Search results for: profit sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1648

Search results for: profit sharing

958 Community Forest Management Practice in Nepal: Public Understanding of Forest Benefit

Authors: Chandralal Shrestha

Abstract:

In the developing countries like Nepal, the community based forest management approach has often been glorified as one of the best forest management alternatives to maximize the forest benefits. Though the approach has succeeded to construct a local level institution and conserve the forest biodiversity, how the local communities perceived about the forest benefits, the question always remains silent among the researchers and policy makers. The paper aims to explore the understanding of forest benefits from the perspective of local communities who used the forests in terms of institutional stability, equity and livelihood opportunity, and ecological stability. The paper revealed that the local communities have mixed understanding over the forest benefits. The institutional and ecological activities carried out by the local communities indicated that they have better understanding over the forest benefits. However, inequality while sharing the forest benefits, low pricing strategy and its negative consequences in valuation of forest products and limited livelihood opportunities indicated the poor understanding.

Keywords: community based forest management, forest benefits, lowland, Nepal

Procedia PDF Downloads 317
957 Islamic Banking: An Ultimate Source of Financial Inclusion

Authors: Tasawar Nawaz

Abstract:

Promotion of socioeconomic justice through redistribution of wealth is one of the most salient features of Islamic economic system. Islamic financial institutions known as Islamic banks are used to implement this in practice under the guidelines of Islamic Shariah law. Islamic banking systems strive to promote and achieve financial inclusion among the society by offering interest-free banking and risk-sharing financing solutions. Shariah-compliant micro finance is one of the most popular financial instruments used by Islamic banks to enhance access to finance. Benevolent loan (or Qard-al-Hassanah) is one of the popular financial tools used by the Islamic banks to promote financial inclusion. This aspect of Islamic banking is empirically examined in this paper with specific reference to firm’s resources, largely defined here as intellectual capital. The paper finds that Islamic banks promote financial inclusion by exploiting available resources especially, the human intellectual capital.

Keywords: financial inclusion, intellectual capital, Qard-al-Hassanah, Islamic banking

Procedia PDF Downloads 323
956 Factors Influencing Disclosure and CSR Spending in Indian Companies: An Econometric Analysis

Authors: Shekar Babu, Amalendu Jyothishi

Abstract:

The New Companies Bill-2013 in India has mandated all the companies with a certain profit to spend on Corporate Social Responsibility (CSR). Despite the Corporate Governance (CG) compliances at the strategic level the firms have to engage in social good. For both the Central Public Sector Enterprises (CPSE) and the private companies in India the need for strategic CSR focus through operational efficiency measures are mandated. In this paper the focus is to find out if the Indian companies understand their responsibility towards the society despite government making CSR mandatory. Analyzing both the CPSEs and Private companies the researchers find out which set of companies behave responsibly towards the society. Does any particular industry group(s) impact the society by disclosing their CSR spending activities. The key financial and non-financial parameters that influence CSR spending were identified and through econometric analysis methodologies (logistic regression and OLS models) the results were analyzed. The innovative methods were developed to identify if the firms operate efficiently and at the same time complying with the new CSR laws. An innovative matrix was developed to explain how companies could operate efficiently and be compliant in parallel how some of the companies can strategically realign their spending by operating efficiently.

Keywords: corporate social responsibility(CSR), corporate governance(CG), India, logit function, ordinary least squares (OLS)

Procedia PDF Downloads 360
955 A Comparative Study on Indian and Greek Cotton Fiber Properties Correlations

Authors: Md. Nakib Ul Hasan, Md. Ariful Islam, Md. Sumon Miah, Misbah Ul Hoque, Bulbul Ahmed

Abstract:

The variability of cotton fiber characteristics has always been influenced by origin, weather conditions, method of culturing, and harvesting. Spinners work tirelessly to ensure consistent yarn quality by using the different origins of fibers to maximizes the profit margin. Spinners often fail to select desired raw materials of various origins to achieve an appropriate mixing plan due to the lack of knowledge on the interrelationship among fiber properties. The purpose of this research is to investigate the correlations among dominating fiber properties such as micronaire, strength, breaking elongation, upper half mean length, length uniformity index, short fiber index, maturity, reflectance, and yellowness. For this purpose, fiber samples from 500 Indian cotton bales and 350 Greek cotton bales were collected and tested using the high volume instrument (HVI). The fiber properties dataset was then compiled and analyzed using python 3.7 to determine the correlations matrix. Results show that Indian cotton fiber have highest correlation between strength-mat = 0.84, followed by SFI-Unf =-0.83, and Neps-Unf = -0.72. Greek cotton fiber, in contrast, have highest correlation between SFI-Unf =-0.98, followed by SFI-Mat = 0.89, +b-Len = 0.84, and Str-Mat = 0.74. Overall, the Greek cotton fiber showed a higher correlational matrix than compared to that of Indian cotton fiber.

