Search results for: mass communication
1838 Biflavonoids from Selaginellaceae as Epidermal Growth Factor Receptor Inhibitors and Their Anticancer Properties
Authors: Adebisi Adunola Demehin, Wanlaya Thamnarak, Jaruwan Chatwichien, Chatchakorn Eurtivong, Kiattawee Choowongkomon, Somsak Ruchirawat, Nopporn Thasana
Abstract:
The epidermal growth factor receptor (EGFR) is a transmembrane glycoprotein involved in cellular signalling processes and, its aberrant activity is crucial in the development of many cancers such as lung cancer. Selaginellaceae are fern allies that have long been used in Chinese traditional medicine to treat various cancer types, especially lung cancer. Biflavonoids, the major secondary metabolites in Selaginellaceae, have numerous pharmacological activities, including anti-cancer and anti-inflammatory. For instance, amentoflavone induces a cytotoxic effect in the human NSCLC cell line via the inhibition of PARP-1. However, to the best of our knowledge, there are no studies on biflavonoids as EGFR inhibitors. Thus, this study aims to investigate the EGFR inhibitory activities of biflavonoids isolated from Selaginella siamensis and Selaginella bryopteris. Amentoflavone, tetrahydroamentoflavone, sciadopitysin, robustaflavone, robustaflavone-4-methylether, delicaflavone, and chrysocauloflavone were isolated from the ethyl-acetate extract of the whole plants. The structures were determined using NMR spectroscopy and mass spectrometry. In vitro study was conducted to evaluate their cytotoxicity against A549, HEPG2, and T47D human cancer cell lines using the MTT assay. In addition, a target-based assay was performed to investigate their EGFR inhibitory activity using the kinase inhibition assay. Finally, a molecular docking study was conducted to predict the binding modes of the compounds. Robustaflavone-4-methylether and delicaflavone showed the best cytotoxic activity on all the cell lines with IC50 (µM) values of 18.9 ± 2.1 and 22.7 ± 3.3 on A549, respectively. Of these biflavonoids, delicaflavone showed the most potent EGFR inhibitory activity with an 84% relative inhibition at 0.02 nM using erlotinib as a positive control. Robustaflavone-4-methylether showed a 78% inhibition at 0.15 nM. The docking scores obtained from the molecular docking study correlated with the kinase inhibition assay. Robustaflavone-4-methylether and delicaflavone had a docking score of 72.0 and 86.5, respectively. The inhibitory activity of delicaflavone seemed to be linked with the C2”=C3” and 3-O-4”’ linkage pattern. Thus, this study suggests that the structural features of these compounds could serve as a basis for developing new EGFR-TK inhibitors.Keywords: anticancer, biflavonoids, EGFR, molecular docking, Selaginellaceae
Procedia PDF Downloads 2021837 Impact of Behavioral Biases on Indian Investors: Case Analysis of a Mutual Fund Investment Company
Authors: Priyal Motwani, Garvit Goel
Abstract:
In this study, we have studied and analysed the transaction data of investors of a mutual fund investment company based in India. Based on the data available, we have identified the top four biases that affect the investors of the emerging market economies through regression analysis and three uniquely defined ratios. We found that the four most prominent biases that affected the investment making decisions in India are– Chauffer Knowledge, investors tend to make ambitious decisions about sectors they know little about; Bandwagon effect – the response of the market indices to macroeconomic events are more profound and seem to last longer compared to western markets; base-rate neglect – judgement about stocks are too much based on the most recent development ignoring the long-term fundamentals of the stock; availability bias – lack of proper communication channels of market information lead people to be too reliant on limited information they already have. After segregating the investors into six groups, the results have further been studied to identify a correlation among the demographics, gender and unique cultural identity of the derived groups and the corresponding prevalent biases. On the basis of the results obtained from the derived groups, our study recommends six methods, specific to each group, to educate the investors about the prevalent biases and their role in investment decision making.Keywords: Bandwagon effect, behavioural biases, Chauffeur knowledge, demographics, investor literacy, mutual funds
Procedia PDF Downloads 2331836 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 3051835 Life Stage Customer Segmentation by Fine-Tuning Large Language Models
Authors: Nikita Katyal, Shaurya Uppal
Abstract:
This paper tackles the significant challenge of accurately classifying customers within a retailer’s customer base. Accurate classification is essential for developing targeted marketing strategies that effectively engage this important demographic. To address this issue, we propose a method that utilizes Large Language Models (LLMs). By employing LLMs, we analyze the metadata associated with product purchases derived from historical data to identify key product categories that act as distinguishing factors. These categories, such as baby food, eldercare products, or family-sized packages, offer valuable insights into the likely household composition of customers, including families with babies, families with kids/teenagers, families with pets, households caring for elders, or mixed households. We segment high-confidence customers into distinct categories by integrating historical purchase behavior with LLM-powered product classification. This paper asserts that life stage segmentation can significantly enhance e-commerce businesses’ ability to target the appropriate customers with tailored products and campaigns, thereby augmenting sales and improving customer retention. Additionally, the paper details the data sources, model architecture, and evaluation metrics employed for the segmentation task.Keywords: LLMs, segmentation, product tags, fine-tuning, target segments, marketing communication
Procedia PDF Downloads 311834 Comparative Evaluation of Accuracy of Selected Machine Learning Classification Techniques for Diagnosis of Cancer: A Data Mining Approach
Authors: Rajvir Kaur, Jeewani Anupama Ginige
Abstract:
With recent trends in Big Data and advancements in Information and Communication Technologies, the healthcare industry is at the stage of its transition from clinician oriented to technology oriented. Many people around the world die of cancer because the diagnosis of disease was not done at an early stage. Nowadays, the computational methods in the form of Machine Learning (ML) are used to develop automated decision support systems that can diagnose cancer with high confidence in a timely manner. This paper aims to carry out the comparative evaluation of a selected set of ML classifiers on two existing datasets: breast cancer and cervical cancer. The ML classifiers compared in this study are Decision Tree (DT), Support Vector Machine (SVM), k-Nearest Neighbor (k-NN), Logistic Regression, Ensemble (Bagged Tree) and Artificial Neural Networks (ANN). The evaluation is carried out based on standard evaluation metrics Precision (P), Recall (R), F1-score and Accuracy. The experimental results based on the evaluation metrics show that ANN showed the highest-level accuracy (99.4%) when tested with breast cancer dataset. On the other hand, when these ML classifiers are tested with the cervical cancer dataset, Ensemble (Bagged Tree) technique gave better accuracy (93.1%) in comparison to other classifiers.Keywords: artificial neural networks, breast cancer, classifiers, cervical cancer, f-score, machine learning, precision, recall
Procedia PDF Downloads 2841833 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences
Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao
Abstract:
Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern
Procedia PDF Downloads 3581832 Using Optimal Cultivation Strategies for Enhanced Biomass and Lipid Production of an Indigenous Thraustochytrium sp. BM2
Authors: Hsin-Yueh Chang, Pin-Chen Liao, Jo-Shu Chang, Chun-Yen Chen
Abstract:
Biofuel has drawn much attention as a potential substitute to fossil fuels. However, biodiesel from waste oil, oil crops or other oil sources can only satisfy partial existing demands for transportation. Due to the feature of being clean, green and viable for mass production, using microalgae as a feedstock for biodiesel is regarded as a possible solution for a low-carbon and sustainable society. In particular, Thraustochytrium sp. BM2, an indigenous heterotrophic microalga, possesses the potential for metabolizing glycerol to produce lipids. Hence, it is being considered as a promising microalgae-based oil source for biodiesel production and other applications. This study was to optimize the culture pH, scale up, assess the feasibility of producing microalgal lipid from crude glycerol and apply operation strategies following optimal results from shake flask system in a 5L stirred-tank fermenter for further enhancing lipid productivities. Cultivation of Thraustochytrium sp. BM2 without pH control resulted in the highest lipid production of 3944 mg/L and biomass production of 4.85 g/L. Next, when initial glycerol and corn steep liquor (CSL) concentration increased five times (50 g and 62.5 g, respectively), the overall lipid productivity could reach 124 mg/L/h. However, when using crude glycerol as a sole carbon source, direct addition of crude glycerol could inhibit culture growth. Therefore, acid and metal salt pretreatment methods were utilized to purify the crude glycerol. Crude glycerol pretreated with acid and CaCl₂ had the greatest overall lipid productivity 131 mg/L/h when used as a carbon source and proved to be a better substitute for pure glycerol as carbon source in Thraustochytrium sp. BM2 cultivation medium. Engineering operation strategies such as fed-batch and semi-batch operation were applied in the cultivation of Thraustochytrium sp. BM2 for the improvement of lipid production. In cultivation of fed-batch operation strategy, harvested biomass 132.60 g and lipid 69.15 g were obtained. Also, lipid yield 0.20 g/g glycerol was same as in batch cultivation, although with poor overall lipid productivity 107 mg/L/h. In cultivation of semi-batch operation strategy, overall lipid productivity could reach 158 mg/L/h due to the shorter cultivation time. Harvested biomass and lipid achieved 232.62 g and 126.61 g respectively. Lipid yield was improved from 0.20 to 0.24 g/g glycerol. Besides, product costs of three kinds of operation strategies were also calculated. The lowest product cost 12.42 $NTD/g lipid was obtained while employing semi-batch operation strategy and reduced 33% in comparison with batch operation strategy.Keywords: heterotrophic microalga Thrasutochytrium sp. BM2, microalgal lipid, crude glycerol, fermentation strategy, biodiesel
Procedia PDF Downloads 1531831 Adaptation and Habituation to new Complete Dentures
Authors: Mohamed Khaled Ahmed Azzam
Abstract:
Complete dentures, a non biological appliance, were and are still used to replace missing teeth and surrounding structures. Its main objectives are esthetics, speech, function and psychological state improvement. Dentists must realize that, just as dentate patients vary in their dental treatment complexity; edentulous patients also vary in the difficulty of their treatment plan. There are two main problems facing the removable Prosthodontist which harden his/her task how to please his patient with their new dentures being: Denture construction which however its fabrication is at the highest standards still is an unpleasant experience to all patients in the beginning and improves by time. This varies from one to several years according to the patient’s attitude, age, gender, socio-economical level and culture. The second problem of edentulous patients is both physical and psychological. Good interview, communication and note how patients present themselves for the concerns of their appearance, overall attitude and expectations concerning treatment is very important physically. On the psychological aspect patients have great difficulty to cope with new dentures to the extent of not using them at all. Hence their mind preparation should be commenced from day one by more than one method. This had a great impact on the acceptance which led to habituation to their dentures and patients were appreciative and pleased. In conclusion to successfully treat edentulous patients a great deal of information is required to complete a proper diagnosis, including patient mental attitude, past and present medical and dental conditions, and extra and intra-oral examinations. In addition to the clinical experience and skill of the whole dental team.Keywords: complete dentures, edentulous patients, management of denture, psychological mind preparation
Procedia PDF Downloads 2571830 Rohingya Refugees and Bangladesh: Balance of Human Rights and Rationalization
Authors: Kudrat-E-Khuda Babu
Abstract:
Rohingya refugees are the most marginalized and persecuted section of people in the world. The heinous brutality of Myanmar has forced the Muslim minority community to flee themselves to their neighboring country, Bangladesh for quite a few times now. The recent atrocity of the Buddhist country has added insult to injury on the existing crisis. In lieu of protection, the rights of the Rohingya community in Myanmar are being violated through exclusion from citizenship and steamroller of persecution. The mass influx of Rohingya refugees to Bangladesh basically took place in 1978, 1992, 2012, and 2017. At present, there are around one million Rohingyas staying at Teknaf, Ukhiya of Cox’s Bazar, the southern part of Bangladesh. The country, despite being a poverty-stricken one, has shown unprecedented generosity in sheltering the Rohingya people. For sheltering half of the total refugees in 2017, the Prime Minister of Bangladesh, Sheikh Hasina is now being regarded as the lighthouse of humanity or the mother of humanity. Though Bangladesh is not a ratifying state of the UN Refugee Convention, 1951 and its Additional Protocol, 1967, the country cannot escape its obligation under international human rights jurisprudence. Bangladesh is a party to eight human rights instruments out of nine core instruments, and thus, the country has an indirect obligation to protect and promote the rights of the refugees. Pressure from international bodies has also made Bangladesh bound to provide refuge to Rohingya people. Even though the demographic vulnerability and socio-economic condition of the country do not suggest taking over extra responsibility, the principle of non-refoulment as a part of customary international law reminds us to stay beside those persecuted or believed to have well-founded fear of persecution. In the case of HM Ershad v. Bangladesh and Others, 7 BLC (AD) 67, it was held that any international treaty or document after signing or ratification is not directly enforceable unless and until the parliament enacts a similar statute howsoever sweet the document is. As per Article 33(2) of the 1951 Refugee Convention, there are even exceptions for a state party in case of serious consequences like threat to national security, apprehension of serious crime and danger to safeguard state population. Bangladesh is now at a cross-road of human rights and national interest. The world community should come forward to resolve the crisis of the persecuted Rohingya people through repatriation, resettlement, and reintegration.Keywords: Rohingya refugees, human rights, Bangladesh, Myanmar
Procedia PDF Downloads 1951829 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 6641828 Cultural Artifact, Sign Language and Perspectives of Meaning in Select-Nollywood Films
Authors: Aniekan James Akpan
Abstract:
The use of signs and symbols to represent cardinal information is inalienable among African communities. It has been the tenable instrument of cultural transmission for decades, but in the current transposal of Western values, a good number of communicating codes and symbolic images have been gradually relegated to the background. This paper discusses the regeneration of cultural artifacts and sign languages in Nigerian films using Johnpaul Rebecca and Ayamma as models in a qualitative research based on Charles Sanders Pierce's Semiotics as well as quantitative methods of survey using questionnaire and focus group discussion as instruments to obtain data. With a population of 2,343 viewers of the movies used for the study and a sample size of 322 respondents using Philip Meyer’s guide, findings show that cultural relics can stabilise the subject matter of a film. Artifacts can stimulate curiosity and invoke nostalgia. Sign languages encode deeper information that ordinary speech may not properly convey in films. It concludes that the use of non-verbal codes in filmmaking deserves deep research into the culture portrayed and that non-verbal cues communicate deeper information about a people's cosmos in a film than dialogue. It recommends that adequate research should be made before producing a film and the idea of cultural values represented in artifacts and sign language should be ingrained in the courses for students to acquaint themselves with.Keywords: cultural artifact, Nollywood films, non-verbal communication, sign language
Procedia PDF Downloads 521827 Non-Physician Medical Worker Experience during the COVID-19 Pandemic
Authors: William Mahony, L. Jacqueline Hirth, Richard Rupp, Sandra Gonzalez, Roger Zoorob
Abstract:
Background: The impact of the COVID-19 pandemic on physicians has been considered by many researchers, but less is known about non-physician healthcare workers. The aim of this study is to examine the association of COVID-19 safety training and communication with stress. Methods: A 91-item online survey was distributed, starting January 2, 2021, to non-physician healthcare workers, including physician assistants, nurse practitioners, and medical assistants (MAs) in the United States through email and social media. A $1 donation was made to the Red Cross for each completed survey. The survey consisted of demographics, occupational questions, and perceived stress (perceived stress scale, PSS). Items on the PSS were combined for an overall score and categorized according to the severity of perceived stress. Chi-square tests were performed for bivariate analyses of categorical variables. Results: Of the 284 participants consenting to complete the survey, 197 participants completed the full survey. MAs made up most of the sample at 79%. Among all respondents, 47% had moderate PSS scores (scored between 14 and 26), and 51% had severe PSS scores (scored between 27 and 40). Unvaccinated participants reported statistically significantly lower levels of perceived stress (p = 0.002). Performing tasks outside of typical job responsibilities was not associated with PSS scores (p = .667). Discussion: Non-physician healthcare workers demonstrated a high level of perceived stress overall. The association between vaccination status and perceived stress should be examined in order to evaluate whether vaccination levels could be improved with further education about the virus and associated risks.Keywords: COVID-19, SARS-Cov-2, nursing, public health
Procedia PDF Downloads 1801826 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study
Authors: Hanneke J. A. Smaling, Mandy Visser
Abstract:
One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.Keywords: covid-19, dementia, home care, long-term care, policy
Procedia PDF Downloads 1461825 Influence of Information Technology on Financial Management Practices in Secondary School: For National Transormation in Zone C Senatorional District of Benue State
Authors: Eru Ihie Joel
Abstract:
This study was carried out to investigate the influence of information technology on financial management practice in secondary schools for transformation. In Zone C Senatorial District of Benue state. The study answered four research questions and tested four hypotheses. Related literature was reviewed to show the gap to be filled in the study. The population was 196 respondents made up of principals and finance clerks of secondary schools. The descriptive survey was adopted for the study. A structured 20 item questionnaire (IITFMPSQ) was constructed and used to collect date for the study. Data obtained were analyzed using descriptive and inferential statistic. Mean and standard deviation were used to analyze the research question while the chi- square (x2) test of goodness of fit was used to test the hypothesis. The major findings revealed that the use of computer system significantly influences budgeting in secondary schools in zone senatorial district of Benue State for transformation. It was also established that the use of internet facilities influences the funding of secondary schools for transformation in the zone. Based on the findings of the study, it was recommended among other things that administrators and teachers in schools should be trained to make effective use of the computer in budgeting so as to facilitate delegations, control, evaluation, accountability for transformation. It was further suggested that the study be replicated on the effective use of information communication teaching (ITC) in teaching and learning in secondary school for transformation.Keywords: influence, finance, management, technology
Procedia PDF Downloads 3681824 Thermal Vacuum Chamber Test Result for CubeSat Transmitter
Authors: Fitri D. Jaswar, Tharek A. Rahman, Yasser A. Ahmad
Abstract:
CubeSat in low earth orbit (LEO) mainly uses ultra high frequency (UHF) transmitter with fixed radio frequency (RF) output power to download the telemetry and the payload data. The transmitter consumes large amount of electrical energy during the transmission considering the limited satellite size of a CubeSat. A transmitter with power control ability is designed to achieve optimize the signal to noise ratio (SNR) and efficient power consumption. In this paper, the thermal vacuum chamber (TVAC) test is performed to validate the performance of the UHF band transmitter with power control capability. The TVAC is used to simulate the satellite condition in the outer space environment. The TVAC test was conducted at the Laboratory of Spacecraft Environment Interaction Engineering, Kyushu Institute of Technology, Japan. The TVAC test used 4 thermal cycles starting from +60°C to -20°C for the temperature setting. The pressure condition inside chamber was less than 10-5Pa. During the test, the UHF transmitter is integrated in a CubeSat configuration with other CubeSat subsystem such as on board computer (OBC), power module, and satellite structure. The system is validated and verified through its performance in terms of its frequency stability and the RF output power. The UHF band transmitter output power is tested from 0.5W to 2W according the satellite mode of operations and the satellite power limitations. The frequency stability is measured and the performance obtained is less than 2 ppm in the tested operating temperature range. The test demonstrates the RF output power is adjustable in a thermal vacuum condition.Keywords: communication system, CubeSat, SNR, UHF transmitter
Procedia PDF Downloads 2671823 Risk Management in Industrial Supervision Projects
Authors: Érick Aragão Ribeiro, George André Pereira Thé, José Marques Soares
Abstract:
Several problems in industrial supervision software development projects may lead to the delay or cancellation of projects. These problems can be avoided or contained by using identification methods, analysis and control of risks. These procedures can give an overview of the possible problems that can happen in the projects and what are the immediate solutions. Therefore, we propose a risk management method applied to the teaching and development of industrial supervision software. The method is developed through a literature review and previous projects can be divided into phases of management and have basic features that are validated with experimental research carried out by mechatronics engineering students and professionals. The management is conducted through the stages of identification, analysis, planning, monitoring, control and communication of risks. Programmers use a method of prioritizing risks considering the gravity and the possibility of occurrence of the risk. The outputs of the method indicate which risks occurred or are about to happen. The first results indicate which risks occur at different stages of the project and what risks have a high probability of occurring. The results show the efficiency of the proposed method compared to other methods, showing the improvement of software quality and leading developers in their decisions. This new way of developing supervision software helps students identify design problems, evaluate software developed and propose effective solutions. We conclude that the risk management optimizes the development of the industrial process control software and provides higher quality to the product.Keywords: supervision software, risk management, industrial supervision, project management
Procedia PDF Downloads 3611822 Transmission Line Matrix (TLM) Modelling of Microstrip Circular Antenna
Authors: Jugoslav Jokovic, Tijana Dimitrijevic, Nebojsa Doncov
Abstract:
The goal of this paper is to investigate the possibilities and effectiveness of the TLM (Transmission Line Matrix) method for modelling of up-to-date microstrip antennas with circular geometry that have significant application in modern wireless communication systems. The coaxially fed microstrip antenna configurations with circular patch are analyzed by using the in-house 3DTLMcyl_cw solver based on computational electromagnetic TLM method adapted to the cylindrical grid and enhanced with the compact wire model. Opposed to the widely used rectangular TLM mesh, where a staircase approximation has to be used to describe curved boundaries, precise modelling of circular boundaries can be accomplished in the cylindrical grid irrespective of the mesh resolution. Using the compact wire model incorporated in cylindrical mesh, it is possible to model coaxial feed and include the influence of the real excitation in the antenna model. The conventional and inverted configuration of a coaxially fed circular patch antenna are considered, comparing the resonances obtained using TLM cylindrical model with results reached by the corresponding model in a rectangular grid as well as with experimental ones. Bearing in mind that accuracy of simulated results depends on a relevantly created model, besides structure geometry and dimensions, it is important to consider additional modelling issues, regarding appropriate mesh resolution and a relevant extension of a mesh around the considered structure that would provide convergence of the results.Keywords: computational electromagnetic, coaxial feed, microstrip antenna, TLM modelling
Procedia PDF Downloads 2821821 Resource Orchestration Based on Two-Sides Scheduling in Computing Network Control Sytems
Authors: Li Guo, Jianhong Wang, Dian Huang, Shengzhong Feng
Abstract:
Computing networks as a new network architecture has shown great promise in boosting the utilization of different resources, such as computing, caching, and communications. To maximise the efficiency of resource orchestration in computing network control systems (CNCSs), this work proposes a dynamic orchestration strategy of a different resource based on task requirements from computing power requestors (CPRs). Specifically, computing power providers (CPPs) in CNCSs could share information with each other through communication channels on the basis of blockchain technology, especially their current idle resources. This dynamic process is modeled as a cooperative game in which CPPs have the same target of maximising long-term rewards by improving the resource utilization ratio. Meanwhile, the task requirements from CPRs, including size, deadline, and calculation, are simultaneously considered in this paper. According to task requirements, the proposed orchestration strategy could schedule the best-fitting resource in CNCSs, achieving the maximum long-term rewards of CPPs and the best quality of experience (QoE) of CRRs at the same time. Based on the EdgeCloudSim simulation platform, the efficiency of the proposed strategy is achieved from both sides of CPRs and CPPs. Besides, experimental results show that the proposed strategy outperforms the other comparisons in all cases.Keywords: computing network control systems, resource orchestration, dynamic scheduling, blockchain, cooperative game
Procedia PDF Downloads 1211820 Inclusive Cultural Heritage Tourism Project
Authors: L. Cruz-Lopes, M. Sell, P. Escudeiro, B. Esteves
Abstract:
It might be difficult for deaf people to communicate since spoken and written languages are different from sign language. When it comes to getting information, going to places of cultural heritage, or using services and infrastructure, there is a clear lack of inclusiveness. By creating assistive technology that enables deaf individuals to get around communication hurdles and encourage inclusive tourism, the ICHT- Inclusive Cultural Heritage Tourism initiative hopes to increase knowledge of sign language. The purpose of the Inclusive Cultural Heritage Tourism (ICHT) project is to develop online and on-site sign language tools and material for usage at popular tourist destinations in the northern region of Portugal, including Torre dos Clérigos, the Lello bookstore, Maia Zoo, Porto wine cellars, and São Pedro do Sul (Viseu) thermae. The ICHT system consists of an application using holography, a mobile game, an online platform for collaboration with deaf and hearing users, and a collection of International Sign training courses. The project also offers a prospect for a more inclusive society by introducing a method of teaching sign languages to tourism industry professionals. As a result, the teaching and learning of sign language along with the assistive technology tools created by the project sets up an inclusive environment for the deaf community, producing results in the area of automatic sign language translation and aiding in the global recognition of the Portuguese tourism industry.Keywords: inclusive tourism, games, international sign training, deaf community
Procedia PDF Downloads 1191819 Interdisciplinarity as a Regular Pedagogical Practice in the Classrooms
Authors: Catarina Maria Neto Da Cruz, Ana Maria Reis D’Azevedo Breda
Abstract:
The world is changing and, consequently, the young people need more sophisticated tools and skills to lead with the world’s complexity. The Organisation for Economic Co-operation and Development Learning Framework 2030 suggests an interdisciplinary knowledge as a principle for the future of education systems. In the curricular document Portuguese about the profile of students leaving compulsory education, the critical thinking and creative thinking are pointed out as skills to be developed, which imply the interconnection of different knowledge, applying it in different contexts and learning areas. Unlike primary school teachers, teachers specialized in a specific area lead to more difficulties in the implementation of interdisciplinary approaches in the classrooms and, despite the effort, the interdisciplinarity is not a common practice in schools. Statement like "Mathematics is everywhere" is unquestionable, however, many math teachers show difficulties in presenting such evidence in their classes. Mathematical modelling and problems in real contexts are promising in the development of interdisciplinary pedagogical practices and in Portugal there is a continuous training offer to contribute to the development of teachers in terms of their pedagogical approaches. But when teachers find themselves in the classroom, without a support, do they feel able to implement interdisciplinary practices? In this communication we will try to approach this issue through a case study involving a group of Mathematics teachers, who attended a training aimed at stimulating interdisciplinary practices in real contexts, namely related to the COVID-19 pandemic.Keywords: education, mathematics, teacher training, interdisciplinarity
Procedia PDF Downloads 991818 A Modified QuEChERS Method Using Activated Carbon Fibers as r-DSPE Sorbent for Sample Cleanup: Application to Pesticides Residues Analysis in Food Commodities Using GC-MS/MS
Authors: Anshuman Srivastava, Shiv Singh, Sheelendra Pratap Singh
Abstract:
A simple, sensitive and effective gas chromatography tandem mass spectrometry (GC-MS/MS) method was developed for simultaneous analysis of multi pesticide residues (organophosphate, organochlorines, synthetic pyrethroids and herbicides) in food commodities using phenolic resin based activated carbon fibers (ACFs) as reversed-dispersive solid phase extraction (r-DSPE) sorbent in modified QuEChERS (Quick Easy Cheap Effective Rugged Safe) method. The acetonitrile-based QuEChERS technique was used for the extraction of the analytes from food matrices followed by sample cleanup with ACFs instead of traditionally used primary secondary amine (PSA). Different physico-chemical characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, X-ray diffraction and Brunauer-Emmet-Teller surface area analysis were employed to investigate the engineering and structural properties of ACFs. The recovery of pesticides and herbicides was tested at concentration levels of 0.02 and 0.2 mg/kg in different commodities such as cauliflower, cucumber, banana, apple, wheat and black gram. The recoveries of all twenty-six pesticides and herbicides were found in acceptable limit (70-120%) according to SANCO guideline with relative standard deviation value < 15%. The limit of detection and limit of quantification of the method was in the range of 0.38-3.69 ng/mL and 1.26 -12.19 ng/mL, respectively. In traditional QuEChERS method, PSA used as r-DSPE sorbent plays a vital role in sample clean-up process and demonstrates good recoveries for multiclass pesticides. This study reports that ACFs are better in terms of removal of co-extractives in comparison of PSA without compromising the recoveries of multi pesticides from food matrices. Further, ACF replaces the need of charcoal in addition to the PSA from traditional QuEChERS method which is used to remove pigments. The developed method will be cost effective because the ACFs are significantly cheaper than the PSA. So the proposed modified QuEChERS method is more robust, effective and has better sample cleanup efficiency for multiclass multi pesticide residues analysis in different food matrices such as vegetables, grains and fruits.Keywords: QuEChERS, activated carbon fibers, primary secondary amine, pesticides, sample preparation, carbon nanomaterials
