Search results for: recruitment technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8011

Search results for: recruitment technology

7321 Advances in the Design of Wireless Sensor Networks for Environmental Monitoring

Authors: Shathya Duobiene, Gediminas Račiukaitis

Abstract:

Wireless Sensor Networks (WSNs) are an emerging technology that opens up a new field of research. The significant advance in WSN leads to an increasing prevalence of various monitoring applications and real-time assistance in labs and factories. Selective surface activation induced by laser (SSAIL) is a promising technology that adapts to the WSN design freedom of shape, dimensions, and material. This article proposes and implements a WSN-based temperature and humidity monitoring system, and its deployed architectures made for the monitoring task are discussed. Experimental results of newly developed sensor nodes implemented in university campus laboratories are shown. Then, the simulation and the implementation results obtained through monitoring scenarios are displayed. At last, a convenient solution to keep the WSN alive and functional as long as possible is proposed. Unlike other existing models, on success, the node is self-powered and can utilise minimal power consumption for sensing and data transmission to the base station.

Keywords: IoT, network formation, sensor nodes, SSAIL technology

Procedia PDF Downloads 88
7320 The Affective Motivation of Women Miners in Ghana

Authors: Adesuwa Omorede, Rufai Haruna Kilu

Abstract:

Affective motivation (motivation that is emotionally laden usually related to affect, passion, emotions, moods) in the workplace stimulates individuals to reinforce, persist and commit to their task, which leads to the individual and organizational performance. This leads individuals to reach goals especially in situations where task are highly challenging and hostile. In such situations, individuals are more disposed to be more creative, innovative and see new opportunities from the loopholes in their workplace. However, when individuals feel displaced and less important, an adverse reaction may suffice which may be detrimental to the organization and its performance. One sector where affective motivation is eminently present and relevant, is the mining industry. Due to its intense work environment; mostly dominated by men and masculinity cultures; and deliberate exclusion of women in this environment which, makes the women working in these environments to feel marginalized. In Ghana, the mining industry is mostly seen as a very physical environment especially underground and mostly considerd as 'no place for a woman'. Despite the fact that these women feel less 'needed' or 'appreciated' in such environments, they still have to juggle between intense work shifts; face violence and other health risks with their families, which put a strain on their affective motivational reaction. Beyond these challenges, however, several mining companies in Ghana today are working towards providing a fair and equal working situation for both men and women miners, by recognizing them as key stakeholders, as well as including them in the stages of mining projects from the planning and designing phase to the evaluation and implementation stage. Drawing from the psychology and gender literature, this study takes a narrative approach to identify and understand the shifting gender dynamics within the mine works in Ghana, occasioning a change in background disposition of miners, which leads to more women taking up mine jobs in the country. In doing so, a qualitative study was conducted using semi-structured interviews from Ghana. Several women working within the mining industries in Ghana shared their experiences and how they felt and still feel in their workplace. In addition, archival documents were gathered to support the findings. The results suggest a change in enrolment regimes in a mining and technology university in Ghana, making room for a more gender equal enrolments in the university. A renowned university that train and feed mine work professional into the industry. The results further acknowledge gender equal and diversity recruitment policies and initiatives among the mining companies of Ghana. This study contributes to the psychology and gender literature by highlighting the hindrances women face in the mining industry as well as highlighting several of their affective reactions towards gender inequality. The study also provides several suggestions for decision makers in the mining industry of what can be done in the future to reduce the gender inequality gap within the industry.

Keywords: affective motivation, gender shape shifting, mining industry, women miners

Procedia PDF Downloads 301
7319 Research and Application of the Three-Dimensional Visualization Geological Modeling of Mine

Authors: Bin Wang, Yong Xu, Honggang Qu, Rongmei Liu, Zhenji Gao

Abstract:

Today's mining industry is advancing gradually toward digital and visual direction. The three dimensional visualization geological modeling of mine is the digital characterization of mineral deposit, and is one of the key technology of digital mine. The three-dimensional geological modeling is a technology that combines the geological spatial information management, geological interpretation, geological spatial analysis and prediction, geostatistical analysis, entity content analysis and graphic visualization in three-dimensional environment with computer technology, and is used in geological analysis. In this paper, the three-dimensional geological modeling of an iron mine through the use of Surpac is constructed, and the weight difference of the estimation methods between distance power inverse ratio method and ordinary kriging is studied, and the ore body volume and reserves are simulated and calculated by using these two methods. Compared with the actual mine reserves, its result is relatively accurate, so it provided scientific bases for mine resource assessment, reserve calculation, mining design and so on.