Keywords: cotton fiber, fiber properties correlation, Greek cotton, HVI, Indian cotton, spinning

Procedia PDF Downloads 166
954 Sentiment Analysis on the East Timor Accession Process to the ASEAN

Authors: Marcelino Caetano Noronha, Vosco Pereira, Jose Soares Pinto, Ferdinando Da C. Saores

Abstract:

One particularly popular social media platform is Youtube. It’s a video-sharing platform where users can submit videos, and other users can like, dislike or comment on the videos. In this study, we conduct a binary classification task on YouTube’s video comments and review from the users regarding the accession process of Timor Leste to become the eleventh member of the Association of South East Asian Nations (ASEAN). We scrape the data directly from the public YouTube video and apply several pre-processing and weighting techniques. Before conducting the classification, we categorized the data into two classes, namely positive and negative. In the classification part, we apply Support Vector Machine (SVM) algorithm. By comparing with Naïve Bayes Algorithm, the experiment showed SVM achieved 84.1% of Accuracy, 94.5% of Precision, and Recall 73.8% simultaneously.

Keywords: classification, YouTube, sentiment analysis, support sector machine

Procedia PDF Downloads 112
953 Utilizing Grid Computing to Enhance Power Systems Performance

Authors: Rafid A. Al-Khannak, Fawzi M. Al-Naima

Abstract:

Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources.

Keywords: DeskGrid, Grid Server, idle contributor(s), grid computing, load forecasting

Procedia PDF Downloads 479
952 Gluteal Augmentation: A Historical Perspective on Society's Fascination with Buttock Size

Authors: Shane R. Jackson

Abstract:

Gluteal augmentation with fat grafting, commonly referred to as the Brazilian Butt Lift, is the fastest-growing cosmetic surgical procedure, despite the risks and controversy that surrounds it. While many commentators attribute this rise in popularity with current societal trends towards public sharing of private life, the fascination with buttock size is in fact a much older human trait. By searching beyond medical literature and delving into historical sources, from ancient civilisations, through the Renaissance and Victorian eras to the ‘Instagram generation’ of the present day, this paper examines the differences – and similarities – in society’s ideal buttock shape and size. Furthermore, the ways in which these various cultures have altered their appearance to achieve this ideal are also examined, looking at the influence of the broader historical context. A deeper understanding of the historical, cultural and psychosocial factors that influence a patient’s desire for buttock augmentation allows the clinician to formulate a well-rounded surgical plan.

Keywords: augmentation, Brazilian butt lift, buttock, fat graft, gluteal

Procedia PDF Downloads 203
951 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 361
950 Acid Injection PTFE Internal Lining in Raw Water System

Authors: Fikri Suwaileh

Abstract:

In the reverse osmosis (RO) water treatment plant, operation was suffering from several leaks on the acid injection point spool and downstream spools, due to insufficient injection monitoring and the coating failure leading to pin holes. The paper will go over the background of the leaks in the acid injection point, the process in the RO plant, the material, and coating used in the existing spools, the impact of these repeated leaks, the type of damage mechanism that occurred in the system due to the manner of acid injection and the heat in the spools, which lead to coating failure, leaks and water release. This paper will also look at the analysis, both the short- and long-term recommendations, and the utilization of Teflon internal lining to stop the leaks. Sharing this case study will enhance the knowledge of the importance of taking all factors that will lead to leaks in the acid injection points, along with the importance of utilizing the appropriate coating material lining to enhance the full system.

