mosques. The result of this initial study indicates that there are layers of identities which were manifested in the studied mosques. These layers of identities in Nahdliyyin mosques were based on the same main values, but represented through various formal expressions. Furthermore, the study also brings the deeper understanding on socio-political context of mosques in Nahdliyyin culture.

Keywords: Nahdliyyin mosque architecture, layers of identities, representation, Nahdlatul Ulama

Procedia PDF Downloads 493
5616 Comparative Outlook of Teacher Education in Nigeria and India

Authors: Muhammad Badamasi Abdullahi

Abstract:

Teacher education, both pre- and in-service programs, is offered in many countries of the world by different teacher education institutions as declared in the Policies on Education of the countries. However, differences exist from one country to another as a result of some factors peculiar to them. Notwithstanding, there also exist similarities among them in regard to teacher education. This paper is expected to dig into teacher education programs in Nigeria and India so that areas of similarities and differences would be highlighted as well as provide a venue for possible recommendation of both countries to learn from one another. All this is directed towards providing a no -border approach in enhancing effective teaching and learning.

Keywords: teacher education, teaching and learning, pre-service, in-service

Procedia PDF Downloads 360
5615 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 61
5614 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 250
5613 Reimaging Archetype of Mosque: A Case Study on Contemporary Mosque Architecture in Bangladesh

Authors: Sabrina Rahman

Abstract:

The Mosque is Islam’s most symbolic structure, as well as the expression of collective identity. From the explicit words of our Prophet, 'The earth has been created for me as a masjid and a place of purity, and whatever man from my Ummah finds himself in need of prayer, let him pray' (anywhere)! it is obvious that a devout Muslim does not require a defined space or structure for divine worship since the whole earth is his prayer house. Yet we see that from time immemorial man throughout the Muslim world has painstakingly erected innumerable mosques. However, mosque design spans time, crosses boundaries, and expresses cultures. It is a cultural manifestation as much as one based on a regional building tradition or a certain interpretation of religion. The trend to express physical signs of religion is not new. Physical forms seem to convey symbolic messages. However, in recent times physical forms of mosque architecture are dominantly demising from mosque architecture projects in Bangladesh. Dome & minaret, the most prominent symbol of the mosque, is replacing by contextual and contemporary improvisation rather than subcontinental mosque architecture practice of early fellows. Thus the recent mosque projects of the last 15 years established the contemporary architectural realm in their design. Contextually, spiritual lighting, the serenity of space, tranquility of outdoor spaces, the texture of materials is widely establishing a new genre of Muslim prayer space. A case study based research will lead to specify its significant factors of modernism. Based on the findings, the paper presents evidence of recent projects as well as a guideline for the future image of contemporary Mosque architecture in Bangladesh.

Keywords: contemporary architecture, modernism, prayer space, symbolism

Procedia PDF Downloads 97
5612 Information and Communication Technology in Architectural Education: The Challenges

Authors: Oluropo Stephen Ilesanmi, Oluwole Ayodele Alejo

Abstract:

Architectural education, beyond training the students to become architects, impacts in them the appreciation of the responsibilities relating to public health, safety, and welfare. Architecture is no longer a personal philosophical or aesthetic pursuit by individuals, rather, it has to consider everyday needs of the people and use technology to give a liveable environment. In the present age, architectural education must have to grapple with the recent integration of technology, in particular, facilities offered by information and communication technology. Electronic technologies have moved architecture from the drawing board to cyberspace. The world is now a global village in which new information and methods are easily and quickly available to people at different poles of the globe. It is the position of this paper that in order to remain relevant in the ever-competing forces within the building industry, architectural education must show the impetus to continue to draw from technological advancements associated with the use of computers.

