Search results for: burden sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1799

Search results for: burden sharing

1079 A Self-Coexistence Strategy for Spectrum Allocation Using Selfish and Unselfish Game Models in Cognitive Radio Networks

Authors: Noel Jeygar Robert, V. K.Vidya

Abstract:

Cognitive radio is a software-defined radio technology that allows cognitive users to operate on the vacant bands of spectrum allocated to licensed users. Cognitive radio plays a vital role in the efficient utilization of wireless radio spectrum available between cognitive users and licensed users without making any interference to licensed users. The spectrum allocation followed by spectrum sharing is done in a fashion where a cognitive user has to wait until spectrum holes are identified and allocated when the licensed user moves out of his own allocated spectrum. In this paper, we propose a self –coexistence strategy using bargaining and Cournot game model for achieving spectrum allocation in cognitive radio networks. The game-theoretic model analyses the behaviour of cognitive users in both cooperative and non-cooperative scenarios and provides an equilibrium level of spectrum allocation. Game-theoretic models such as bargaining game model and Cournot game model produce a balanced distribution of spectrum resources and energy consumption. Simulation results show that both game theories achieve better performance compared to other popular techniques

Keywords: cognitive radio, game theory, bargaining game, Cournot game

Procedia PDF Downloads 272
1078 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 349
1077 Demographic Dividend Explained by Infrastructure Costs of Population Growth Rate, Distinct from Age Dependency

Authors: Jane N. O'Sullivan

Abstract:

Although it is widely believed that fertility decline has benefitted economic advancement, particularly in East and South-East Asian countries, the causal mechanisms for this stimulus are contested. Since the turn of this century, demographic dividend theory has been increasingly recognised, hypothesising that higher proportions of working-age people can contribute to economic expansion if conditions are met to employ them productively. Population growth rate, as a systemic condition distinct from age composition, has not been similar attention since the 1970s and has lacked methodology for quantitative assessment. This paper explores conceptual and empirical quantification of the burden of expanding physical capital to accommodate a growing population. In proof-of-concept analyses of Australia and the United Kingdom, actual expenditure on gross fixed capital formation was compiled over four decades and apportioned to maintenance/turnover or expansion to accommodate population growth, based on lifespan of capital assets and population growth rate. In both countries, capital expansion was estimated to cost 6.5-7.0% of GDP per 1% population growth rate. This opportunity cost impedes the improvement of per capita capacity needed to realise the potential of the working-age population. Economic modelling of demographic scenarios have to date omitted this channel of influence; the implications of its inclusion are discussed.

Keywords: age dependency, demographic dividend, infrastructure, population growth rate

Procedia PDF Downloads 119
1076 An Automatic Model Transformation Methodology Based on Semantic and Syntactic Comparisons and the Granularity Issue Involved

Authors: Tiexin Wang, Sebastien Truptil, Frederick Benaben

Abstract:

Model transformation, as a pivotal aspect of Model-driven engineering, attracts more and more attentions both from researchers and practitioners. Many domains (enterprise engineering, software engineering, knowledge engineering, etc.) use model transformation principles and practices to serve to their domain specific problems; furthermore, model transformation could also be used to fulfill the gap between different domains: by sharing and exchanging knowledge. Since model transformation has been widely used, there comes new requirement on it: effectively and efficiently define the transformation process and reduce manual effort that involved in. This paper presents an automatic model transformation methodology based on semantic and syntactic comparisons, and focuses particularly on granularity issue that existed in transformation process. Comparing to the traditional model transformation methodologies, this methodology serves to a general purpose: cross-domain methodology. Semantic and syntactic checking measurements are combined into a refined transformation process, which solves the granularity issue. Moreover, semantic and syntactic comparisons are supported by software tool; manual effort is replaced in this way.