Keywords: corrosion, coating, raw water, lining

Procedia PDF Downloads 22
949 Leveraging Business to Business Collaborations to Optimize Reverse Haul Logistics

Authors: Pallav Singh, Rajesh Yabaji, Rajesh Dhir, Chanakya Hridaya

Abstract:

Supply Chain Costs for the Indian Industries have been on an exponential trend due to steep inflation on fundamental cost factors – Fuel, Labour, Rents. In this changing context organizations have been focusing on adopting multiple approaches to keep logistics costs under control to protect the profit margins. The lever of ‘Business to Business (B2B) collaboration’ can be used by organizations to garner higher value. Given the context of Indian Logistics Industry the penetration of B2B Collaboration initiatives have been limited. This paper outlines a structured framework for adoption of B2B collaboration through discussion of a successful initiative between ITC’s Leaf Tobacco Business and a leading Indian Media House. Multiple barriers to such a collaborative process exist which need to be addressed through comprehensive structured approaches. This paper outlines a generic framework approach to B2B collaboration for the Indian Logistics Space, outlining the guidelines for arriving at potential opportunities, identification of collaborators, effective tie-up process, design of operations and sustenance factors. The generic methods outlined can be used in any other industry and also builds a foundation for further research on many topics.

Keywords: business to business collaboration, reverse haul logistics, transportation cost optimization, exports logistics

Procedia PDF Downloads 331
948 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 392
947 Child Sexual Abuse Prevention: Evaluation of the Program “Sharing Mouth to Mouth: My Body, Nobody Can Touch It”

Authors: Faride Peña, Teresita Castillo, Concepción Campo

Abstract:

Sexual violence, and particularly child sexual abuse, is a serious problem all over the world, México included. Given its importance, there are several preventive and care programs done by the government and the civil society all over the country but most of them are developed in urban areas even though these problems are especially serious in rural areas. Yucatán, a state in southern México, occupies one of the first places in child sexual abuse. Considering the above, the University Unit of Clinical Research and Victimological Attention (UNIVICT) of the Autonomous University of Yucatan, designed, implemented and is currently evaluating the program named “Sharing Mouth to Mouth: My Body, Nobody Can Touch It”, a program to prevent child sexual abuse in rural communities of Yucatán, México. Its aim was to develop skills for the detection of risk situations, providing protection strategies and mechanisms for prevention through culturally relevant psycho-educative strategies to increase personal resources in children, in collaboration with parents, teachers, police and municipal authorities. The diagnosis identified that a particularly vulnerable population were children between 4 and 10 years. The program run during 2015 in primary schools in the municipality whose inhabitants are mostly Mayan. The aim of this paper is to present its evaluation in terms of its effectiveness and efficiency. This evaluation included documental analysis of the work done in the field, psycho-educational and recreational activities with children, evaluation of knowledge by participating children and interviews with parents and teachers. The results show high efficiency in fulfilling the tasks and achieving primary objectives. The efficiency shows satisfactory results but also opportunity areas that can be resolved with minor adjustments to the program. The results also show the importance of including culturally relevant strategies and activities otherwise it minimizes possible achievements. Another highlight is the importance of participatory action research in preventive approaches to child sexual abuse since by becoming aware of the importance of the subject people participate more actively; in addition to design culturally appropriate strategies and measures so that the proposal may not be distant to the people. Discussion emphasizes the methodological implications of prevention programs (convenience of using participatory action research (PAR), importance of monitoring and mediation during implementation, developing detection skills tools in creative ways using psycho-educational interactive techniques and working assessment issued by the participants themselves). As well, it is important to consider the holistic character this type of program should have, in terms of incorporating social and culturally relevant characteristics, according to the community individuality and uniqueness, consider type of communication to be used and children’ language skills considering that there should be variations strongly linked to a specific cultural context.

Keywords: child sexual abuse, evaluation, PAR, prevention

Procedia PDF Downloads 297
946 Cakrawala Baca Transformation Model into Social Enterprise: A Benchmark Approach from Socentra Agro Mandiri (SAM) and Agritektur

Authors: Syafinatul Fitri

Abstract:

Cakrawala Baca is one of social organization in Indonesia that realize to transform its organization into social enterprise to create more sustainable organization that result more sustainable social impact. Cakrawala Baca implements voluntary system for its organization and it has passive social target. It funds its program by several fund rising activities that depend on donors or sponsor. Therefore social activity that held does not create sustainable social impact. It is different with social enterprise that usually more independent in funding its activity through social business and implement active social target and professional work for organization member. Therefore social enterprise can sustain its organization and then able to create sustainable social impact. Developing transformation model from social movement into social enterprise is the focus of this study. To achieve the aim of study, benchmark approach from successful social enterprise in Indonesia that has previously formed as social movement is employed. The benchmark is conducted through internal and external scanning that result the understanding of how they transformed into social enterprise. After understanding SAM and Agritektur transformation, transformation pattern is formulated based on their transformation similarities. This transformation pattern will be implemented to formulate the transformation plan for Cakrawala Baca to be a social enterprise.