Keywords: architecture, education, communication, information, technology

Procedia PDF Downloads 179
5611 Consensus-Oriented Analysis Model for Knowledge Management Failure Evaluation in Uncertain Environment

Authors: Amir Ghasem Norouzi, Mahdi Zowghi

Abstract:

This study propose a framework based on the fuzzy T-Norms, T-conorm, a novel operator, and multi-expert approach to help organizations build awareness of the critical influential factors on the success of knowledge management (KM) implementation, analysis the failure of knowledge management. This study considers the complex uncertainty concept that is in knowledge management implementing capability (KMIC) and it is used by fuzzy logic for this reason. The contribution of our paper is shown with an empirical study in a nonprofit educational organization evaluation.

Keywords: fuzzy logic, knowledge management, multi expert analysis, consensus oriented average operator

Procedia PDF Downloads 595
5610 Making Sense of Places: A Comparative Study of Three Contexts in Thailand

Authors: Thirayu Jumsai Na Ayudhya

Abstract:

The study of what architecture means to people in their everyday lives inadequately addresses the contextualized and holistic theoretical framework. This article succinctly presents theoretical framework obtained from the comparative study of how people experience the everyday architecture in three different contexts including 1) Bangkok CBD, 2) Phuket island old-town, and 3) Nan province old-town. The way people make sense of the everyday architecture can be addressed in four super-ordinate themes; (1) building in urban (text), (2) building in (text), (3) building in human (text), (4) and building in time (text). In this article, these super-ordinate themes were verified whether they recur in three studied-contexts. In each studied-context, the participants were divided into two groups, 1) local people, 2) visitors. Participants were asked to take photographs of the everyday architecture during the everyday routine and to participate the elicit-interview with photographs produced by themselves. Interpretative phenomenological analysis (IPA) was adopted to interpret elicit-interview data. Sub-themes emerging in each studied-context were brought into the cross-comparison among three studied- contexts. It is found that four super-ordinate themes recur with additional distinctive sub-themes. Further studies in other different contexts, such as socio-political, economic, cultural differences, are recommended to complete the theoretical framework.

Keywords: sense of place, the everyday architecture, architectural experience, the everyday

Procedia PDF Downloads 133
5609 Praxis-Oriented Pedagogies for Pre-Service Teachers: Teaching About and For Social Justice Through Equity Literature Circles

Authors: Joanne Robertson, Awneet Sivia

Abstract:

Preparing aspiring teachers to become advocates for social justice reflects a fundamental commitment for teacher education programs in Canada to create systemic educational change. The goal is ultimately to address inequities in K-12 education for students from multiple identity groups that have historically been marginalized and oppressed in schools. Social justice is described as an often undertheorized and vague concept in the literature, which increases the risk that teaching for social justice remains a lofty goal. Another concern is that the social justice agenda in teacher education in North America ignores pedagogies related to subject-matter knowledge and discipline-based teaching methods. The question surrounding how teacher education programs can address these issues forms the basis for the research undertaken in this study. The paper focuses on a qualitative research project that examines how an Equity Literature Circles (ELC) framework within a language arts methods course in a Bachelor of Education program may help pre-service teachers better understand the inherent relationship between literacy instructional practices and teaching about and for social justice. Grounded in the Freireian (2018) principle of praxis, this study specifically seeks to understand the impact of Equity Literature Circles on pre-service teachers’ understanding of current social justice issues (reflection), their development of professional competencies in literacy instruction (practice), and their identity as advocates of social justice (action) who address issues related to student diversity, equity, and human rights within the English Language Arts program. In this paper presentation, participants will be provided with an overview of the Equity Literature Circle framework, a summary of key findings and recommendations from the qualitative study, an annotated bibliography of suggested Young Adult novels, and opportunities for questions and dialogue.