Keywords: automatic model transformation, granularity issue, model-driven engineering, semantic and syntactic comparisons

Procedia PDF Downloads 371
1075 Corporate Social Responsibility in Indian Apparel Industry

Authors: Archana Gandhi

Abstract:

Indian apparel manufacturers see several benefits of Corporate Social Responsibility (CSR). At the same time, they clearly face steep challenges in its implementation. From the perspective of the participants, the challenges tend to outweigh the benefits. The short-term expenses, misperceptions about the financial benefits of CSR and the additional burden of implementing CSR-related policies and activities tend to overshadow perceptions of the long-term benefits. CSR activities currently seen in the Indian apparel industry are primarily people focused, society-focused or environment-focused. However, most CSR activities focus on employee welfare, including teaching employees about health and safety awareness, creating opportunities for community building, and providing general education to employees. Employee retention is very high in socially responsible Indian firms as compared to non-CSR firms, largely because CSR plays a crucial role in overall employee satisfaction, which translates to worker loyalty and low turnover. Employee retention and commitment are not the​ only potential benefits of CSR in the Indian apparel industry. CSR can also enhance a company’s image. Although it is a long-term benefit, being socially responsible can build a company’s social reputation and help it to gain others’ trust. Buyers do not hesitate to do business with these companies, since it is difficult to find socially responsible firms in India.

Keywords: corporate social responsibility, apparel industry, workers, improve work life

Procedia PDF Downloads 346
1074 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 279
1073 Intelligent Transport System: Classification of Traffic Signs Using Deep Neural Networks in Real Time

Authors: Anukriti Kumar, Tanmay Singh, Dinesh Kumar Vishwakarma

Abstract:

Traffic control has been one of the most common and irritating problems since the time automobiles have hit the roads. Problems like traffic congestion have led to a significant time burden around the world and one significant solution to these problems can be the proper implementation of the Intelligent Transport System (ITS). It involves the integration of various tools like smart sensors, artificial intelligence, position technologies and mobile data services to manage traffic flow, reduce congestion and enhance driver's ability to avoid accidents during adverse weather. Road and traffic signs’ recognition is an emerging field of research in ITS. Classification problem of traffic signs needs to be solved as it is a major step in our journey towards building semi-autonomous/autonomous driving systems. The purpose of this work focuses on implementing an approach to solve the problem of traffic sign classification by developing a Convolutional Neural Network (CNN) classifier using the GTSRB (German Traffic Sign Recognition Benchmark) dataset. Rather than using hand-crafted features, our model addresses the concern of exploding huge parameters and data method augmentations. Our model achieved an accuracy of around 97.6% which is comparable to various state-of-the-art architectures.

Keywords: multiclass classification, convolution neural network, OpenCV

Procedia PDF Downloads 158
1072 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 154
1071 Lessons Learned from Covid19 - Related ERT in Universities

Authors: Sean Gay, Cristina Tat

Abstract:

This presentation will detail how a university in Western Japan has implemented its English for Academic Purposes (EAP) program during the onset of CoViD-19 in the spring semester of 2020. In the spring semester of 2020, after a 2 week delay, all courses within the School of Policy Studies EAP Program at Kwansei Gakuin University were offered in an online asynchronous format. The rationale for this decision was not to disadvantage students who might not have access to devices necessary for taking part in synchronous online lessons. The course coordinators were tasked with consolidating the materials originally designed for face-to-face14 week courses for a 12 week asynchronous online semester and with uploading the modified course materials to Luna, the university’s network, which is a modified version of Blackboard. Based on research to determine the social and academic impacts of this CoViD-19 ERT approach on the students who took part in this EAP program, this presentation explains how future curriculum design and implementation can be managed in a post-CoViD world. There are a wide variety of lessons that were salient. The role of the classroom as a social institution was very prominent; however, awareness of cognitive burdens and strategies to mitigate that burden may be more valuable for teachers. The lessons learned during this period of ERT can help teachers moving forward.