Keywords: three-dimensional geological modeling, geological database, geostatistics, block model

Procedia PDF Downloads 70
7318 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 137
7317 The Design of Information Technology System for Traceability of Thailand’s Tubtimjun Roseapple

Authors: Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom, Sawanath Treesathon

Abstract:

As there are several countries which import agriculture product from Thailand, those countries demand Thailand to establish the traceability system. The traceability system is the tool to reduce the risk in the supply chain in a very effective way as it will help the stakeholder in the supply chain to identify the defect point which will reduce the cost of operation in the supply chain. This research is aimed to design the traceability system for Tubtimjun roseapple for exporting to China, and it is the qualitative research. The data was collected from the expert in the tuntimjun roseapple and fruit exporting industry, and the data was used to design the traceability system. The design of the tubtimjun roseapple traceability system was followed the theory of supply chain which starts from the upstream of the supply chain to the downstream of the supply chain to support the process and condition of the exporting which included the database designing, system architecture, user interface design and information technology of the traceability system.

Keywords: design information, technology system, traceability, tubtimjun roseapple

Procedia PDF Downloads 170
7316 Ecosystems: An Analysis of Generation Z News Consumption, Its Impact on Evolving Concepts and Applications in Journalism

Authors: Bethany Wood

Abstract:

The world pandemic led to a change in the way social media was used by audiences, with young people spending more hours on the platform due to lockdown. Reports by Ofcom have demonstrated that the internet is the second most popular platform for accessing news after television in the UK with social media and the internet ranked as the most popular platform to access news for those aged between 16-24. These statistics are unsurprising considering that at the time of writing, 98 percent of Generation Z (Gen Z) owned a smartphone and the subsequent ease and accessibility of social media. Technology is constantly developing and with this, its importance is becoming more prevalent with each generation: the Baby Boomers (1946-1964) consider it something useful whereas millennials (1981-1997) believe it a necessity for day to day living. Gen Z, otherwise known as the digital native, have grown up with this technology at their fingertips and social media is a norm. It helps form their identity, their affiliations and opens gateways for them to engage with news in a new way. It is a common misconception that Gen Z do not consume news, they are simply doing so in a different way to their predecessors. Using a sample of 800 18-20 year olds whilst utilising Generational theory, Actor Network Theory and the Social Shaping of Technology, this research provides a critical analyse regarding how Gen Z’s news consumption and engagement habits are developing along with technology to sculpture the future format of news and its distribution. From that perspective, allied with the empirical approach, it is possible to provide research orientated advice for the industry and even help to redefine traditional concepts of journalism.

Keywords: journalism, generation z, digital, social media

Procedia PDF Downloads 86
7315 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 46
7314 Exploring Transitions between Communal- and Market-Based Knowledge Sharing

Authors: Benbya Hind, Belbaly Nassim

Abstract:

Markets and communities are often cast as alternative forms of knowledge sharing, but an open question is how and why people dynamically transition between them. To study these transitions, we design a technology that allows geographically distributed participants to either buy knowledge (using virtual points) or request it for free. We use a data-driven, inductive approach, studying 550 members in over 5000 interactions, during nine months. Because the technology offered participants choices between market or community forms, we can document both individual and collective transitions that emerge as people cycle between these forms. Our inductive analysis revealed that uncertainties endemic to knowledge sharing were the impetus for these transitions. Communities evoke uncertainties about knowledge sharing’s costs and benefits, which markets resolve by quantifying explicit prices. However, if people manipulate markets, they create uncertainties about the validity of those prices, allowing communities to reemerge to establish certainty via identity-based validation.