Keywords: social movement/social organization, non-profit organization (NPO), social enterprise, transformation, Benchmarks approach

Procedia PDF Downloads 514
945 Analysis of Transmedia Storytelling in Pokémon GO

Authors: Iva Nedelcheva

Abstract:

This study is part of a doctoral thesis on the topic of Hyperfiction: Past, Present and Future of Storytelling through Hypertext. It explores in depth the impact of transmedia storytelling and the role of hypertext in the realm of the currently popular social media phenomenon Pokémon GO. Storytelling is a powerful method to engage and unite people. Moreover, the technology progress adds a whole new angle to the method, with hypertext and cross-platform sharing that enhance the traditional storytelling so much that transmedia storytelling gives unlimited opportunities to affect the everyday life of people across the globe. This research aims at examining the transmedia storytelling approach in Pokémon GO, and explaining how that contributed to its establishment as a massive worldwide hit in less than a week. The social engagement is investigated in all major media platforms, including traditional and online media channels. Observation and content analyses are reported in this paper to form the conclusion that transmedia storytelling with the input of hypertext has a promising future as a method of establishing a productive and rewarding communication strategy.

Keywords: communication, hypertext, Pokemon Go, storytelling, transmedia

Procedia PDF Downloads 172
944 Innovation Ecosystems in Construction Industry

Authors: Cansu Gülser, Tuğce Ercan

Abstract:

The construction sector is a key driver of the global economy, contributing significantly to growth and employment through a diverse array of sub-sectors. However, it faces challenges due to its project-based nature, which often hampers long-term collaboration and broader incentives beyond individual projects. These limitations are frequently discussed in scientific literature as obstacles to innovation and industry-wide change. Traditional practices and unwritten rules further hinder the adoption of new processes within the construction industry. The disadvantages of the construction industry’s project-based structure in fostering innovation and long-term relationships include limited continuity, fragmented collaborations, and a focus on short-term goals, which collectively hinder the development of sustained partnerships, inhibit the sharing of knowledge and best practices, and reduce incentives for investing in innovative processes and technologies. This structure typically emphasizes specific projects, which restricts broader collaborations and incentives that extend beyond individual projects, thus impeding innovation and change. The temporal complexities inherent in project-based sectors like construction make it difficult to address societal challenges through collaborative efforts. Traditional management approaches are inadequate for scaling up innovations and adapting to significant changes. For systemic transformation in the construction sector, there is a need for more collaborative relationships and activities beyond traditional supply chains. This study delves into the concept of an innovation ecosystem within the construction sector, highlighting various research findings. It aims to explore key questions about the components that enhance innovation capacity, the relationship between a robust innovation ecosystem and this capacity, and the reasons why innovation is less prevalent and implemented in this sector compared to others. Additionally, it examines the main factors hindering innovation within companies and identifies strategies to improve these efforts, particularly in developing countries. The innovation ecosystem in the construction sector generates various outputs through interactions between business resources and external components. These outputs include innovative value creation, sustainable practices, robust collaborations, knowledge sharing, competitiveness, and advanced project management, all of which contribute significantly to company market performance and competitive advantage. This article offers insights and strategic recommendations for industry professionals, policymakers, and researchers interested in developing and sustaining innovation ecosystems in the construction sector. Future research should focus on broader samples for generalization, comparative sector analysis, and application-focused studies addressing real industry challenges. Additionally, studying the long-term impacts of innovation ecosystems, integrating advanced technologies like AI and machine learning into project management, and developing future application strategies and policies are also important.