Keywords: asynchronous online learning, emergency remote teaching (ERT), online curriculum design, synchronous online learning

Procedia PDF Downloads 188
1070 Hysterectomy and Symbolic Damage: When the Desire for Motherhood is Reactivated in a Nun

Authors: Ndje Ndje Mireille

Abstract:

The improvement in the physical aspects of hysterectomy has tended to make us forget the psychological burden of this operation for many women. African women closely associate fertility and femininity, and they fear that their desire will diminish, that they will be less desirable after having undergone a hysterectomy. Medicine may be tempted to trivialize this surgical intervention by relying on the evolution of current surgery that leaves little or no marks. It is possible to think that the uterus is useless for a nun who has decided to freely disregard her motherhood. We used the clinical research method for this study. Through a semi-directive interview guide, we collected the verbatims of an hysterectomized catholic nun. The verbatims were transcribed and analyzed with the thematic content analysis. This analysis shows that the medical reality does not always correspond to the subjective experience of women, for whom hysterectomy can imply strong symbolic damage. The uterus is not essential to life, but it is essential to give life, and this lack can reactivate a desire for motherhood. The experience of hysterectomy is unique for each woman in relation to her history. This operation will eliminate all hope of pregnancy; it will be felt as intimate mutilation and an attack on femininity, it will bring up concerns about sexuality. Even if a woman has past the age of having children, has gone through menopause, or has freely decided not to have children, she still find it difficult to accept this procedure. The lack of uterus make a woman feel useless.

Keywords: hysterectomy, symbolic damage, desire for motherhood, feminity, nun

Procedia PDF Downloads 140
1069 Horizontal Cooperative Game Theory in Hotel Revenue Management

Authors: Ririh Rahma Ratinghayu, Jayu Pramudya, Nur Aini Masruroh, Shi-Woei Lin

Abstract:

This research studies pricing strategy in cooperative setting of hotel duopoly selling perishable product under fixed capacity constraint by using the perspective of managers. In hotel revenue management, competitor’s average room rate and occupancy rate should be taken into manager’s consideration in determining pricing strategy to generate optimum revenue. This information is not provided by business intelligence or available in competitor’s website. Thus, Information Sharing (IS) among players might result in improved performance of pricing strategy. IS is widely adopted in the logistics industry, but IS within hospitality industry has not been well-studied. This research put IS as one of cooperative game schemes, besides Mutual Price Setting (MPS) scheme. In off-peak season, hotel manager arranges pricing strategy to offer promotion package and various kinds of discounts up to 60% of full-price to attract customers. Competitor selling homogenous product will react the same, then triggers a price war. Price war which generates lower revenue may be avoided by creating collaboration in pricing strategy to optimize payoff for both players. In MPS cooperative game, players collaborate to set a room rate applied for both players. Cooperative game may avoid unfavorable players’ payoff caused by price war. Researches on horizontal cooperative game in logistics show better performance and payoff for the players, however, horizontal cooperative game in hotel revenue management has not been demonstrated. This paper aims to develop hotel revenue management models under duopoly cooperative schemes (IS & MPS), which are compared to models under non-cooperative scheme too. Each scheme has five models, Capacity Allocation Model; Demand Model; Revenue Model; Optimal Price Model; and Equilibrium Price Model. Capacity Allocation Model and Demand Model employs self-hotel and competitor’s full and discount price as predictors under non-linear relation. Optimal price is obtained by assuming revenue maximization motive. Equilibrium price is observed by interacting self-hotel’s and competitor’s optimal price under reaction equation. Equilibrium is analyzed using game theory approach. The sequence applies for three schemes. MPS Scheme differently aims to optimize total players’ payoff. The case study in which theoretical models are applied observes two hotels offering homogenous product in Indonesia during a year. The Capacity Allocation, Demand, and Revenue Models are built using multiple regression and statistically tested for validation. Case study data confirms that price behaves within demand model in a non-linear manner. IS Models can represent the actual demand and revenue data better than Non-IS Models. Furthermore, IS enables hotels to earn significantly higher revenue. Thus, duopoly hotel players in general, might have reasonable incentives to share information horizontally. During off-peak season, MPS Models are able to predict the optimal equal price for both hotels. However, Nash equilibrium may not always exist depending on actual payoff of adhering or betraying mutual agreement. To optimize performance, horizontal cooperative game may be chosen over non-cooperative game. Mathematical models can be used to detect collusion among business players. Empirical testing can be used as policy input for market regulator in preventing unethical business practices potentially harming society welfare.