Keywords: knowledge sharing, communities, information technology design, transitions, markets

Procedia PDF Downloads 180
7313 Knowledge, Hierarchy and Decision-Making: Analysis of Documentary Filmmaking Practices in India

Authors: Nivedita Ghosh

Abstract:

In his critique of Lefebvre’s view that ‘technological capacities’ are class-dependent, Francois Hetman argues that technology today is participatory, allowing the entry of individuals from different levels of social stratification. As a result, we are entering into an era of technology operators or ‘clerks’ who become the new decision-makers because of the knowledge they possess of the use of technologies. In response to Hetman’s thesis, this paper argues that knowledge of technology, while indeed providing a momentary space for decision-making, does not necessarily restructure social hierarchies. Through case studies presented from the world of Indian documentary filmmaking, this paper puts forth the view that Hetman’s clerks, despite being technologically advanced, do not break into the filmmaking hierarchical order. This remains true even for a situation where technical knowledge rests most with those in the lowest rungs of the filmmaking ladder. Instead, technological knowledge provides the space for other kinds of relationships to evolve, such as those of ‘trusting the technician’ or ‘admiration for the technician’s work’. Furthermore, what continues to define documentary filmmaking hierarchy is conceptualization capacities of the practitioners, which are influenced by a similarity in socio-cultural backgrounds and film school training accessible primarily to the filmmakers instead of the technicians. Accordingly, the paper concludes with the argument that more than ‘technological-capacities’, it is ‘conceptualization capacities’ which are class-dependent, especially when we study the field of documentary filmmaking.

Keywords: documentary filmmaking, India, technology, knowledge, hierarchy

Procedia PDF Downloads 262
7312 Consumer Experience of 3D Body Scanning Technology and Acceptance of Related E-Commerce Market Applications in Saudi Arabia

Authors: Moudi Almousa

Abstract:

This research paper explores Saudi Arabian female consumers’ experiences using 3D body scanning technology and their level of acceptance of possible market applications of this technology to adopt for apparel online shopping. Data was collected for 82 women after being scanned then viewed a short video explaining three possible scenarios of 3D body scanning applications, which include size prediction, customization, and virtual try-on, before completing the survey questionnaire. Although respondents have strong positive responses towards the scanning experience, the majority were concerned about their privacy during the scanning process. The results indicated that size prediction and virtual try on had greater market application potential and a higher chance of crossing the gap based on consumer interest. The results of the study also indicated a strong positive correlation between respondents’ concern with inability to try on apparel products in online environments and their willingness to use the 3D possible market applications.

Keywords: 3D body scanning, market applications, online, apparel fit

Procedia PDF Downloads 145
7311 Aerial Survey and 3D Scanning Technology Applied to the Survey of Cultural Heritage of Su-Paiwan, an Aboriginal Settlement, Taiwan

Authors: April Hueimin Lu, Liangj-Ju Yao, Jun-Tin Lin, Susan Siru Liu

Abstract:

This paper discusses the application of aerial survey technology and 3D laser scanning technology in the surveying and mapping work of the settlements and slate houses of the old Taiwanese aborigines. The relics of old Taiwanese aborigines with thousands of history are widely distributed in the deep mountains of Taiwan, with a vast area and inconvenient transportation. When constructing the basic data of cultural assets, it is necessary to apply new technology to carry out efficient and accurate settlement mapping work. In this paper, taking the old Paiwan as an example, the aerial survey of the settlement of about 5 hectares and the 3D laser scanning of a slate house were carried out. The obtained orthophoto image was used as an important basis for drawing the settlement map. This 3D landscape data of topography and buildings derived from the aerial survey is important for subsequent preservation planning as well as building 3D scan provides a more detailed record of architectural forms and materials. The 3D settlement data from the aerial survey can be further applied to the 3D virtual model and animation of the settlement for virtual presentation. The information from the 3D scanning of the slate house can also be used for further digital archives and data queries through network resources. The results of this study show that, in large-scale settlement surveys, aerial surveying technology is used to construct the topography of settlements with buildings and spatial information of landscape, as well as the application of 3D scanning for small-scale records of individual buildings. This application of 3D technology, greatly increasing the efficiency and accuracy of survey and mapping work of aboriginal settlements, is much helpful for further preservation planning and rejuvenation of aboriginal cultural heritage.