Procedia PDF Downloads 2791817 Usage of Cyanobacteria in Battery: Saving Money, Enhancing the Storage Capacity, Making Portable, and Supporting the Ecology
Authors: Saddam Husain Dhobi, Bikrant Karki
Abstract:
The main objective of this paper is save money, balance ecosystem of the terrestrial organism, control global warming, and enhancing the storage capacity of the battery with requiring weight and thinness by using Cyanobacteria in the battery. To fulfill this purpose of paper we can use different methods: Analysis, Biological, Chemistry, theoretical and Physics with some engineering design. Using this different method, we can produce the special type of battery that has the long life, high storage capacity, and clean environment, save money so on and by using the byproduct of Cyanobacteria i.e. glucose. Cyanobacteria are a special type of bacteria that produces different types of extracellular glucoses and oxygen with the help of little sunlight, water, and carbon dioxide and can survive in freshwater, marine and in the land as well. In this process, O₂ is more in the comparison to plant due to rapid growth rate of Cyanobacteria. The required materials are easily available in this process to produce glucose with the help of Cyanobacteria. Since CO₂, is greenhouse gas that causes the global warming? We can utilize this gas and save our ecological balance and the byproduct (glucose) C₆H₁₂O₆ can be utilized for raw material for the battery where as O₂ escape is utilized by living organism. The glucose produce by Cyanobateria goes on Krebs's Cycle or Citric Acid Cycle, in which glucose is complete, oxidizes and all the available energy from glucose molecule has been release in the form of electron and proton as energy. If we use a suitable anodes and cathodes, we can capture these electrons and protons to produce require electricity current with the help of byproduct of Cyanobacteria. According to "Virginia Tech Bio-battery" and "Sony" 13 enzymes and the air is used to produce nearly 24 electrons from a single glucose unit. In this output power of 0.8 mW/cm, current density of 6 mA/cm, and energy storage density of 596 Ah/kg. This last figure is impressive, at roughly 10 times the energy density of the lithium-ion batteries in your mobile devices. When we use Cyanobacteria in battery, we are able to reduce Carbon dioxide, Stop global warming, and enhancing the storage capacity of battery more than 10 times that of lithium battery, saving money, balancing ecology. In this way, we can produce energy from the Cyanobacteria and use it in battery for different benefits. In addition, due to the mass, size and easy cultivation, they are better to maintain the size of battery. Hence, we can use Cyanobacteria for the battery having suitable size, enhancing the storing capacity of battery, helping the environment, portability and so on.Keywords: anode, byproduct, cathode, cyanobacteri, glucose, storage capacity
Procedia PDF Downloads 3531816 An Anthropometric and Postural Risk Assessment of Students in Computer Laboratories of a State University
Authors: Sarah Louise Cruz, Jemille Venturina
Abstract:
Ergonomics considers the capabilities and limitations of a person as they interact with tools, equipment, facilities and tasks in their work environment. Workplace is one example of physical work environment, be it a workbench or a desk. In school laboratories, sitting is the most common working posture of the students. Students maintain static sitting posture as they perform different computer-aided activities. The College of Engineering and College of Information and Communication Technology of a State University consist of twenty-two computer laboratories. Normally, students aren’t usually aware of the importance of sustaining proper sitting posture while doing their long hour computer laboratory activities. The study evaluates the perceived discomfort and working postures of students as they are exposed on current workplace design of computer laboratories. The current study utilizes Rapid Upper Limb Assessment (RULA), Body Discomfort Chart using Borg’s CR-10 Scale Rating and Quick Exposure Checklist in order to assess the posture and the current working condition. The result of the study may possibly minimize the body discomfort experienced by the students. The researchers redesign the individual workstations which includes working desk, sitting stool and other workplace design components. Also, the economic variability of each alternative was considered given that the study focused on improvement of facilities of a state university.Keywords: computer workstation, ergonomics, posture, students, workplace
Procedia PDF Downloads 3161815 The Foucaultian Relationship between Power and Knowledge: Genealogy as a Method for Epistemic Resistance
Authors: Jana Soler Libran
Abstract:
The primary aim of this paper is to analyze the relationship between power and knowledge suggested in Michel Foucault's theory. Taking into consideration the role of power in knowledge production, the goal is to evaluate to what extent genealogy can be presented as a practical method for epistemic resistance. To do so, the methodology used consists of a revision of Foucault’s literature concerning the topic discussed. In this sense, conceptual analysis is applied in order to understand the effect of the double dimension of power on knowledge production. In its negative dimension, power is conceived as an organ of repression, vetoing certain instances of knowledge considered deceitful. In opposition, in its positive dimension, power works as an organ of the production of truth by means of institutionalized discourses. This double declination of power leads to the first main findings of the present analysis: no truth or knowledge can lie outside power’s action, and power is constituted through accepted forms of knowledge. To second these statements, Foucaultian discourse formations are evaluated, presenting external exclusion procedures as paradigmatic practices to demonstrate how power creates and shapes the validity of certain