Search results for: internet service provider
4661 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things
Authors: Wei Hu, Wenguang Chen, Chong Dong
Abstract:
In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management
Procedia PDF Downloads 1254660 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 1354659 Opportunities for Effective Communication Through the Delivery of an Autism Spectrum Disorder Diagnosis: A Scoping Review
Authors: M. D. Antoine
Abstract:
When a child is diagnosed with an illness, condition, or developmental disorder, the process involved in understanding and accepting this diagnosis can be a very stressful and isolating experience for parents and families. The healthcare providers’ ability to effectively communicate in such situations represents a vital lifeline for parents. In this context, communication becomes a crucial element not only for getting through the period of grief but also for the future. We mobilized the five stages of grief model to summarize existing literature regarding the ways in which the experience ofan autism spectrum disorder diagnosis disclosurealigns with the experience of grief to explore how this can inform best practices for effective communication with parents through the diagnosis disclosure. Fifteen publications met inclusion criteria. Findings from the scoping review of empirical studies show that parents/families experience grief-like emotions during the diagnosis disclosure. However, grief is not an outcome of the encounter itself. In fact, the experience of the encounter can help mitigate the grief experience. The way parents/families receive and react to the ‘news’ depends on their preparedness, knowledge, and the support received through the experience. Individual communication skills, as well as policies and regulations, should be examined to alleviate adverse reactions in this context. These findings highlight the importance of further research into effective parent-provider communication strategies and their place in supporting quality autism care.Keywords: autism spectrum disorder, autism spectrum disorder diagnosis, diagnosis disclosure, parent-provider communication, parental grief
Procedia PDF Downloads 1764658 Bridging the Digital Divide in India: Issus and Challenges
Authors: Parveen Kumar
Abstract:
The cope the rapid change of technology and to control the ephemeral rate of information generation, librarians along with their professional colleagues need to equip themselves as per the requirement of the electronic information society. E-learning is purely based on computer and communication technologies. The terminologies like computer based learning. It is the delivery of content via all electronic media through internet, internet, Extranets television broadcast, CD-Rom documents, etc. E-learning poses lot of issues in the transformation of literature or knowledge from the conventional medium to ICT based format and web based services.Keywords: e-learning, digital libraries, online learning, electronic information society
Procedia PDF Downloads 5104657 Business Marketing Researches and Analysis Effect on Production
Authors: Mirna John Shawky Demian
Abstract:
Internal marketing changed into proposed in the 1970s. The idea has continually been modified over the last forty years. This study discussed the subsequent troubles: the definition and implication of internal advertising, the improvement of its development, and the evolution of its theoretical version. Moreover, the study systematically organized the strategies of the inner advertising and marketing principles adopted in an organization and the way they were positioned in exercise. Also, in contrast, the empirical research focuses on how the existent theories prompted the essential variables of internal marketing. The results of this are predicted to serve as references for future exploration of the boundary and research aiming at how internal advertising and marketing are applied to one-of-a-kind styles of organizations. Information technology (IT) has prevailed over all capabilities of strategic and operational control. The internet has increasingly grown to be a famous medium for advertising and marketing. This paper examines the potential of the internet for tourism marketing. To acquire this, the paper examines the characteristics of tourism advertising and examines the application of the Internet in tourism advertising. It's far argued that using the internet for tourism advertising will now not only reach a wide target audience and reduce the price of transactions (with the aid of traditional strategies utilized by journey agents in instances past) but will even alleviate the problems of identity, authentication and affirmation of travels/package deal excursions by way of travelers as well as advertising of tourism enterprises.Keywords: direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools
Procedia PDF Downloads 104656 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1574655 Online Teacher Professional Development: An Extension of the Unified Theory of Acceptance and Use of Technology Model
Authors: Lovemore Motsi
Abstract:
The rapid pace of technological innovation, along with a global fascination with the internet, continues to result in a dominating call to integrate internet technologies in institutions of learning. However, the pressing question remains – how can online in-service training for teachers, support quality and success in professional development programmers. The aim of this study was to examine an integrated model that extended the Unified Theory of Acceptance and Use of Technology (UTAUT) with additional constructs – including attitude and behaviour intention – adopted from the Theory of Planned Behaviour (TPB) to answer the question. Data was collected from secondary school teachers at 10 selected schools in the Tshwane South district by means of the Statistical Package for Social Scientists (SPSS v 23.0), and the collected data was analysed quantitatively. The findings are congruent with model testing under conditions of volitional usage behaviour. In this regard, the role of facilitating condition variables is insignificant as a determinant of usage behaviour. Social norm variables also proved to be a weak determinant of behavioural intentions. Findings demonstrate that effort expectancy is the key determinant of online INSET usage. Based on these findings, the variable social influence and facilitating conditions are important factors in ensuring the acceptance of online INSET among teachers in selected secondary schools in the Tshwane South district.Keywords: unified theory of acceptance and use of technology (UTAUT), teacher professional development, secondary schools, online INSET
Procedia PDF Downloads 2174654 Service Blueprint for Improving Clinical Guideline Adherence via Mobile Health Technology
Authors: Y. O’Connor, C. Heavin, S. O’ Connor, J. Gallagher, J. Wu, J. O’Donoghue
Abstract:
Background: To improve the delivery of paediatric healthcare in resource-poor settings, Community Health Workers (CHW) have been provided with a paper-based set of protocols known as Community Case Management (CCM). Yet research has shown that CHW adherence to CCM guidelines is poor, ultimately impacting health service delivery. Digitising the CCM guidelines via mobile technology is argued in extant literature to improve CHW adherence. However, little research exist which outlines how (a) this process can be digitised and (b) adherence could be improved as a result. Aim: To explore how an electronic mobile version of CCM (eCCM) can overcome issues associated with the paper-based CCM protocol (poor adherence to guidelines) vis-à-vis service blueprinting. This service blueprint will outline how (a) the CCM process can be digitised using mobile Clinical Decision Support Systems software to support clinical decision-making and (b) adherence can be improved as a result. Method: Development of a single service blueprint for a standalone application which visually depicts the service processes (eCCM) when supporting the CHWs, using an application known as Supporting LIFE (Low cost Intervention For disEase control) as an exemplar. Results: A service blueprint is developed which illustrates how the eCCM solution can be utilised by CHWs to assist with the delivery of healthcare services to children. Leveraging smartphone technologies can (a) provide CHWs with just-in-time data to assist with their decision making at the point-of-care and (b) improve CHW adherence to CCM guidelines. Conclusions: The development of the eCCM opens up opportunities for the CHWs to leverage the inherent benefit of mobile devices to assist them with health service delivery in rural settings. To ensure that benefits are achieved, it is imperative to comprehend the functionality and form of the eCCM service process. By creating such a service blueprint for an eCCM approach, CHWs are provided with a clear picture regarding the role of the eCCM solution, often resulting in buy-in from the end-users.Keywords: adherence, community health workers, developing countries, mobile clinical decision support systems, CDSS, service blueprint
Procedia PDF Downloads 4154653 Development of Modular Shortest Path Navigation System
Authors: Nalinee Sophatsathit
Abstract:
This paper presents a variation of navigation systems which tallies every node along the shortest path from start to destination nodes. The underlying technique rests on the well-established Dijkstra Algorithm. The ultimate goal is to serve as a user navigation guide that furnishes stop over cost of every node along this shortest path, whereby users can decide whether or not to visit any specific nodes. The output is an implementable module that can be further refined to run on the Internet and smartphone technology. This will benefit large organizations having physical installations spreaded over wide area such as hospitals, universities, etc. The savings on service personnel, let alone lost time and unproductive work, are attributive to innovative navigation system management.Keywords: navigation systems, shortest path, smartphone technology, user navigation guide
Procedia PDF Downloads 3394652 The Relationship between Incidental Emotions, Risk Perceptions and Type of Army Service
Authors: Sharon Garyn-Tal, Shoshana Shahrabani
Abstract:
Military service in general, and in combat units in particular, can be physically and psychologically stressful. Therefore, type of service may have significant implications for soldiers during and after their military service including emotions, judgments and risk perceptions. Previous studies have focused on risk propensity and risky behavior among soldiers, however there is still lack of knowledge on the impact of type of army service on risk perceptions. The current study examines the effect of type of army service (combat versus non-combat service) and negative incidental emotions on risk perceptions. In 2014 a survey was conducted among 153 combat and non-combat Israeli soldiers. The survey was distributed in train stations and central bus stations in various places in Israel among soldiers waiting for the train/bus. Participants answered questions related to the levels of incidental negative emotions they felt, to their risk perceptions (chances to be hurt by terror attack, by violent crime and by car accident), and personal details including type of army service. The data in this research is unique because military service in Israel is compulsory, so that the Israeli population serving in the army is wide and diversified. The results indicate that currently serving combat participants were more pessimistic in their risk perceptions (for all type of risks) compared to the currently serving non-combat participants. Since combat participants probably experienced severe and distressing situations during their service, they became more pessimistic regarding their probabilities of being hurt in different situations in life. This result supports the availability heuristic theory and the findings of previous studies indicating that those who directly experience distressing events tend to overestimate danger. The findings also indicate that soldiers who feel higher levels of incidental fear and anger have pessimistic risk perceptions. In addition, respondents who experienced combat army service also have pessimistic risk perceptions if they feel higher levels of fear. In addition, the findings suggest that higher levels of the incidental emotions of fear and anger are related to more pessimistic risk perceptions. These results can be explained by the compulsory army service in Israel that constitutes a focused threat to soldiers' safety during their period of service. Thus, in this stressful environment, negative incidental emotions even during routine times correlate with higher risk perceptions. In conclusion, the current study results suggest that combat army service shapes risk perceptions and the way young people control their negative incidental emotions in everyday life. Recognizing the factors affecting risk perceptions among soldiers is important for better understanding the impact of army service on young people.Keywords: army service, combat soldiers, incidental emotions, risk perceptions
Procedia PDF Downloads 2354651 A Controlled Natural Language Assisted Approach for the Design and Automated Processing of Service Level Agreements
Authors: Christopher Schwarz, Katrin Riegler, Erwin Zinser
Abstract:
The management of outsourcing relationships between IT service providers and their customers proofs to be a critical issue that has to be stipulated by means of Service Level Agreements (SLAs). Since service requirements differ from customer to customer, SLA content and language structures vary largely, standardized SLA templates may not be used and an automated processing of SLA content is not possible. Hence, SLA management is usually a time-consuming and inefficient manual process. For overcoming these challenges, this paper presents an innovative and ITIL V3-conform approach for automated SLA design and management using controlled natural language in enterprise collaboration portals. The proposed novel concept is based on a self-developed controlled natural language that follows a subject-predicate-object approach to specify well-defined SLA content structures that act as templates for customized contracts and support automated SLA processing. The derived results eventually enable IT service providers to automate several SLA request, approval and negotiation processes by means of workflows and business rules within an enterprise collaboration portal. The illustrated prototypical realization gives evidence of the practical relevance in service-oriented scenarios as well as the high flexibility and adaptability of the presented model. Thus, the prototype enables the automated creation of well defined, customized SLA documents, providing a knowledge representation that is both human understandable and machine processable.Keywords: automated processing, controlled natural language, knowledge representation, information technology outsourcing, service level management
Procedia PDF Downloads 4334650 Effect of Prophylactic Oxytocin Therapy on Duration of Retained Fetal Membrane (RFM) in Periparturient Dairy Cows
Authors: Hamid Ghasemzadeh- Nava, Maziar Kaveh Baghbadorani, Amin Tamadon
Abstract:
Considering response of uterus to ecbolic effect of oxytocin near the time of parturition, this study was done for investigating the effect of prophylactic administration of this hormone on duration of fetal membrane retention, time interval to first detectable estrus, time interval to first service, and conception rate at first service in cases of both normal parturition and dystocia. For this reason cows with (n=18) and without (n=18) dystocia assigned randomly to treatment (n=12) or control (n=6) groups and received intramuscular injection of 100 IU of oxytocin or 10 mL of normal saline respectively. Further observations and investigations indicate that duration of fetal retention is significantly shorter in treatment group cows compared to control groups, regardless of having dystocia (P=0.002) or normal spontaneous calving (P=0.001). The same trend exists for conception rate at first service in which cows in treatment groups had significantly higher conception rate (CR) in comparison to cows in control groups with (P=0.0003) or without dystocia (P=0.017). The time interval to first detected heat and first service didn’t show any difference between groups.Keywords: conception rate, oxytocin, RFM, time to first service