Keywords: aerial survey, 3D scanning, aboriginal settlement, settlement architecture cluster, ecological landscape area, old Paiwan settlements, slat house, photogrammetry, SfM, MVS), Point cloud, SIFT, DSM, 3D model

Procedia PDF Downloads 169
7310 Social Affiliation Effects of Technology in 2022

Authors: Johanna Goeß

Abstract:

In this field study, it is hypothesised that affiliation motivation is relevant to dark terminal technology readiness. The theoretical basis for this work was the TAM 2, focusing on the social process variables and the short-scale technology readiness. Two hypotheses to be tested are the focus of consideration:
 H1: The TAM constructs are independently positively related to dark device use. H2: Sense of social belonging is positively related to dark device use.
 In this quantitative study, 30 male subjects participated with their dark devices. Using a post-basket exercise, affiliation is manipulated by content items on the website to investigate whether affiliation between computers and people and smartphones and people leads to similar effects as an affiliation between people. The entire scientific study, including the questionnaire, took about 30 minutes. This study contributes to the current literature and draws attention to the fact that male users' terminal devices have an influence in the form of affiliation effects.

Keywords: human-computer-interaction, computers, smartphones, addiction, social affiliation effects, TAM 2, pyramid of needs, social actors

Procedia PDF Downloads 117
7309 Topics of Blockchain Technology to Teach at Community College

Authors: Penn P. Wu, Jeannie Jo

Abstract:

Blockchain technology has rapidly gained popularity in industry. This paper attempts to assist academia to answer four questions. First, should community colleges begin offering education to nurture blockchain-literate students for the job market? Second, what are the appropriate topical areas to cover? Third, should it be an individual course? And forth, should it be a technical or management course? This paper starts with identifying the knowledge domains of blockchain technology and the topical areas each domain has, and continues with placing them in appropriate academic territories (Computer Sciences vs. Business) and subjects (programming, management, marketing, and laws), and then develops an evaluation model to determine the appropriate topical area for community colleges to teach. The evaluation is based on seven factors: maturity of technology, impacts on management, real-world applications, subject classification, knowledge prerequisites, textbook readiness, and recommended pedagogies. The evaluation results point to an interesting direction that offering an introductory course is an ideal option to guide students through the learning journey of what blockchain is and how it applies to business. Such an introductory course does not need to engage students in the discussions of mathematics and sciences that make blockchain technologies possible. While it is inevitable to brief technical topics to help students build a solid knowledge foundation of blockchain technologies, community colleges should avoid offering students a course centered on the discussion of developing blockchain applications.

Keywords: blockchain, pedagogies, blockchain technologies, blockchain course, blockchain pedagogies

Procedia PDF Downloads 133
7308 The Challenges to Information Communication Technology Integration in Mathematics Teaching and Learning

Authors: George Onomah

Abstract:

Background: The integration of information communication technology (ICT) in Mathematics education faces notable challenges, which this study aimed to dissect and understand. Objectives: The primary goal was to assess the internal and external factors affecting the adoption of ICT by in-service Mathematics teachers. Internal factors examined included teachers' pedagogical beliefs, prior teaching experience, attitudes towards computers, and proficiency with technology. External factors included the availability of technological resources, the level of ICT training received, the sufficiency of allocated time for technology use, and the institutional culture within educational environments. Methods: A descriptive survey design was employed to methodically investigate these factors. Data collection was carried out using a five-point Likert scale questionnaire, administered to a carefully selected sample of 100 in-service Mathematics teachers through a combination of purposive and convenience sampling techniques. Findings: Results from multiple regression analysis revealed a significant underutilization of ICT in Mathematics teaching, highlighting a pronounced deficiency in current classroom practices. Recommendations: The findings suggest an urgent need for educational department heads to implement regular and comprehensive ICT training programs aimed at enhancing teachers' technological capabilities and promoting the integration of ICT in Mathematics teaching methodologies.