epistemes. Thus, taking into consideration power’s mechanisms to produce and reproduce institutionalized truths, this paper accounts for the Foucaultian praxis of genealogy as a method to reveal power’s intention, instruments, and effects in the production of knowledge. In this sense, it is suggested to consider genealogy as a practice which, firstly, reveals what instances of knowledge are subjugated to power and, secondly, promotes aforementioned peripherical discourses as a form of epistemic resistance. In order to counterbalance these main theses, objections to Foucault’s work from Nancy Fraser, Linda Nicholson, Charles Taylor, Richard Rorty, Alvin Goldman, or Karen Barad are discussed. In essence, the understanding of the Foucaultian relationship between power and knowledge is essential to analyze how contemporary discourses are produced by both traditional institutions and new forms of institutionalized power, such as mass media or social networks. Therefore, Michel Foucault's practice of genealogy is relevant, not only for its philosophical contribution as a method to uncover the effects of power in knowledge production but also because it constitutes a valuable theoretical framework for political theory and sociological studies concerning the formation of societies and individuals in the contemporary world.Keywords: epistemic resistance, Foucault’s genealogy, knowledge, power, truth
Procedia PDF Downloads 1301814 Professional Competences of E-Learning Lecturers: Case of Russian National Platforms of Open Education
Authors: Polina Pekker
Abstract:
This work analyzes the role of lecturers in e-learning in Russia. It is based on qualitative research of lecturers who conduct courses on Russian national platforms of open education. The platform is based on edx software (provider of massive open online courses). The interviews with e-learning lecturers were conducted: from December 2015 till January 2016 and from April 2016 till May 2016. The results of interviews (face-to-face, telephone, skype) show, firstly, the difference between the role of lecturers in e-learning and in traditional education and, secondly, that the competition between lecturers is high in Russia. The results of interviews in Russia show that e-learning lecturer should have several special professional competences: the ability to keep attention of audiences without real contact, the ability to work on camera and competences related with e-learning course support (test, forum, communication on forum and etc.) It is concluded that lecturers need special course on acting and speech skills and on conducting and organizing of e-learning course in Russia. It is planned to conduct French study. When results from French research will be totally ready, they will be compared to Russian. As well French platform, France Universite Numerique, was launched earlier, in January 2014, so Russian lecturers should get best practice from the French colleagues.Keywords: e-courses lecturer, e-learning, professional competences of lecturers, national Russian and French platforms of open education
Procedia PDF Downloads 1991813 Aptamers: A Potential Strategy for COVID-19 Treatment
Authors: Mohamad Ammar Ayass, Natalya Griko, Victor Pashkov, Wanying Cao, Kevin Zhu, Jin Zhang, Lina Abi Mosleh
Abstract:
Respiratory syndrome coronavirus 2 (SARS-CoV-2) is the causative agent for coronavirus disease 2019 (COVID-19). Early evidence pointed at the angiotensin-converting enzyme 2 (ACE-2) expressed on the epithelial cells of the lung as the main entry point of SARS-CoV-2 into the cells. The viral entry is mediated by the binding of the Receptor Binding Domain (RBD) of the spike protein that is expressed on the surface of the virus to the ACE-2 receptor. As the number of SARS-CoV-2 variants continues to increase, mutations arising in the RBD of SARS-CoV-2 may lead to the ineffectiveness of RBD targeted neutralizing antibodies. To address this limitation, the objective of this study is to develop a combination of aptamers that target different regions of the RBD, preventing the binding of the spike protein to ACE-2 receptor and subsequent viral entry and replication. A safe and innovative biomedical tool was developed to inhibit viral infection and reduce the harms of COVID-19. In the present study, DNA aptamers were developed against a recombinant trimer S protein using the Systematic Evolution of Ligands by Exponential enrichment (SELEX). Negative selection was introduced at round number 7 to select for aptamers that bind specifically to the RBD domain. A series of 9 aptamers (ADI2010, ADI2011, ADI201L, ADI203L, ADI205L, ADIR68, ADIR74, ADIR80, ADIR83) were selected and characterized with high binding affinity and specificity to the RBD of the spike protein. Aptamers (ADI25, ADI2009, ADI203L) were able to bind and pull down endogenous spike protein expressed on the surface of SARS-CoV-2 virus in COVID-19 positive patient samples and determined by liquid chromatography- tandem mass spectrometry analysis (LC-MS/MS). LC-MS/MS data confirmed that aptamers can bind to the RBD of the spike protein. Furthermore, results indicated that the combination of the 9 best aptamers inhibited the binding of the purified trimer spike protein to the ACE-2 receptor found on the surface of Vero E6 cells. In the same experiment, the combined aptamers displayed a better neutralizing effect than antibodies. The data suggests that the selected aptamers could be used in therapy to neutralize the effect of the SARS-CoV-2 virus by inhibiting the interaction between the RBD and ACE-2 receptor, preventing viral entry into target cells and therefore blocking viral replication.Keywords: aptamer, ACE-2 receptor, binding inhibitor, COVID-19, spike protein, SARS-CoV-2, treatment
Procedia PDF Downloads 1881812 Anthropometric Indices of Obesity and Coronary Artery Atherosclerosis: An Autopsy Study in South Indian population
Authors: Francis Nanda Prakash Monteiro, Shyna Quadras, Tanush Shetty
Abstract:
The association between human physique and morbidity and mortality resulting from coronary artery disease has been studied extensively over several decades. Multiple studies have also been done on the correlation between grade of atherosclerosis, coronary artery diseases and anthropometrical measurements. However, the number of autopsy-based studies drastically reduces this number. It has been suggested that while in living subjects, it would be expensive, difficult, and even harmful to subject them to imaging modalities like CT scans and procedures involving contrast media to study mild atherosclerosis, no such harm is encountered in study of autopsy cases. This autopsy-based study was aimed to correlate the anthropometric measurements and indices of obesity, such as waist circumference (WC), hip circumference (HC), body mass index (BMI) and waist hip ratio (WHR) with the degree of atherosclerosis in the right coronary artery (RCA), main branch of the left coronary artery (LCA) and the left anterior descending artery (LADA) in 95 South Indian origin victims of both the genders between the age of 18 years and 75 years. The grading of atherosclerosis was done according to criteria suggested by the American Heart Association. The study also analysed the correlation of the anthropometric measurements and indices of obesity with the number of coronaries affected with atherosclerosis in an individual. All the anthropometric measurements and the derived indices were found to be significantly correlated to each other in both the genders except for the age, which is found to have a significant correlation only with the WHR. In both the genders severe degree of atherosclerosis was commonly observed in LADA, followed by LCA and RCA. Grade of atherosclerosis in RCA is significantly related to the WHR in males. Grade of atherosclerosis in LCA and LADA is significantly related to the WHR in females. Significant relation was observed between grade of atherosclerosis in RCA and WC, and WHR, and between grade of atherosclerosis in LADA and HC in males. Significant relation was observed between grade of atherosclerosis in RCA and WC, and WHR, and between grade of atherosclerosis in LADA and HC in females. Anthropometric measurements/indices of obesity can be an effective means to identify high risk cases of atherosclerosis at an early stage that can be effective in reducing the associated cardiac morbidity and mortality. A person with anthropometric measurements suggestive of mild atherosclerosis can be advised to modify his lifestyle, along with decreasing his exposure to the other risk factors. Those with measurements suggestive of higher degree of atherosclerosis can be subjected to confirmatory procedures to start effective treatment.Keywords: atherosclerosis, coronary artery disease, indices, obesity
Procedia PDF Downloads 711811 Learning Gains and Constraints Resulting from Haptic Sensory Feedback among Preschoolers' Engagement during Science Experimentation
Authors: Marios Papaevripidou, Yvoni Pavlou, Zacharias Zacharia
Abstract:
Embodied cognition and additional (touch) sensory channel theories indicate that physical manipulation is crucial to learning since it provides, among others, touch sensory input, which is needed for constructing knowledge. Given these theories, the use of Physical Manipulatives (PM) becomes a prerequisite for learning. On the other hand, empirical research on Virtual Manipulatives (VM) (e.g., simulations) learning has provided evidence showing that the use of PM, and thus haptic sensory input, is not always a prerequisite for learning. In order to investigate which means of experimentation, PM or VM, are required for enhancing student science learning at the kindergarten level, an empirical study was conducted that sought to investigate the impact of haptic feedback on the conceptual understanding of pre-school students (n=44, age mean=5,7) in three science domains: beam balance (D1), sinking/floating (D2) and springs (D3). The participants were equally divided in two groups according to the type of manipulatives used (PM: presence of haptic feedback, VM: absence of haptic feedback) during a semi-structured interview for each of the domains. All interviews followed the Predict-Observe-Explain (POE) strategy and consisted of three phases: initial evaluation, experimentation, final evaluation. The data collected through the interviews were analyzed qualitatively (open-coding for identifying students’ ideas in each domain) and quantitatively (use of non-parametric tests). Findings revealed that the haptic feedback enabled students to distinguish heavier to lighter objects when held in hands during experimentation. In D1 the haptic feedback did not differentiate PM and VM students' conceptual understanding of the function of the beam as a mean to compare the mass of objects. In D2 the haptic feedback appeared to have a negative impact on PM students’ learning. Feeling the weight of an object strengthen PM students’ misconception that heavier objects always sink, whereas the scientifically correct idea that the material of an object determines its sinking/floating behavior in the water was found to be significantly higher among the VM students than the PM ones. In D3 the PM students outperformed significantly the VM students with regard to the idea that the heavier an object is the more the spring will expand, indicating that the haptic input experienced by the PM students served as an advantage to their learning. These findings point to the fact that PMs, and thus touch sensory input, might not always be a requirement for science learning and that VMs could be considered, under certain circumstances, as a viable means for experimentation.Keywords: haptic feedback, physical and virtual manipulatives, pre-school science learning, science experimentation
Procedia PDF Downloads 1421810 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 2561809 Improving the Quality of Staff Performance with a Talent-Driven Approach: Case Study of SAIPA Automotive Manufacturing Company in Iran
Authors: Abdolmajid Mosleh, Afzal Ghasimi
Abstract:
The purpose of this research is to investigate and identify effective factors that can improve the quality of personal performance in industrial companies. In the present study, it was assumed that the hidden variables of talent management could be explained by an important part of the variance in improving the quality of employee performance. This research is targeted in terms of applied research. The statistical population of the research is SAIPA automobile company with a number (N=10291); the sample of 380 people was selected based on the Cochran formula in a random sampling method among employed people. The measurement tool in this research was a questionnaire of 33 items with a control questionnaire that included two talent management departments (talent identification and talent exploitation) and improvements in staff performance (enhancement of technical and specialized capabilities, managerial capability, organizational interaction, and communication). The reliability of the internal consistency method was confirmed by the Cronbach's alpha coefficient and the two half-ways. In order to determine the validity of the questionnaire structure, confirmatory factor analysis was used. Based on the results of the data analysis, the effect of talent management on improving the quality of staff performance was confirmed. Based on the results of inferential statistics and structural equations of the proposed model, it had high fitness.Keywords: employee performance, talent management, performance improvement, SAIPA automobile manufacturing company
Procedia PDF Downloads 94