Keywords: construction industry, innovation ecosystem, innovation ecosystem components, project management

Procedia PDF Downloads 40
943 Dogmatic Instrumant in Financing Micro Project

Authors: Adel Fatima Zohra, Guendouz Abdelkader

Abstract:

The solitary sector seems to appear nowadays as a third sector along the private and public ones, because of their ineptitude to take in charge the social exigency of the society regarding the lack in their local assets and the weakness of their financial institutions. The role of this sector is promoting a set of activities in the field of the charity, without aiming neither the individual profit nor a power practice. With the rise in the need of domestic resources, it is possible to count on the Zakat funding to realize some investment projects in order to develop the local society in many sectors as health, agriculture … etc. In the Islamic financial system, the Zakat is likely one of the most important instruments in financing the local development with the respect of the “Charia” rules: the amount of the Zakat is 2.5% of a wealth equivalent of each 85 gr of gold possessed since one year at least. In Algeria a fund of Zakat, was created since 2003 as an alternative to the public finding of development. This fund is a religious and social institution under the supervision of the ministry of religious affairs. This supervision covers two tasks: the first is traditional witch concern the distribution and the forwarding of the zakat to the poor people, and the second is modern concerning the financing of microcredits in the aim to enhance social and economic development. In this paper, we try to highlight the main role of the Zakat fund and its impact on the both social and economic development in Algeria.

Keywords: dogmatic instrument, solidary sector, zakat fund, micro project

Procedia PDF Downloads 279
942 Contagious Corporate Reputation Risk: Uncovering the Pandemic’s Impact

Authors: Yawen Xia, Rubi Yang, Jing Zhao

Abstract:

By using the Reputation Risk Index (RRI) to measure company environmental, social, and governance (ESG) activities, this research studies firms’ ESG comovement with their industry and local peers. This comovement is attenuated during the Covid-19 pandemic. Further analysis shows that corporate governance plays an important role in comovement decrease. We classify companies by region (city, state, region) and industry and calculate the average RRI of companies of the same type. We run separate regressions to test 1) industry comovement; 2) local comovement; 3) Covid-19 pandemic and reputation risk comovement; 4) corporate governance and reputation risk comovement. Our findings are consistent with previous literature that companies follow their industry and local counterparts in engaging in irresponsible activities and reducing ESG engagement. We speculate Covid shock led to a reduction in social activities and information sharing among enterprise managers, and comovement between enterprises, as a result, decreased during the pandemic.

Keywords: ESG, Covid, peer pressure, local comovement, corporate governance

Procedia PDF Downloads 147
941 Evaluating the ‘Assembled Educator’ of a Specialized Postgraduate Engineering Course Using Activity Theory and Genre Ecologies

Authors: Simon Winberg

Abstract:

The landscape of professional postgraduate education is changing: the focus of these programmes is moving from preparing candidates for a life in academia towards a focus of training in expert knowledge and skills to support industry. This is especially pronounced in engineering disciplines where increasingly more complex products are drawing on a depth of knowledge from multiple fields. This connects strongly with the broader notion of Industry 4.0 – where technology and society are being brought together to achieve more powerful and desirable products, but products whose inner workings also are more complex than before. The changes in what we do, and how we do it, has a profound impact on what industry would like universities to provide. One such change is the increased demand for taught doctoral and Masters programmes. These programmes aim to provide skills and training for professionals, to expand their knowledge of state-of-the-art tools and technologies. This paper investigates one such course, namely a Software Defined Radio (SDR) Master’s degree course. The teaching support for this course had to be drawn from an existing pool of academics, none of who were specialists in this field. The paper focuses on the kind of educator, a ‘hybrid academic’, assembled from available academic staff and bolstered by research. The conceptual framework for this paper combines Activity Theory and Genre Ecology. Activity Theory is used to reason about learning and interactions during the course, and Genre Ecology is used to model building and sharing of technical knowledge related to using tools and artifacts. Data were obtained from meetings with students and lecturers, logs, project reports, and course evaluations. The findings show how the course, which was initially academically-oriented, metamorphosed into a tool-dominant peer-learning structure, largely supported by the sharing of technical tool-based knowledge. While the academic staff could address gaps in the participants’ fundamental knowledge of radio systems, the participants brought with them extensive specialized knowledge and tool experience which they shared with the class. This created a complicated dynamic in the class, which centered largely on engagements with technology artifacts, such as simulators, from which knowledge was built. The course was characterized by a richness of ‘epistemic objects’, which is to say objects that had knowledge-generating qualities. A significant portion of the course curriculum had to be adapted, and the learning methods changed to accommodate the dynamic interactions that occurred during classes. This paper explains the SDR Masters course in terms of conflicts and innovations in its activity system, as well as the continually hybridizing genre ecology to show how the structuring and resource-dependence of the course transformed from its initial ‘traditional’ academic structure to a more entangled arrangement over time. It is hoped that insights from this paper would benefit other educators involved in the design and teaching of similar types of specialized professional postgraduate taught programmes.