Keywords: ICT, Mathematics, integration, barriers

Procedia PDF Downloads 40
7307 Technology Transfer of Indigenous Technologies: Emerging Aid to Indian Health Sector

Authors: Tripta Dixit, Smita Sahu, William Selvamurthy, Sadhana Srivastava

Abstract:

India is battling with the issues of accessibility, affordability and availability of quality health to the masses. Indian medical heritage which dated back to 3000 BC unveils the rich knowledge pool which has undergone a perceptible change over years, such as eradication of many communicable diseases, increasing individual awareness of quality health and import driven medical device market etc. Despite a slew of initiatives the holistic slogan of ‘health for all’ remains elusive and a concern for the nation. The 21st-century projects a myriad of challenges like cultural diversity, large population, demographic dividend and geographical segmentation leading to varied needs of people as per their regional conditions of climate, disease prevalence, nutrition and sanitation. But these challenges are also opportunities for the development of indigenous, low cost and accessible technologies to tackle them. This requires reinforcing the potential of indigenous technologies in coordination with prevailing health issues in various regions of country. This paper emphasis on the strategy for exploring the indigenous technologies with entrusted up-scaling to meet the diverse needs of the people. This review proposes to adopt technology transfer as a strategy to establish a vibrant ecosystem for identifying and up-scaling the indigenous medical technologies with diligent hand-holding for public health.

Keywords: health, indigenous, medical technology, technology transfer

Procedia PDF Downloads 251
7306 Research of the Three-Dimensional Visualization Geological Modeling of Mine Based on Surpac

Authors: Honggang Qu, Yong Xu, Rongmei Liu, Zhenji Gao, Bin Wang

Abstract:

Today's mining industry is advancing gradually toward digital and visual direction. The three-dimensional visualization geological modeling of mine is the digital characterization of mineral deposits and is one of the key technology of digital mining. Three-dimensional geological modeling is a technology that combines geological spatial information management, geological interpretation, geological spatial analysis and prediction, geostatistical analysis, entity content analysis and graphic visualization in a three-dimensional environment with computer technology and is used in geological analysis. In this paper, the three-dimensional geological modeling of an iron mine through the use of Surpac is constructed, and the weight difference of the estimation methods between the distance power inverse ratio method and ordinary kriging is studied, and the ore body volume and reserves are simulated and calculated by using these two methods. Compared with the actual mine reserves, its result is relatively accurate, so it provides scientific bases for mine resource assessment, reserve calculation, mining design and so on.

Keywords: three-dimensional geological modeling, geological database, geostatistics, block model

Procedia PDF Downloads 77
7305 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 264
7304 An Investigation of the Integration of Synchronous Online Tools into Task-Based Language Teaching: The Example of SpeakApps

Authors: Nouf Aljohani

Abstract:

The research project described in this presentation focuses on designing and evaluating oral tasks related to students’ needs and levels to foster communication and negotiation of meaning for a group of female Saudi university students. The significance of the current research project lies in its contribution to determining the usefulness of synchronous technology-mediated interactive group discussion in improving different speaking strategies through using synchronous technology. Also, it discovers how to optimize learning outcomes, expand evaluation for online learning tasks and engaging students’ experience in evaluating synchronous interactive tools and tasks. The researcher used SpeakApps, a synchronous technology, that allows the students to practice oral interaction outside the classroom. Such a course of action was considered necessary due to low English proficiency among Saudi students. According to the author's knowledge, the main factor that causes poor speaking skills is that students do not have sufficient time to communicate outside English language classes. Further, speaking and listening course contents are not well designed to match the Saudi learning context. The methodology included designing speaking tasks to match the educational setting; a CALL framework for designing and evaluating tasks; participant involvement in evaluating these tasks in each online session; and an investigation of the factors that led to the successful implementation of Task-based Language Teaching (TBLT) and using SpeakApps. The analysis and data were drawn from the technology acceptance model surveys, a group interview, teachers’ and students’ weekly reflections, and discourse analysis of students’ interactions.