Keywords: literacy, language, equity, social justice, diversity, human rights

Procedia PDF Downloads 45
5608 Intermittent Demand Forecast in Telecommunication Service Provider by Using Artificial Neural Network

Authors: Widyani Fatwa Dewi, Subroto Athor

Abstract:

In a telecommunication service provider, quantity and interval of customer demand often difficult to predict due to high dependency on customer expansion strategy and technological development. Demand arrives when a customer needs to add capacity to an existing site or build a network in a new site. Because demand is uncertain for each period, and sometimes there is a null demand for several equipments, it is categorized as intermittent. This research aims to improve demand forecast quality in Indonesia's telecommunication service providers by using Artificial Neural Network. In Artificial Neural Network, the pattern or relationship within data will be analyzed using the training process, followed by the learning process as validation stage. Historical demand data for 36 periods is used to support this research. It is found that demand forecast by using Artificial Neural Network outperforms the existing method if it is reviewed on two criteria: the forecast accuracy, using Mean Absolute Deviation (MAD), Mean of the sum of the Squares of the Forecasting Error (MSE), Mean Error (ME) and service level which is shown through inventory cost. This research is expected to increase the reference for a telecommunication demand forecast, which is currently still limited.

Keywords: artificial neural network, demand forecast, forecast accuracy, intermittent, service level, telecommunication

Procedia PDF Downloads 134
5607 Service Blueprint for Improving Clinical Guideline Adherence via Mobile Health Technology

Authors: Y. O’Connor, C. Heavin, S. O’ Connor, J. Gallagher, J. Wu, J. O’Donoghue

Abstract:

Background: To improve the delivery of paediatric healthcare in resource-poor settings, Community Health Workers (CHW) have been provided with a paper-based set of protocols known as Community Case Management (CCM). Yet research has shown that CHW adherence to CCM guidelines is poor, ultimately impacting health service delivery. Digitising the CCM guidelines via mobile technology is argued in extant literature to improve CHW adherence. However, little research exist which outlines how (a) this process can be digitised and (b) adherence could be improved as a result. Aim: To explore how an electronic mobile version of CCM (eCCM) can overcome issues associated with the paper-based CCM protocol (poor adherence to guidelines) vis-à-vis service blueprinting. This service blueprint will outline how (a) the CCM process can be digitised using mobile Clinical Decision Support Systems software to support clinical decision-making and (b) adherence can be improved as a result. Method: Development of a single service blueprint for a standalone application which visually depicts the service processes (eCCM) when supporting the CHWs, using an application known as Supporting LIFE (Low cost Intervention For disEase control) as an exemplar. Results: A service blueprint is developed which illustrates how the eCCM solution can be utilised by CHWs to assist with the delivery of healthcare services to children. Leveraging smartphone technologies can (a) provide CHWs with just-in-time data to assist with their decision making at the point-of-care and (b) improve CHW adherence to CCM guidelines. Conclusions: The development of the eCCM opens up opportunities for the CHWs to leverage the inherent benefit of mobile devices to assist them with health service delivery in rural settings. To ensure that benefits are achieved, it is imperative to comprehend the functionality and form of the eCCM service process. By creating such a service blueprint for an eCCM approach, CHWs are provided with a clear picture regarding the role of the eCCM solution, often resulting in buy-in from the end-users.

Keywords: adherence, community health workers, developing countries, mobile clinical decision support systems, CDSS, service blueprint

Procedia PDF Downloads 389
5606 The Relationship between Incidental Emotions, Risk Perceptions and Type of Army Service

Authors: Sharon Garyn-Tal, Shoshana Shahrabani

Abstract:

Military service in general, and in combat units in particular, can be physically and psychologically stressful. Therefore, type of service may have significant implications for soldiers during and after their military service including emotions, judgments and risk perceptions. Previous studies have focused on risk propensity and risky behavior among soldiers, however there is still lack of knowledge on the impact of type of army service on risk perceptions. The current study examines the effect of type of army service (combat versus non-combat service) and negative incidental emotions on risk perceptions. In 2014 a survey was conducted among 153 combat and non-combat Israeli soldiers. The survey was distributed in train stations and central bus stations in various places in Israel among soldiers waiting for the train/bus. Participants answered questions related to the levels of incidental negative emotions they felt, to their risk perceptions (chances to be hurt by terror attack, by violent crime and by car accident), and personal details including type of army service. The data in this research is unique because military service in Israel is compulsory, so that the Israeli population serving in the army is wide and diversified. The results indicate that currently serving combat participants were more pessimistic in their risk perceptions (for all type of risks) compared to the currently serving non-combat participants. Since combat participants probably experienced severe and distressing situations during their service, they became more pessimistic regarding their probabilities of being hurt in different situations in life. This result supports the availability heuristic theory and the findings of previous studies indicating that those who directly experience distressing events tend to overestimate danger. The findings also indicate that soldiers who feel higher levels of incidental fear and anger have pessimistic risk perceptions. In addition, respondents who experienced combat army service also have pessimistic risk perceptions if they feel higher levels of fear. In addition, the findings suggest that higher levels of the incidental emotions of fear and anger are related to more pessimistic risk perceptions. These results can be explained by the compulsory army service in Israel that constitutes a focused threat to soldiers' safety during their period of service. Thus, in this stressful environment, negative incidental emotions even during routine times correlate with higher risk perceptions. In conclusion, the current study results suggest that combat army service shapes risk perceptions and the way young people control their negative incidental emotions in everyday life. Recognizing the factors affecting risk perceptions among soldiers is important for better understanding the impact of army service on young people.

Keywords: army service, combat soldiers, incidental emotions, risk perceptions

Procedia PDF Downloads 215
5605 Effect of Prophylactic Oxytocin Therapy on Duration of Retained Fetal Membrane (RFM) in Periparturient Dairy Cows

Authors: Hamid Ghasemzadeh- Nava, Maziar Kaveh Baghbadorani, Amin Tamadon

Abstract:

Considering response of uterus to ecbolic effect of oxytocin near the time of parturition, this study was done for investigating the effect of prophylactic administration of this hormone on duration of fetal membrane retention, time interval to first detectable estrus, time interval to first service, and conception rate at first service in cases of both normal parturition and dystocia. For this reason cows with (n=18) and without (n=18) dystocia assigned randomly to treatment (n=12) or control (n=6) groups and received intramuscular injection of 100 IU of oxytocin or 10 mL of normal saline respectively. Further observations and investigations indicate that duration of fetal retention is significantly shorter in treatment group cows compared to control groups, regardless of having dystocia (P=0.002) or normal spontaneous calving (P=0.001). The same trend exists for conception rate at first service in which cows in treatment groups had significantly higher conception rate (CR) in comparison to cows in control groups with (P=0.0003) or without dystocia (P=0.017). The time interval to first detected heat and first service didn’t show any difference between groups.

Keywords: conception rate, oxytocin, RFM, time to first service

Procedia PDF Downloads 413
5604 The Service Appraisal of Soldiers of the Army of the Czech Republic in the Context of Personal Expenses

Authors: Tereza Dolečková

Abstract:

Following article provides the comparison of international norms and standards formulating personal expenses, and then it illustrates the national concept of personal expenses of the Ministry of Defence. Then a new salary system of soldiers and the importance of the service appraisal in the context of personal expenses of the Ministry of Defence are explained. The first part of the article includes formulation of the approach to the definition of personal expenses within the international norms and standards and also within the Ministry of Defence of the Czech Republic. The structure of employees of the Ministry of Defence of the Czech Republic in years 2012 – 2014 and the amount of military expenses and the share of salary expenses of the Ministry of total expenses of the Ministry are clarified there, also the comparison of the amount of military expenses in chosen member states of the North Atlantic Treaty Organization is done. The salary system of professional soldiers in connection with the amendment of the Act No. 221/1999 Coll. on Professional Soldiers is clarified in the second part of this article. The amendment significantly regulates the salary items of soldiers but changes are also in the service appraisal of soldiers which reflects one of seven salary items of soldiers – the performance bonus. The aim of this article is to clarify different approach to define personal expenses with emphasis on the Ministry of Defence of the Czech Republic which overlaps to the service appraisal of soldiers of the Army of the Czech Republic and their salary system in connection with personal expenses of the Ministry of Defence of the Czech Republic. The efficient and objective system of the service appraisal and the use of its results are connected to the principles of the career advancement; only the best soldiers can advance in the system of the service careers to higher positions. That is why it is necessary to improve the service appraisal so it would provide the maximum information about the performance of a soldier and it would also motivate the soldier in his development. The attention should be paid to the service appraisal of the soldiers of the Army of the Czech Republic to achieve as much objectivity as possible.