Keywords: professional postgraduate education, taught masters, engineering education, software defined radio

Procedia PDF Downloads 94
940 Customer Experience Management in Food and Beverage Outlet at Indian School of Business: Methodology and Recommendations

Authors: Anupam Purwar

Abstract:

In conventional consumer product industry, stockouts are taken care by carrying buffer stock to check underserving caused by changes in customer demand, incorrect forecast or variability in lead times. But, for food outlets, the alternate of carrying buffer stock is unviable because of indispensable need to serve freshly cooked meals. Besides, the food outlet being the sole provider has no incentives to reduce stockouts, as they have no fear of losing revenue, gross profit, customers and market share. Hence, innovative, easy to implement and practical ways of addressing the twin problem of long queues and poor customer experience needs to be investigated. Current work analyses the demand pattern of 11 different food items across a routine day. Based on this optimum resource allocation for all food items has been carried out by solving a linear programming problem with cost minimization as the objective. Concurrently, recommendations have been devised to address this demand and supply side problem keeping in mind their practicability. Currently, the recommendations are being discussed and implemented at ISB (Indian School of Business) Hyderabad campus.

Keywords: F&B industry, resource allocation, demand management, linear programming, LP, queuing analysis

Procedia PDF Downloads 141
939 An Ethnographic Study: Ineffective Management of a Social Enterprise

Authors: Sylvia Acquah

Abstract:

The assumption that social enterprises are empowering has strong theoretical support, but empirical verification is anecdotal at best. Social enterprises blend social goal with an enterprising idea and therefore in theory these enterprises should provide meaningful jobs that are empowering. Whether jobs created are meaningful, or whether these organizations are practicing social entrepreneurship remains unexplored key questions. This paper addresses these key questions through a comprehensive literature review and an ethnographical study of a Domiciliary Home Care Social Enterprise in the UK. The social entrepreneurs, management and 9 staff members were observed, interviewed and achieves were reviewed and analyzed. In this study, the social entrepreneur’s vision was lost in transition during management change and the organization was only identified as a social enterprise by name. The organization that was set up to tackle lack of continuity in care and create a family of independent carers, was eventually closed down overnight and subjected to investigation by social services and the local council. Also, the ineffectiveness of the organization led to staff being stressed and without the support of the management to help rectify the issues; staff started displaying symptoms of burnout. Social enterprise managers should not only focus on profit maximization or generation, but should equally live up to the core tenets of the enterprise and effectively communicate and gain buy-in of all employees for any changes. Further, there ought to be an independent organization that regulates social enterprises to ensure that they are adhering to their social goals.

Keywords: ethnography, carer, social, enterprise

Procedia PDF Downloads 320
938 A Study on Game Theory Approaches for Wireless Sensor Networks

Authors: M. Shoukath Ali, Rajendra Prasad Singh

Abstract:

Game Theory approaches and their application in improving the performance of Wireless Sensor Networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality, etc. However, Game Theory is a field, which can efficiently use to analyze the WSNs. Game Theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of complex interactions among rational entities can be predicted by a set of analytical tools. However, the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing, etc.

Keywords: wireless sensor network, game theory, cooperative game theory, non-cooperative game theory

Procedia PDF Downloads 436
937 Repair Workshop Queue System Modification Using Priority Scheme

Authors: C. Okonkwo Ugochukwu, E. Sinebe Jude, N. Odoh Blessing, E. Okafor Christian

Abstract:

In this paper, a modification on repair workshop queuing system using multi priority scheme was carried out. Chi square goodness of fit test was used to determine the random distribution of the inter arrival time and service time of crankshafts that come for maintenance in the workshop. The chi square values obtained for all the prioritized classes show that the distribution conforms to Poisson distribution. The mean waiting time in queue results of non-preemptive priority for 1st, 2nd and 3rd classes show 0.066, 0.09, and 0.224 day respectively, while preemptive priority show 0.007, 0.036 and 0.258 day. However, when non priority is used, which obviously has no class distinction it amounts to 0.17 days. From the results, one can observe that the preemptive priority system provides a very dramatic improvement over the non preemptive priority as it concerns arrivals that are of higher priority. However, the improvement has a detrimental effect on the low priority class. The trend of the results is similar to the mean waiting time in the system as a result of addition of the actual service time. Even though the mean waiting time for the queue and that of the system for no priority takes the least time when compared with the least priority, urgent and semi-urgent jobs will terribly suffer which will most likely result in reneging or balking of many urgent jobs. Hence, the adoption of priority scheme in this type of scenario will result in huge profit to the Company and more customer satisfaction.