Keywords: CALL evaluation, synchronous technology, speaking skill, task-based language teaching

Procedia PDF Downloads 310
7303 Simulating the Unseen: David Cronenberg’s Body Horror through Baudrillard’s Lens

Authors: Mario G. Rodriguez

Abstract:

This paper undertakes an in-depth exploration of David Cronenberg's filmography through Jean Baudrillard's theory of simulacra and simulation. Little has been written to show how Cronenberg’s cinema exemplifies Baudrillard’s conceptualization of postmodernity. The study employs Baudrillard’s historical orders of simulacra, as well as his definitions of hyperreality and simulation, to recontextualize Cronenberg’s films in an era characterized by the increasing influence of media and technology and Cronenberg's oeuvre presents a compelling canvas for examining the interplay between the real and the simulated. Through films like "Videodrome" (1983), "The Fly" (1986), and "eXistenZ" (1999), Cronenberg navigates the complex terrain of the human body, technology, and societal perceptions, echoing Baudrillard's concerns about the hyperreal and the dissolution of reality. The study concludes with a consideration of the role of "body-horror" as it pertains to Baudrillard's theory. It sheds light on how fear of loss of bodily autonomy, the relationship between technology and the human body, and the intersection of science, medicine, and horror reflect the nature of hyperreality and simulation.

Keywords: Cronenberg, hyperreality, simulation, Baudrillard

Procedia PDF Downloads 69
7302 Changing the Traditional Role of CFOs

Authors: Seyedmohammad Mousavian

Abstract:

Technological advancements are becoming unprecedentedly dominant everywhere. This dominance requires drastic chTechnological advancements are becoming unprecedentedly dominant everywhere. This dominance requires drastic changes in traditional thinking, procedures, and responsibilities. Chief Financial Officers (CFOs) have long played a key role in every organization around the globe and must adapt themselves to the disruptive technology which brings positive and negative points. This paper will discuss the shift of the traditional role of CFOs from just reporting toward more innovative roles like “Storytelling”, business partnering, and strategic planning.

Keywords: accounting information system, technology, data, CFO, finance

Procedia PDF Downloads 140
7301 Entrepreneurial Determinants Contributing to the Long Term Growth of Young Hi-Technology Start-Ups

Authors: A. Binnui, O. Kalinowska-Beszczynska, G. Shaw

Abstract:

It is postulated that innovative deployment of entrepreneurial activities leads to firm's growth. This paper draws upon the key predictions of the core theories on entrepreneurship and innovation to formulate a conceptual framework which can be used to depict the casual chain of events from which entrepreneurs can manage more innovatively and ultimately deliver higher growth which benefits of the regional and national economies. It examines the key firm-based factors extracted from the theories, namely the characteristics of entrepreneurial hi-tech firms, characteristics of innovating firms, and firm growth dynamics that lead to enhanced economic growth. The framework postulates that the key determinants extracted such as entrepreneurial demographics, firm characteristic, skills and competencies, research and development, product/service characteristics, market development, financial of the firm and internationalization might lead to the survival and long term development of high-technology startups.

Keywords: innovative entrepreneurial activities, entrepreneuship, determinants, growth, hi-technology start-upws

Procedia PDF Downloads 140
7300 Using Data Mining Technique for Scholarship Disbursement

Authors: J. K. Alhassan, S. A. Lawal

Abstract:

This work is on decision tree-based classification for the disbursement of scholarship. Tree-based data mining classification technique is used in other to determine the generic rule to be used to disburse the scholarship. The system based on the defined rules from the tree is able to determine the class (status) to which an applicant shall belong whether Granted or Not Granted. The applicants that fall to the class of granted denote a successful acquirement of scholarship while those in not granted class are unsuccessful in the scheme. An algorithm that can be used to classify the applicants based on the rules from tree-based classification was also developed. The tree-based classification is adopted because of its efficiency, effectiveness, and easy to comprehend features. The system was tested with the data of National Information Technology Development Agency (NITDA) Abuja, a Parastatal of Federal Ministry of Communication Technology that is mandated to develop and regulate information technology in Nigeria. The system was found working according to the specification. It is therefore recommended for all scholarship disbursement organizations.