Keywords: horizontal cooperative game theory, hotel revenue management, information sharing, mutual price setting

Procedia PDF Downloads 270
1068 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 176
1067 The Use of Hedging Devices in Studens’ Oral Presentation

Authors: Siti Navila

Abstract:

Hedging as a kind of pragmatic competence is an essential part in achieving the goal in communication, especially in academic discourse where the process of sharing knowledge among academic community takes place. Academic discourse demands an appropriateness and modesty of an author or speaker in stating arguments, to name but few, by considering the politeness, being cautious and tentative, and differentiating personal opinions and facts in which these aspects can be achieved through hedging. This study was conducted to find the hedging devices used by students as well as to analyze how they use them in their oral presentation. Some oral presentations from English Department students of the State University of Jakarta on their Academic Presentation course final test were recorded and explored formally and functionally. It was found that the most frequent hedging devices used by students were shields from all hedging devices that students commonly used when they showed suggestion, stated claims, showed opinion to provide possible but still valid answer, and offered the appropriate solution. The researcher suggests that hedging can be familiarized in learning, since potential conflicts that is likely to occur while delivering ideas in academic contexts such as disagreement, criticism, and personal judgment can be reduced with the use of hedging. It will also benefit students in achieving the academic competence with an ability to demonstrate their ideas appropriately and more acceptable in academic discourse.

Keywords: academic discourse, hedging, hedging devices, lexical hedges, Meyer classification

Procedia PDF Downloads 448
1066 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm

Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 515
1065 The Magnification of Early Detect Nutrition Case through Local Potential Utilization in Urban Region, Indonesia

Authors: Oktia Woro Kasmini Handayani, Sri Ratna Rahayu, Efa Nugroho, Bertakalswa Hermawati

Abstract:

The double burden of nutrition problem must be faced by Indonesia as developing country. The implemented program did not improve the nutritional status, therefore need to consider to utilize local potential. The objective of this research was to find out the effectivity of magnification model of early detect through local potential utilization in urban region, Semarang, Central Java, Indonesia. The research used an experimental design with the quantitative-qualitative approach. The population was all toddlers under five within the research region, sample determination by purposive sampling, as many as 216 toddlers. Quantitative data analysis used effectively criteria by Sugiono. Qualitative data was analyzed using NVivo. The optimization of local potential in the effort of nutrition status improvement shows number of nutrition case found was increased 225% (very effective), number of cases treated was increased 175% (very effective), number of cases counselled was increased 200% (effective), and number of cases that have improvement increase 75% (effective). The local potential need to be utilized in the effort of nutrition program improvement one of it is through the community empowerment, particularly health care and health high education institution as partner.

Keywords: early detection, nutrition status, local potential, health cadre

Procedia PDF Downloads 256
1064 Effect of Cap and Trade Policies for Carbon Emission Reduction on Delhi Households

Authors: Vikram Singh

Abstract:

This paper aims to take into account carbon tax or cap-and-trade legislation to manage Delhi carbon emissions after a post-Kyoto treaty. This report estimated the influence of the carbon taxes or rebate/compensation cost at the household level. Here, the three possible scenarios will help to comprehend the difference between a straightforward compensation/rebate, and two clearly denoting progressive formula. The straightforward compensation is basically minimizing the regressive applications that will bears on cost. On the other hand, both the progressive formula will generate extra revenue, which will help for feasibility of more efficient, vehicles, appliances and buildings in the low-income household. For the hypothetical case of carbon price $40/tonne, low-income household for both urban and rural region could experience price burden up to 5% and 9% on their income as compared to 3% and 7% for high-income household respectively. The survey report also shown that carbon emission due low-income household are primarily by the substantive requirement like housing and transportation whereas almost 40% emission due to high-income household are by luxurious and non-essential items. The equal distribution of revenue cum incentives will not completely overcome high-income household’s investment in inessential items. However, it will merely help in investing their income in energy efficient and less carbon intensive items. Therefore, the rebate distribution on per capita basis instead on per households will benefit more especially large families at low-income group.