Keywords: queue, priority class, preemptive, non-preemptive, mean waiting time

Procedia PDF Downloads 399
936 A Comparison of Using English Language in Homestay Business between Samut Songkram, Thailand and Yangzhou, China

Authors: Panisa Panyalert

Abstract:

This research aims to study the difference between Thailand and China in using English language in the homestay business, and also promoting using English language in the Thai community for developing employees in the tourism business. Then, the two provinces which are Samut Songkram province, Thailand and Yangzhou province, China where English is not the official language can be occurred more problems and difficulties in the communication to foreign tourists. The study uses the questionnaire for collecting the data by distributing the questionnaire to the homestay’s staff both in Samut Songkram province, Thailand and Yangzhou province, China. The sample group is 100 homestays for each province. The method of participant as observer role is required to play during visiting each homestay. Due to the comparative of the research between Samut Songkram and Yangzhou homestays, there are two hypotheses, hypothesis one: there will be relationships between English using and the profit of a homestay, probability because if the homestay staff can speak English, there will be more travelers, especially foreigners come for staying, and hypothesis two: managers in Thailand may know more English than the Chinese homestay staff. The questionnaire is separated into three parts to answer the two hypotheses. The first part is about the general information of the informant, the second part is mainly concerned with the homestay business characteristics, and the third part is English language using. As a result, the research is clearly answered the second hypothesis which is Thai homestay is using more English language than Chinese homestay.

Keywords: English language, guesthouse, homestay, using English

Procedia PDF Downloads 253
935 An Understanding of Corporate Social Responsibility in State-Owned Enterprises: The Case of Zimbabwe Revenue Authority

Authors: Melody Mandevere, Roselyn Cheruiyot

Abstract:

Through Corporate Social Responsibility (CSR), organizations contribute to a stable environment that leads to a predictable climate for investment and trade. Organizations are now deviating from traditional CSR, where it was believed that the only responsibility of an organization is to meet its shareholder's needs. Organizations and society now believe that an organization has many stakeholders that it must satisfy for it to be viable. The function of State-Owned Enterprises (SOEs) is not profit making but providing service and accomplishing public policy objectives. SOEs demand consideration in the current economic climate because they represent an important part of the economies of many countries. Given the importance and complex relationship of the stakeholders in SOE, the paper seeks to examine how full name first Zimra is implementing its CSR activities. SOE managers are responsible for CSR implementation and stakeholder engagement. ZIMRA is one of the parastatals that plays a crucial role in the Zimbabwean economy. It is, therefore, important to understand how Zimra is implementing CSR. Qualitative research was used for the research. Interviews were contacted with Zimra managers to understand how they are implementing CSR. Although Zimra managers understand the CSR concept, the organization does not have a CSR strategy that includes their stakeholders, which may have a negative impact on stakeholder perception and the organization's reputation. The funding of the CSR strategy is also not sustainable.

Keywords: corporate social responsibility, managers, stakeholders, state-owned enterprises

Procedia PDF Downloads 96
934 Examining Media Literacy Strategies through Questionnaires and Analyzing the Behavioral Patterns of Middle-Aged and Elderly Persons

Authors: Chia Yen Li, Wen Huei Chou, Mieko Ohsuga, Tsuyoshi Inoue

Abstract:

The evolution of the digital age has led to people’s lives being pervaded by both facts and misinformation, challenging media literacy (ML). Middle-aged and elderly persons (MEPs) are prone to disseminating large amounts of misinformation, which often endangers their lives due to erroneously believing such information. At present, several countries have actively established fact-checking platforms to combat misinformation, but they are unable to keep pace with the rapid proliferation of such information on social media. In this study, the questionnaire survey method was used to collect data on MEPs’ behavior, cognition, attitudes, and concepts of social media when using a mobile instant messaging app called LINE; analyze their behavioral patterns and reasons for sharing misinformation; and summarize design strategies for improving their ML. The findings can serve as a reference in future related research.