Keywords: classification, data mining, decision tree, scholarship

Procedia PDF Downloads 376
7299 Use of Information Technology in the Government of a State

Authors: Pavel E. Golosov, Vladimir I. Gorelov, Oksana L. Karelova

Abstract:

There are visible changes in the world organization, environment and health of national conscience that create a background for discussion on possible redefinition of global, state and regional management goals. Authors apply the sustainable development criteria to a hierarchical management scheme that is to lead the world community to non-contradictory growth. Concrete definitions are discussed in respect of decision-making process representing the state mostly. With the help of system analysis it is highlighted how to understand who would carry the distinctive sign of world leadership in the nearest future.

Keywords: decision-making, information technology, public administration

Procedia PDF Downloads 512
7298 A Model of the Adoption of Maritime Autonomous Surface Ship

Authors: Chin-Shan Lu, Yi-Pei Liu

Abstract:

This study examines the factors influencing the adoption of MASS in Taiwan's shipping industry. Digital technology and unmanned vehicle advancements have enhanced efficiency and reduced environmental impact in the shipping industry. The IMO has set regulations to promote low-carbon emissions and autonomous ship technology. Using the TOE framework and DOI theory, a research model was constructed, and data from 132 Taiwanese shipping companies were collected via a questionnaire survey. A structural equation modeling (SEM) was conducted to examine the relationships between variables. Results show that technological and environmental factors significantly influence operators' attitudes toward MASS, while organizational factors impact their willingness to adopt. Enhancing technological support, internal resource allocation, top management support, and cost management are crucial for promoting adoption. This study identifies key factors and provides recommendations for adopting autonomous ships in Taiwan's shipping industry.

Keywords: MASS, technology-organization-environment, diffusion of innovations theory, shipping industry

Procedia PDF Downloads 24
7297 Designing Affect-Aware Virtual Worlds for Marine Education Using Legacy Internet of Things Gaming Devices: Teaching through Fisheries and Conflicts

Authors: Jonathan Bishop, Kamal Bechkoum, Frederick Bishop

Abstract:

This study proposes a framework for marine education, leveraging legacy Internet of Things (IoT) gaming devices and affect-aware technology to create immersive virtual worlds. Focused on addressing challenges in fisheries and marine conflict resolution, this approach integrates the unique capabilities of these devices to enhance learner engagement and understanding. By repurposing existing technology, we aim to deliver personalised educational experiences that adapt to users' emotional states. Preliminary results indicate significant potential in utilising these technologies to foster a deeper comprehension of marine conservation issues, promoting sustainable practices and conflict resolution skills. This interdisciplinary effort underscores the importance of innovative educational tools in environmental stewardship.

Keywords: marine education, marine technology, internet of things, fisheries, conflict management

Procedia PDF Downloads 59
7296 A Community-Engaged Approach to Examining Health Outcomes Potentially Related to Exposure to Environmental Contaminants in Yuma, Arizona

Authors: Julie A. Baldwin, Robert T. Trotter, Mark Remiker, C. Loren Buck, Amanda Aguirre, Trudie Milner, Emma Torres, Frank A. von Hippel

Abstract:

Introduction: In the past, there have been concerns about contaminants in the water sources in Yuma, Arizona, including the Colorado River. Prolonged exposure to contaminants, such as perchlorate and heavy metals, can lead to deleterious health effects in humans. This project examined the association between the concentration of environmental contaminants and patient health outcomes in Yuma residents, using a community-engaged approach to data collection. Methods: A community-engaged design allowed community partners and researchers to establish joint research goals, recruit participants, collect data, and formulate strategies for dissemination of findings. Key informant interviews were conducted to evaluate adherence to models of community-based research. Results: The training needs, roles, and expectations of community partners varied based on available resources, prior research experience, and perceived research challenges and ways to address them. Conclusions: Leveraging community-engaged approaches for studies of environmental contamination in marginalized communities can expedite recruitment efforts and stimulate action that can lead to improved community health.