Keywords: household emission, carbon credit, carbon intensity, green house gas emission, carbon generation based insentives

Procedia PDF Downloads 423
1063 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 386
1062 Business Entrepreneurs in the Making

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to revise the skills of an entrepreneur in the making and to guide future Entrepreneurs into a promising future. The study presents a broader review of entrepreneurship, starting from its definition and antecedents. A well-developed original set of guidelines can help budding entrepreneurs and practitioners seeking an answer to being successful as an entrepreneur. It is a journey full of excitement, experiences, rewards, and learning. Dedication, work ethics and a never-say-die attitude will largely contribute to the success as a businessman and an entrepreneur. This paper is sharing an experience of how an entrepreneur can act as a catalyst for young minds while ensuring them that ethics and principles do pay in business when followed in true spirit and action. It is very important for an entrepreneur to enhance his product or services, marketing skills, and market share, along with providing customer satisfaction and opportunities for teams to improve their leadership qualities. To have strong employee loyalty and job satisfaction among its employees. Based on Research objectives, primarily in-depth interviews and focused group interviews were conducted as a qualitative research method. And to support this survey, questionnaires were used as a qualitative research method to explore how Indian Entrepreneurs face the challenge of the changing, volatile socio-political environment in India.

Keywords: entrepreneur, business ethics, sales, marketing

Procedia PDF Downloads 76
1061 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 61
1060 Perspective of Community Health Workers on The Sustainability of Primary Health Care

Authors: Dan Richard D. Fernandez

Abstract:

This study determined the perspectives of community health workers’ perspectives in the sustainability of primary health care. Eight community health workers, two community officials and a rural health midwife in a rural community in the in the Philippines were enjoined to share their perspectives in the sustainability of primary health care. The study utilized the critical research method. The critical research assumes that there are ‘dominated’ or ‘marginalized’ groups whose interests are not best served by existing societal structures. Their experiences highlighted that the challenges of their role include unkind and uncooperative patients, the lack of institutional support mechanisms and conflict of their roles with their family responsibilities. Their most revealing insight is the belief that primary health care is within their grasp. Finally, they believe that the burden to sustain primary health care rests on their shoulders alone. This study establishes that Multi-stakeholder participation is and Gender-sensitivity is integral to the sustainability of Primary Health Care. It also observed that the ingrained Expert-Novice or Top-down Management Culture and the marginalisation of BHWs within the system is a threat to PHC sustainability. This study also recommends to expand the study and to involve the local government units and academe in lobbying the integration of gender-sensitivity and multi-stake participatory approaches to health workforce policies. Finally, this study recognised that the CHWs’ role is indispensable to the sustainability of primary health care.

Keywords: community health workers, multi-stakeholder participation, sustainability, gender-sensitivity

Procedia PDF Downloads 530
1059 Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation

Authors: Xiaoyu Stephanie Ren

Abstract:

With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation.

Keywords: women trafficking, sex violence, religious exploitation, faith community, prosecution, law

Procedia PDF Downloads 146
1058 The Good, the Bad and the Ugly in E-Procurement: A Case Study of Agricultural Company in Vietnam

Authors: D. T. Tran, H. P. Tran, L. G. Hoang, V. N. H. Bui, Q. T. Nguyen, A. K. Das

Abstract:

This paper provides some insight information about a current situation of e-procurement implementation in Vietnam, including opportunities and challenges. A case study of Phuc Thien Company which is classified as a medium enterprise in the country, specialising on animal feed production. Since the technological development rapidly changes, companies have implemented advanced technologies in supply chain management to increase efficiency and gain collaboration amidst partners in their manufacturing and development activities. The findings of this research reveal strengths and ongoing weaknesses when Phuc Thien company internally implemented eProcurement system. Although cost savings, visibility of payment and speedy procurement process are one of the largest benefits of eProcurement implementation, the company faces greater hurdles, such as employee capability to use technology and their resistance to change, that overshadow everything else. In terms of governmental policy, the adaptation of e-invoicing has commenced since June 2015 in Vietnam, legal regulations and administrative framework related to e-Procurement carries various ambiguous in its content and extremely fragment. Hence, this adds a great burden to enterprises in general and Phuc Thien in particular in view of creating higher competitive advantage for animal feed industry in Vietnam as well as South East Asia region.