Keywords: media literacy, middle-aged and elderly persons, social media, misinformation

Procedia PDF Downloads 113
933 Reliability Analysis of Computer Centre at Yobe State University Nigeria under Different Repair Policies

Authors: Vijay Vir Singh

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as local server). Observing the different possibilities of functioning of the CC, analysis has been done to evaluate the various reliability characteristics of the system. The system can completely fail due to failure of router, redundant server before repairing the mail server, and switch failure. The system can also partially fail when local server fails. The system can also fail completely due to a cooling failure, electricity failure or some natural calamity like earthquake, fire etc. All the failure rates are assumed to be constant while repair follows two types of distributions: general and Gumbel-Hougaard family copula.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 465
932 Identification of Effective Factors on Marketing Performance Management in Iran’s Airports and Air Navigation Companies

Authors: Morteza Hamidpour, Kambeez Shahroudi

Abstract:

The aim of this research was to identify the factors affecting the measurement and management of marketing performance in Iran's airports and air navigation companies (Economics in Air and Airport Transport). This study was exploratory and used a qualitative content analysis technique. The study population consisted of university professors in the field of air transportation and senior airport managers, with 15 individuals selected as samples using snowball technique. Based on the results, 15 main indicators were identified for measuring the marketing performance of Iran's airports and air navigation companies. These indicators include airport staff, general and operational expenses, annual passenger reception capacity, number of counter receptions and passenger dispatches, airport runway length, airline companies' loyalty to using airport space and facilities, regional market share of transit and departure flights, claims and net profit (aviation and non-aviation). By keeping the input indicators constant, the output indicators can be improved, enhancing performance efficiency and consequently increasing the economic situation in air transportation.

Keywords: air transport economics, marketing performance management, marketing performance input factors, marketing performance intermediary factors, marketing performance output factors, content analysis

Procedia PDF Downloads 72
931 Studying the Effects of Conditional Conservatism and Lack of Information Asymmetry on the Cost of Capital of the Accepted Companies in Tehran Stock Exchange

Authors: Fayaz Moosavi, Saeid Moradyfard

Abstract:

One of the methods in avoiding management fraud and increasing the quality of financial information, is the notification of qualitative features of financial information, including conservatism characteristic. Although taking a conservatism approach, while boosting the quality of financial information, is able to reduce the informational risk and the cost of capital stock of commercial department, by presenting an improper image about the situation of the commercial department, raises the risk of failure in returning the main and capital interest, and consequently the cost of capital of the commercial department. In order to know if conservatism finally leads to the increase or decrease of the cost of capital or does not have any influence on it, information regarding accepted companies in Tehran stock exchange is utilized by application of pooling method from 2007 to 2012 and it included 124 companies. The results of the study revealed that there is an opposite and meaningful relationship between conditional conservatism and the cost of capital of the company. In other words, if bad and unsuitable news and signs are reflected sooner than good news in accounting profit, the cost of capital of the company increases. In addition, there is a positive and meaningful relationship between the cost of capital and lack of information asymmetry.

Keywords: conditional conservatism, lack of information asymmetry, the cost of capital, stock exchange

Procedia PDF Downloads 267
930 Efficiency in Islamic Banks: Some Empirical Evidences in Indonesian Finance Market

Authors: Ahmed Sameer El Khatib

Abstract:

The aim of the present paper is to examine the revenue efficiency of the Indonesian Islamic banking sector. The study also seeks to investigate the potential internal (bank specific) and external (macroeconomic) determinants that influence the revenue efficiency of Indonesian domestic Islamic banks. We employ the whole gamut of domestic and foreign Islamic banks operating in the Indonesian Islamic banking sector during the period of 2009 to 2018. The level of revenue efficiency is computed by using the Data Envelopment Analysis (DEA) method. Furthermore, we employ a panel regression analysis framework based on the Ordinary Least Square (OLS) method to examine the potential determinants of revenue efficiency. The results indicate that the level of revenue efficiency of Indonesian domestic Islamic banks is lower compared to their foreign Islamic bank counterparts. We find that bank market power, liquidity, and management quality significantly influence the improvement in revenue efficiency of the Indonesian domestic Islamic banks during the period under study. By calculating these efficiency concepts, we can observe the efficiency levels of the domestic and foreign Islamic banks. In addition, by comparing both cost and profit efficiency, we can identify the influence of the revenue efficiency on the banks’ profitability.

Keywords: Islamic Finance, Islamic Banks, Revenue Efficiency, Data Envelopment Analysis

Procedia PDF Downloads 248
929 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 391