Procedia PDF Downloads 4374649 The Service Appraisal of Soldiers of the Army of the Czech Republic in the Context of Personal Expenses
Authors: Tereza Dolečková
Abstract:
Following article provides the comparison of international norms and standards formulating personal expenses, and then it illustrates the national concept of personal expenses of the Ministry of Defence. Then a new salary system of soldiers and the importance of the service appraisal in the context of personal expenses of the Ministry of Defence are explained. The first part of the article includes formulation of the approach to the definition of personal expenses within the international norms and standards and also within the Ministry of Defence of the Czech Republic. The structure of employees of the Ministry of Defence of the Czech Republic in years 2012 – 2014 and the amount of military expenses and the share of salary expenses of the Ministry of total expenses of the Ministry are clarified there, also the comparison of the amount of military expenses in chosen member states of the North Atlantic Treaty Organization is done. The salary system of professional soldiers in connection with the amendment of the Act No. 221/1999 Coll. on Professional Soldiers is clarified in the second part of this article. The amendment significantly regulates the salary items of soldiers but changes are also in the service appraisal of soldiers which reflects one of seven salary items of soldiers – the performance bonus. The aim of this article is to clarify different approach to define personal expenses with emphasis on the Ministry of Defence of the Czech Republic which overlaps to the service appraisal of soldiers of the Army of the Czech Republic and their salary system in connection with personal expenses of the Ministry of Defence of the Czech Republic. The efficient and objective system of the service appraisal and the use of its results are connected to the principles of the career advancement; only the best soldiers can advance in the system of the service careers to higher positions. That is why it is necessary to improve the service appraisal so it would provide the maximum information about the performance of a soldier and it would also motivate the soldier in his development. The attention should be paid to the service appraisal of the soldiers of the Army of the Czech Republic to achieve as much objectivity as possible.Keywords: career, human resource management and development, personal expenses, salary system of soldiers, service appraisal of soldiers, the Army of the Czech Republic
Procedia PDF Downloads 2504648 Pre-Service Teachers’ Experiences and Attitude towards Children’s Problem Solving Strategies in Early Mathematics Learning
Authors: Temitayo Ogunsanwo
Abstract:
Problem-solving is an important way of learning way of learning because it propels children to use previous experiences to deal with new situations. The purpose of this study is to find out the attitude of pre-service teachers to problem-solving as a strategy for promoting early mathematics learning in children. This qualitative study employed a descriptive design to investigate the experiences of twenty second-year undergraduate early childhood education Pre-service teachers in a teaching practice and their attitude towards five-year-old children’s problem-solving strategies in mathematics. Pre-service teachers were exposed to different strategies for teaching children how to solve problems in mathematics. They were taken through a micro teaching in class using different strategies to teach problem-solving in different topics in the five-year-old mathematics curriculum. The students were then made to teach five-year-olds in neighbouring schools for three weeks, working in pairs, observing and recording children’s problem-solving activities and strategies. After the three weeks exercise, their experiences and attitude towards children’s problem-solving strategies were collected using open-ended questions and analysed in themes. Findings were discussed.Keywords: attitude, early mathematics learning, experience, pre-service teachers, problem-solving, strategies
Procedia PDF Downloads 3484647 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape
Authors: Sandesh Achar
Abstract:
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management
Procedia PDF Downloads 984646 Person-Centered Thinking as a Fundamental Approach to Improve Quality of Life
Authors: Christiane H. Kellner, Sarah Reker
Abstract:
The UN-Convention on the Rights of Persons with Disabilities, which Germany also ratified, postulates the necessity of user-centred design, especially when it comes to evaluating the individual needs and wishes of all citizens. Therefore, a multidimensional approach is required. Based on this insight, the structure of the town-like centre in Schönbrunn - a large residential complex and service provider for persons with disabilities in the outskirts of Munich - will be remodelled to open up the community to all people as well as transform social space. This strategy should lead to more equal opportunities and open the way for a much more diverse community. The research project “Index for participation development and quality of life for persons with disabilities” (TeLe-Index, 2014-2016), which is anchored at the Technische Universität München in Munich and at the Franziskuswerk Schönbrunn supports this transformation process called “Vision 2030”. In this context, we have provided academic supervision and support for three projects (the construction of a new school, inclusive housing for children and teenagers with disabilities and the professionalization of employees using person-centred planning). Since we cannot present all the issues of the umbrella-project within the conference framework, we will be focusing on one sub-project more in-depth, namely “The Person-Centred Think Tank” [Arbeitskreis Personenzentriertes Denken; PZD]. In the context of person-centred thinking (PCT), persons with disabilities are encouraged to (re)gain or retain control of their lives through the development of new choice options and the validation of individual lifestyles. PCT should thus foster and support both participation and quality of life. The project aims to establish PCT as a fundamental approach for both employees and persons with disabilities in the institution through in-house training for the staff and, subsequently, training for users. Hence, for the academic support and supervision team, the questions arising from this venture can be summed up as follows: (1) has PCT already gained a foothold at the Franziskuswerk Schönbrunn? And (2) how does it affect the interaction with persons with disabilities and how does it influence the latter’s everyday life? According to the holistic approach described above, the target groups for this study are both the staff and the users of the institution. Initially, we planned to implement the group discussion method for both target-groups. However, in the course of a pretest with persons with intellectual disabilities, it became clear that this type of interview, with hardly any external structuring, provided only limited feedback. In contrast, when the discussions were moderated, there was more interaction and dialogue between the interlocutors. Therefore, for this target-group, we introduced structured group interviews. The insights we have obtained until now will enable us to present the intermediary results of our evaluation. We analysed and evaluated the group interviews and discussions with the help of qualitative content analysis according to Mayring in order to obtain information about users’ quality of life. We sorted out the statements relating to quality of life obtained during the group interviews into three dimensions: subjective wellbeing, self-determination and participation. Nevertheless, the majority of statements were related to subjective wellbeing and self-determination. Thus, especially the limited feedback on participation clearly demonstrates that the lives of most users do not take place beyond the confines of the institution. A number of statements highlighted the fact that PCT is anchored in the everyday interactions within the groups. However, the implementation and fostering of PCT on a broader level could not be detected and thus remain further aims of the project. The additional interviews we have planned should validate the results obtained until now and open up new perspectives.Keywords: person-centered thinking, research with persons with disabilities, residential complex and service provider, participation, self-determination.
Procedia PDF Downloads 3234645 Investigating the Relationship between Service Quality and Amount of Violations in Community Pharmacies with Their Type of Ownership
Authors: Afshin Azari, Farzad Peiravian, Nazila Yousefi
Abstract:
Introduction: Community pharmacies have been always played an important role in public health. Therefore, having a decent service provided by these pharmacies is of paramount importance for the healthcare system. The issue of pharmacy ownership and its possible impact on the quality of services and amount of violations has been argued for many years, and there are different opinions around this debate. Since, so far, no scientific research has been performed to investigate this issue in Iran, this study aimed to examine the differences between these two types of pharmacies ownership in terms of violations and service quality. Method: This study investigates the impact of two different kinds of pharmacy ownership (pharmacists and non-pharmacist’s ownership) on the pharmacies’ amount of violations and services quality. Pharmacies’ amount of violations was examined using “pharmacy inspection reports” between September 2018 and September 2019, in their distinguishable categories: minor, major and critical violations. Then, service quality was examined using a questionnaire from the perspective of pharmacy customers. Results: Considering violations, there was no evidence to prove a significant relationship between critical violations and major violations with the type of pharmacy ownership. However, in minor violations, the average of violations was higher in pharmacies owned by pharmacists in comparison to their