Keywords: procurement, e-procurement, animal feed industry, efficiency

Procedia PDF Downloads 308
1057 Lean Thinking and E-Commerce as New Opportunities to Improve Partnership in Supply Chain of Construction Industries

Authors: Kaustav Kundu, Alberto Portioli Staudacher

Abstract:

Construction industry plays a vital role in the economy of the world. But due to high uncertainty and variability in the industry, its performance is not as efficient in terms of quality, lead times, productivity and costs as of other industries. Moreover, there are continuous conflicts among the different actors in the construction supply chains in terms of profit sharing. Previous studies suggested partnership as an important approach to promote cooperation among the different actors in the construction supply chains and thereby it improves the overall performance. Construction practitioners tried to focus on partnership which can enhance the performance of construction supply chains but they are not fully aware of different approaches and techniques for improving partnership. In this research, a systematic review on partnership in relation to construction supply chains is carried out to understand different elements influencing the partnership. The research development of this domain is analyzed by reviewing selected articles published from 1996 to 2015. Based on the papers, three major elements influencing partnership in construction supply chains are identified: “Lean approach”, “Relationship building” and “E-commerce applications”. This study analyses the contributions in the areas within each element and provides suggestions for future developments of partnership in construction supply chains.

Keywords: partnership, construction, lean, SCM, supply chain management

Procedia PDF Downloads 415
1056 The “Prologue” in Tommy Orange’S There, There: Reinventing the Introductory Section

Authors: Kristin Murray

Abstract:

The proposed paper exams prologues in 20th and 21st century American literature in order to show how Native American writer Tommy Orange’s Prologue in his 2018 novel There, Thereis different. In an interview about his 2018 novel There, There, explains he feels “a kind of burden to catch the general reader up with what really happened, because history has got it so wrong and still continue to” (Laubernds). Orange, thus, includes a “Prologue” in his novel to do this work, catching readers upon Native Americans and their history. Prologues are usually from the narrator’s voice, a character’s voice, or even from a fictionalized version of the author, but the tone of Orange’s “Prologue” is that of a non-fictional first-person essayist. Examining prologues in American literature posits Orange’s prologue outside the norm. This paper also examines other introductory sections, the preface, in particular. The research and examination reveal that Orange is adding his personal voice in the Prologue to the multiple narratorsof the novel, and his is the voice of a writer who knows that his audience comes to his novel with a plethora of misinformation. The truths he tells are horrifying and hopeful. He tells of Thanksgiving as a “land deal” and a “successful massacre,” but he also tellsreaders how urban Indians have found a sense of the land, even through concrete. Native American writers contributed and still contribute to the genre of autobiography in ways that have changed our understanding of this genre. This examination of Orange’s Prologue reveals the new and unexpected way to view this often under-examined introductory section, the prologue.

Keywords: native american literature, prologues, prefaces, 20th century american literature

Procedia PDF Downloads 162
1055 Experimental Film Class: Watbangkapom School, Samut Songkhram

Authors: J. Areerut

Abstract:

Experimental Film Class Project is supported by the Institute for Research and Development at Suan Sunandha Rajabhat University. This project is purported to provide academic and professional services to improve the quality standards of the community and locals in accordance with the mission of the university, which is to improve and expand knowledge for the community and to develop and transfer such knowledge and professions to the next generation. Eventually, it leads to sustainable development because the development of human resources is deemed as the key for sustainable development. Moreover, the Experimental Film Class is an integral part of the teaching of film production at Suan Sunandha International School of Art (SISA). By means of giving opportunities to students for participation in projects by sharing experience, skill and knowledge and participation in field activities, it helps students in the film production major to enhance their abilities and potentials as preparation for their readiness in the marketplace. Additionally, in this class, we provide basic film knowledge, screenwriting techniques, editing and subtitles including uploading videos on social media such as YouTube and Facebook for the participant students.