Keywords: community engaged research, environmental contaminants, underserved populations, health equity

Procedia PDF Downloads 139
7295 The Construction of Research-Oriented/Practice-Oriented Engineering Testing and Measurement Technology Course under the Condition of New Technology

Authors: He Lingsong, Wang Junfeng, Tan Qiong, Xu Jiang

Abstract:

The paper describes efforts on reconstruction methods of engineering testing and measurement technology course by applying new techniques and applications. Firstly, flipped classroom was introduced. In-class time was used for in-depth discussions and interactions while theory concept teaching was done by self-study course outside of class. Secondly, two hands-on practices of technique applications, including the program design of MATLAB Signal Analysis and the measurement application of Arduino sensor, have been covered in class. Class was transformed from an instructor-centered teaching process into an active student-centered learning process, consisting of the pre-class massive open online course (MOOC), in-class discussion and after-class practice. The third is to change sole written homework to the research-oriented application practice assignments, so as to enhance the breadth and depth of the course.

Keywords: testing and measurement, flipped classroom, MOOC, research-oriented learning, practice-oriented learning

Procedia PDF Downloads 147
7294 The Effect of SIRT1 on NLRP3 (Nucleotide Oligomerization Domain-Like Receptor Family, Pyrin Domain Containing 3) Inflammasome of Osteoarthritis

Authors: So Youn Park, Yi Sle Lee, Ki Whan Hong, Chi Dae Kim

Abstract:

The role of metabolism in the pathogenesis of osteoarthritis is an emerging field. Metabolic alterations may be a role in osteoarthritis (OA) pathogenesis, and these changes influence joint destruction via several cytokine. Especially, in OA patients, levels of IL-1β are elevated in the synovial fluid, synovial membrane, subchondral bone, and cartilage. The IL-1β is activated by NLRP3 inflammasomes, and NLRP3 inflammasomes are cytosolic complexes that drive the production of other inflammatory cytokines, including IL-1β. In this study, we examined that SIRT1 suppresses IL-1β through inhibiting NLRP3 inflammasomes and SIRT1 ameliorates osteoarthritis. OA fibroblasts were isolated from synovium of OA patients. IL-1β and NLRP3 were detected in synovium of OA patients by immunohistochemistry. Lipopolysaccharides (LPS) stimulated the expression of active IL-1β mRNA in OA fibroblasts and combination of LPS, and adenosine triphosphate increased more the expression of active IL-1β in OA fibroblasts. The level of IL-1β was measured by western blot and ELISA assay. NLRP3 inflammasomes complex were measured by western blot. SIRT1 did not inhibit expression of NLRP3 inflammasome. So caspase-1, apoptotic speck-like protein containing a caspase recruitment domain (ASC) and NLRP3 protein were expressed in OA fibroblasts. But SIRT1 suppressed activation of IL-1β by inhibiting activity of caspase-1 via NLRP3 inflammasome in OA fibroblasts under LPS plus ATP stimulation. These results suggest that SIRT1 is a modulator of NLRP3 inflammasomes in OA fibroblasts and ameliorate IL-1β, so expression of SIRT1 in OA fibroblast may be a potential strategy for OA inflammation treatment.

Keywords: osteoarthritis, inflammasome, SIRT1, IL-1beta

Procedia PDF Downloads 199
7293 Mobile Payment over NFC: The M-Check System Case

Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich

Abstract:

The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.

Keywords: M-payment, NFC, M-check, M-commerce, security

Procedia PDF Downloads 598
7292 Charging-Vacuum Helium Mass Spectrometer Leak Detection Technology in the Application of Space Products Leak Testing and Error Control

Authors: Jijun Shi, Lichen Sun, Jianchao Zhao, Lizhi Sun, Enjun Liu, Chongwu Guo

Abstract:

Because of the consistency of pressure direction, more short cycle, and high sensitivity, Charging-Vacuum helium mass spectrometer leak testing technology is the most popular leak testing technology for the seal testing of the spacecraft parts, especially the small and medium size ones. Usually, auxiliary pump was used, and the minimum detectable leak rate could reach 5E-9Pa•m3/s, even better on certain occasions. Relative error is more important when evaluating the results. How to choose the reference leak, the background level of helium, and record formats would affect the leak rate tested. In the linearity range of leak testing system, it would reduce 10% relative error if the reference leak with larger leak rate was used, and the relative error would reduce obviously if the background of helium was low efficiently, the record format of decimal was used, and the more stable data were recorded.

Keywords: leak testing, spacecraft parts, relative error, error control

Procedia PDF Downloads 456