non-pharmacist owned counterparts. Regarding service quality, the results showed that there is no significant relationship between the quality of service and the type of pharmacy ownership. Discussion and Conclusion: In this study, no significant relationship was found between the amount of violations and the type of pharmacy ownership. This could indicate that the pharmacy ownership would not influence the rate of violations. Considering that more inspections have been carried out in non-pharmacist owned pharmacies, it can be concluded that these pharmacies are more under control, and in fact, this monitoring has reduced violations in these pharmacies. The quality of services in the two types of pharmacies were not significantly different from each other, and this shows that non-pharmacist-owned pharmacies also try to maintain the desired level of service in competition with their competitors.Keywords: pharmacy ownership, quality of service, violation, community pharmacy
Procedia PDF Downloads 1714644 A Breakthrough Improvement Brought by Taxi-Calling APPs for Taxi Operation Level
Authors: Yuan-Lin Liu, Ye Li, Tian Xia
Abstract:
Taxi-calling APPs have been used widely, while brought both benefits and a variety of issues for the taxi market. Many countries do not know whether the benefits are remarkable than the issues or not. This paper established a comparison between the basic scenario (2009-2012) and a taxi-calling software usage scenario (2012-2015) to explain the impact of taxi-calling APPs. The impacts of taxi-calling APPs illustrated by the comparison results are: 1) The supply and demand distribution is more balanced, extending from the city center to the suburb. The availability of taxi service has been improved in low density areas, thin market attribute has also been improved; 2)The ratio of short distance taxi trip decreased, long distance service increased, the utilization of mileage increased, and the rate of empty decreased; 3) The popularity of taxi-calling APPs was able to reduce the average empty distance, cruise time, empty mileage rate and average times of loading passengers, can also enhance the average operating speed, improve the taxi operating level, and reduce social cost although there are some disadvantages. This paper argues that the taxi industry and government can establish an integrated third-party credit information platform based on credit evaluated by the data of the drivers’ driving behaviors to supervise the drivers. Taxi-calling APPs under fully covered supervision in the mobile Internet environment will become a new trend.Keywords: taxi, taxi-calling APPs, credit, scenario comparison
Procedia PDF Downloads 2564643 Students' Satisfaction towards the Counseling Services of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University
Authors: Weera Chotithammaporn, Bannasorn Santhan
Abstract:
The purpose of this study was to investigate the students’ satisfaction towards the counseling services of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University. The sample group consisted of 311 students coming for counseling services during September to October 2012 BE to complete the questionnaires developed by the researcher. The data were analyzed to find percentage, arithmetic mean, and SD, from which it can be concluded that: 1) Personal information including gender, GPA, department, year of the study, and hometown revealed that most of the students in the Faculty of Industrial Technology, Suan Sunandha Rajabhat University were female with the GPA between 2.01 and 2.50 and studied in the Department of Interior and Exhibition Design and Graphic and Multimedia Design. Most of them were in the first year of the study and came from the southern part of Thailand. 2) The level of students’ satisfaction towards the counseling services of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University was in overall at high level with the highest aspect on IT services followed by follow-up and evaluation service, counseling service, individual personal data collecting service, and personal placement service respectively.Keywords: satisfaction, students, counseling service, Faculty of Industrial Technology
Procedia PDF Downloads 2824642 English is Not Going to the Dog (E): Rising Fame of Doge Speak
Abstract:
Doge speak is an Internet variety with its own linguistic patterns and regularities. Doge meme contains some unconventional grammar rules which make it recognizable. With the use of doge corpus, certain characteristics of doge speak as well as reasons for its popularity are analyzed. The study concludes that doge memes can be applied to a variety of situations, for instance advertising or fashion industry. Doge users play with language and create surprising linguistic combinations. To sum up, doge meme making is a multiperson task. Doge users predict and comment on the world with the use of doge memes.Keywords: dogespeak, internet language, language play, meme
Procedia PDF Downloads 4794641 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 4884640 Logistics Information and Customer Service
Authors: Š. Čemerková, M. Wilczková
Abstract:
The paper deals with the importance of information flow for providing of defined level of customer service in the firms. Setting of the criteria for the selection and implementation of logistics information system is a prerequisite for ensuring of the flow of information in firms. The decision on the selection and implementation of logistics information system is linked to the investment costs and operating costs, which are included in the total logistics costs. The article also deals with the conclusions of the research focused on the logistics information system selection in companies in the Czech Republic.Keywords: customer service, information system, logistics, research
Procedia PDF Downloads 3634639 Using Educational Gaming as a Blended Learning Tool in South African Education
Authors: Maroonisha Maharajh
Abstract:
Based on the Black Swan and Disruptive Innovation Theories, this study proposes an educational game based learning model within the context of the traditional classroom learning environment. In the proposed model, the perceived e-learning component is decomposed into accessibility, perceived quality and perceived usability within the traditional rural classroom environment. A sample of 92 respondents took part in this study. The results suggest that users’ continuance intention is determined by both economic and grassroots internet accessibility, which in turn is jointly determined by perceived usefulness, information quality, service quality, system quality, perceived ease of use and cognitive absorption of learning.Keywords: blended learning, flipped classroom, e-learning, gaming
Procedia PDF Downloads 2554638 Integrated Best Worst PROMETHEE to Evaluate Public Transport Service Quality
Authors: Laila Oubahman, Duleba Szabolcs
Abstract:
Public transport stakeholders aim to increase the ridership ratio by encouraging citizens to use common transportation modes. For this sight, improving service quality is a crucial option to reach the quality desired by users and reduce the gap between desired and perceived quality. Multi-criteria decision aid has been applied in literature in recent decades because it provides efficient models to assess the most impacting criteria on the overall assessment. In this paper, the PROMETHEE method is combined with the best-worst approach to construct a consensual model that avoids rank reversal to support stakeholders in ameliorating service quality.Keywords: best-worst method, MCDA, PROMETHEE, public transport
Procedia PDF Downloads 2104637 Development of a Smart Liquid Level Controller
Authors: Adamu Mudi, Ibrahim Wahab Fawole, Abubakar Abba Kolo
Abstract:
In this research paper, we present a microcontroller-based liquid level controller that identifies the various levels of a liquid, carries out certain actions, and is capable of communicating with the human being and other devices through the GSM network. This project is useful in ensuring that a liquid is not wasted. It also contributes to the internet of things paradigm, which is the future of the internet. The method used in this work includes designing the circuit and simulating it. The circuit is then implemented on a solderless breadboard, after which it is implemented on a strip board. A C++ computer program is developed and uploaded into the microcontroller. This program instructs the microcontroller on how to carry out its actions. In other to determine levels of the liquid, an ultrasonic wave is sent to the surface of the liquid similar to radar or the method for detecting the level of sea bed. Message is sent to the phone of the user similar to the way computers send messages to phones of GSM users. It is concluded that the routine of observing the levels of a liquid in a tank, refilling the tank when the liquid level is too low can be entirely handled by a programmable device without wastage of the liquid or bothering a human being with such tasks.Keywords: Arduino Uno, HC-SR04 ultrasonic sensor, internet of things, IoT, SIM900 GSM module
Procedia PDF Downloads 1334636 Performance Analysis of the First-Order Characteristics of Polling System Based on Parallel Limited (K=1) Services Mode
Authors: Liu Yi, Bao Liyong
Abstract:
Aiming at the problem of low efficiency of pipelined scheduling in periodic query-qualified service, this paper proposes a system service resource scheduling strategy with parallel optimized qualified service polling control. The paper constructs the polling queuing system and its mathematical model; firstly, the first-order and second-order characteristic parameter equations are obtained by partial derivation of the probability mother function of the system state variables, and the complete mathematical, analytical expressions of each system parameter are deduced after the joint solution. The simulation experimental results are consistent with the theoretical calculated values. The system performance analysis shows that the average captain and average period of the system have been greatly improved, which can better adapt to the service demand of delay-sensitive data in the dense data environment.Keywords: polling, parallel scheduling, mean queue length, average cycle time
Procedia PDF Downloads 404635 Design and Implementation of a Geodatabase and WebGIS
Authors: Sajid Ali, Dietrich Schröder
Abstract:
The merging of internet and Web has created many disciplines and Web GIS is one these disciplines which is effectively dealing with the geospatial data in a proficient way. Web GIS technologies have provided an easy accessing and sharing of geospatial data over the internet. However, there is a single platform for easy and multiple accesses of the data lacks for the European Caribbean Association (Europaische Karibische Gesselschaft - EKG) to assist their members and other research community. The technique presented in this paper deals with designing of a geodatabase using PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS) for competent dissemination and management of spatial data and Web GIS by using OpenGeo Suite for the fast sharing and distribution of the data over the internet. The characteristics of the required design for the geodatabase have been studied and a specific methodology is given for the purpose of designing the Web GIS. At the end, validation of this Web based geodatabase has been performed over two Desktop GIS software and a web map application and it is also discussed that the contribution has all the desired modules to expedite further research in the area as per the requirements.Keywords: desktop GISSoftware, European Caribbean association, geodatabase, OpenGeo suite, postgreSQL/PostGIS, webGIS, web map application
Procedia PDF Downloads 3414634 Selecting Skyline Mash-Ups under Uncertainty
Authors: Aymen Gammoudi, Hamza Labbaci, Nizar Messai, Yacine Sam
Abstract:
Web Service Composition (Mash-up) has been considered as a new approach used to offer the user a set of Web Services responding to his request. These approaches can return a set of similar Mash-ups in a given context that makes users unable to select the perfect one. Recent approaches focus on computing the skyline over a set of Quality of Service (QoS) attributes. However, these approaches are not sufficient in a dynamic web service environment where the delivered QoS by a Web service is inherently uncertain. In this paper, we treat the problem of computing the skyline over a set of similar Mash-ups under certain dimension values. We generate dimensions for each Mash-up using aggregation operations applied to the QoS attributes. We then tackle the problem of computing the skyline under uncertain dimensions. We present each dimension value of mash-up using a frame of discernment and introduce the d-dominance using the Evidence Theory. Finally, we propose our experimental results that show both the effectiveness of the introduced skyline extensions and the efficiency of the proposed approaches.Keywords: web services, uncertain QoS, mash-ups, uncertain dimensions, skyline, evidence theory, d-dominance
Procedia PDF Downloads 2354633 Graph Planning Based Composition for Adaptable Semantic Web Services
Authors: Rihab Ben Lamine, Raoudha Ben Jemaa, Ikram Amous Ben Amor
Abstract:
This paper proposes a graph planning technique for semantic adaptable Web Services composition. First, we use an ontology based context model for extending Web Services descriptions with information about the most suitable context for its use. Then, we transform the composition problem into a semantic context aware graph planning problem to build the optimal service composition based on user's context. The construction of the planning graph is based on semantic context aware Web Service discovery that allows for each step to add most suitable Web Services in terms of semantic compatibility between the services parameters and their context similarity with the user's context. In the backward search step, semantic and contextual similarity scores are used to find best composed Web Services list. Finally, in the ranking step, a score is calculated for each best solution and a set of ranked solutions is returned to the user.Keywords: semantic web service, web service composition, adaptation, context, graph planning
Procedia PDF Downloads 5214632 A Study of Police Culture Themes Towards the Public Among South African Police Service
Authors: Nkosingiphile M. Mbhele, Jean Steyn
Abstract:
A focus group discussion was implemented, which comprised of senior South African Police Service managers and police academics in South Africa. The measurement of solidarity, isolation, and cynicism among functional South African Police Service officials and a thirty-item questionnaire came about by reviewing the literature. This research uses a survey format to assess the police culture theme of solidarity, isolation, and cynicism among South African Police Service officers in 9 South African provinces. Although a survey format is used in research, it engages in a quasi-experimental pre-test/post-test repeated measures research (longitudinal) design. Although there are differences among South African Police Service police (SAPS) officers, overall, there are signs of solidarity, isolation, and cynicism among SAPS members. Attitudes of solidarity, isolation, and cynicism are present among most police officials and have been presented from the start of training and held, maintained, or strengthened for the next years of their SAPS careers. This issue is problematic to society with regard to community-orientated policing since they have to interact with the members of the community. To author’s best knowledge, longitudinal studies of police culture are rare to find; not much has been researched on this topic. However, this paper offers to bridge that gap by providing answers to longitudinal police attitudes towards the public within the police culture themes of isolation and cynicism attitudes.Keywords: South African police service, police culture, solidarity, isolation, cynicism, public
Procedia PDF Downloads 153