Keywords: experimental film class, Watbangkapom School, participant students, basic of film production, film workshop

Procedia PDF Downloads 324
1054 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 175
1053 Study of Hydrocarbons Metering Issues in Algerian Fields under the New Law Context

Authors: A. Hadjadj, S. Maamir

Abstract:

Since the advent of the law 86/14 concerning the
exploitation of the national territory by foreign companies in
partnership with the Algerian oil and gas company, the problem of
hydrocarbons metering in the sharing production come out.
More generally, good management counting hydrocarbons can
provide data on the production wells, the field and the reservoir for
medium and long term planning, particularly in the context of the
management and field development.
In this work, we are interested in the transactional metering which
is a very delicate and crucial period in the current context of the new
hydrocarbon’s law characterized by assets system between the
various activities of Sonatrach and its foreign partners.
After a state of the art on hydrocarbons metering devices in
Algeria and elsewhere, we will decline the advantages and
disadvantages of each system, and then we describe the problem to
try to reach an optimal solution.

Keywords: transactional metering, flowmeter orifice, heat flow, Sonatrach

Procedia PDF Downloads 346
1052 Web-GIS Technology: A Tool for Farm-to-Market Road Project Profiling and Proposal Prioritization of the Philippines’ Department of Agriculture

Authors: Elbert S. Moyon, Edsel Matt O. Morales, Jaymer M. Jayoma, Kent C. Espejon, Jayson C. Dollete, Mark Phil B. Pacot

Abstract:

This research paper focuses on the potential of using Web-GIS technology in prioritizing farm-to-market road projects by the Philippines’ Department of Agriculture (DA). The study aimed to explore the benefits of Web-GIS in addressing the limitations faced by the DA in terms of Farm to Market Road profiling and project prioritization, which include a lack of access to updated data, limited spatial analysis capabilities, and difficulties in sharing information between stakeholders. The research methodology involves a comprehensive literature review and a case study of a Web-GIS application developed for the DA, which was used to profile and prioritize farm-to-market road projects in the Philippines. The results showed that the Web-GIS technology provides the DA with an effective tool for analyzing and visualizing data, which can help in profiling and prioritizing road projects based on various criteria such as economic, social, and environmental impacts. The study also showed that Web-GIS technology could help in reducing the time and effort required for road project prioritization and improve communication between stakeholders.

Keywords: GIS, web application, farm-to-market road, FMR prioritization, Django, GeoServer

Procedia PDF Downloads 66
1051 Humanising Digital Healthcare to Build Capacity by Harnessing the Power of Patient Data

Authors: Durhane Wong-Rieger, Kawaldip Sehmi, Nicola Bedlington, Nicole Boice, Tamás Bereczky

Abstract:

Patient-generated health data should be seen as the expression of the experience of patients, including the outcomes reflecting the impact a treatment or service had on their physical health and wellness. We discuss how the healthcare system can reach a place where digital is a determinant of health - where data is generated by patients and is respected and which acknowledges their contribution to science. We explore the biggest barriers facing this. The International Experience Exchange with Patient Organisation’s Position Paper is based on a global patient survey conducted in Q3 2021 that received 304 responses. Results were discussed and validated by the 15 patient experts and supplemented with literature research. Results are a subset of this. Our research showed patient communities want to influence how their data is generated, shared, and used. Our study concludes that a reasonable framework is needed to protect the integrity of patient data and minimise abuse, and build trust. Results also demonstrated a need for patient communities to have more influence and control over how health data is generated, shared, and used. The results clearly highlight that the community feels there is a lack of clear policies on sharing data.

Keywords: digital health, equitable access, humanise healthcare, patient data

Procedia PDF Downloads 64
1050 Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites

Authors: Tharntip Tawnie Chutikulrungsee, Oliver Kisalay Burmeister, Maumita Bhattacharya, Dragana Calic

Abstract:

Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain.

Keywords: facebook, online privacy, other-generated disclosure, social networks sites (SNSs)

Procedia PDF Downloads 233