Keywords: career, human resource management and development, personal expenses, salary system of soldiers, service appraisal of soldiers, the Army of the Czech Republic

Procedia PDF Downloads 222
5603 A System Architecture for Hand Gesture Control of Robotic Technology: A Case Study Using a Myo™ Arm Band, DJI Spark™ Drone, and a Staubli™ Robotic Manipulator

Authors: Sebastian van Delden, Matthew Anuszkiewicz, Jayse White, Scott Stolarski

Abstract:

Industrial robotic manipulators have been commonplace in the manufacturing world since the early 1960s, and unmanned aerial vehicles (drones) have only begun to realize their full potential in the service industry and the military. The omnipresence of these technologies in their respective fields will only become more potent in coming years. While these technologies have greatly evolved over the years, the typical approach to human interaction with these robots has not. In the industrial robotics realm, a manipulator is typically jogged around using a teach pendant and programmed using a networked computer or the teach pendant itself via a proprietary software development platform. Drones are typically controlled using a two-handed controller equipped with throttles, buttons, and sticks, an app that can be downloaded to one’s mobile device, or a combination of both. This application-oriented work offers a novel approach to human interaction with both unmanned aerial vehicles and industrial robotic manipulators via hand gestures and movements. Two systems have been implemented, both of which use a Myo™ armband to control either a drone (DJI Spark™) or a robotic arm (Stäubli™ TX40). The methodologies developed by this work present a mapping of armband gestures (fist, finger spread, swing hand in, swing hand out, swing arm left/up/down/right, etc.) to either drone or robot arm movements. The findings of this study present the efficacy and limitations (precision and ergonomic) of hand gesture control of two distinct types of robotic technology. All source code associated with this project will be open sourced and placed on GitHub. In conclusion, this study offers a framework that maps hand and arm gestures to drone and robot arm control. The system has been implemented using current ubiquitous technologies, and these software artifacts will be open sourced for future researchers or practitioners to use in their work.

Keywords: human robot interaction, drones, gestures, robotics

Procedia PDF Downloads 132
5602 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 434
5601 Pre-Service Teachers’ Experiences and Attitude towards Children’s Problem Solving Strategies in Early Mathematics Learning

Authors: Temitayo Ogunsanwo

Abstract:

Problem-solving is an important way of learning way of learning because it propels children to use previous experiences to deal with new situations. The purpose of this study is to find out the attitude of pre-service teachers to problem-solving as a strategy for promoting early mathematics learning in children. This qualitative study employed a descriptive design to investigate the experiences of twenty second-year undergraduate early childhood education Pre-service teachers in a teaching practice and their attitude towards five-year-old children’s problem-solving strategies in mathematics. Pre-service teachers were exposed to different strategies for teaching children how to solve problems in mathematics. They were taken through a micro teaching in class using different strategies to teach problem-solving in different topics in the five-year-old mathematics curriculum. The students were then made to teach five-year-olds in neighbouring schools for three weeks, working in pairs, observing and recording children’s problem-solving activities and strategies. After the three weeks exercise, their experiences and attitude towards children’s problem-solving strategies were collected using open-ended questions and analysed in themes. Findings were discussed.

Keywords: attitude, early mathematics learning, experience, pre-service teachers, problem-solving, strategies

Procedia PDF Downloads 314
5600 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 74