Search results for: target customers
2855 Impact of Experience-Oriented Marketing on the Buying Behaviour of the Consumers: An Application in Konya Selcuk University
Authors: Ebru Esen, Ömer Akkaya, Nattanan Pankrobkaew
Abstract:
Though the experience concept found its place in the field of marketing in 1982, it is today in front of us as an important phenomenon in understanding the consumer behaviours. In parallel with the globalization and intensification of the competition, the enterprises have been in an effort to provide unique experiences for their consumers by going beyond providing services with the products. In this context, experience-oriented marketing enables the enterprises to use the marketing strategies of providing experiences for their customers and to have advantages in terms of competition. Based on it, this article discusses the concepts of experience, experience-oriented marketing and buying behaviour of consumers as a whole, and details about the application conducted in Konya Selcuklu University.Keywords: experience, experience marketing, buying behaviour of consumers
Procedia PDF Downloads 3142854 Application of Facilities Management Practice in High Rise Commercial Properties: Jos in Perpective
Authors: Aliyu Ahmad Aliyu, Abubakar Ahmad, Muhammad Umar Bello, Rozilah Kasim, David Martin
Abstract:
The article studied the application of facilities management practice in high rise commercial properties. Convenience sampling technique was used in administering questionnaires to the 60 respondents who responded to the survey. It was found out that the extent of application of facilities management in the subject properties is better described as below average. Similarly, the most frequently tools of facilities management in use and employed in the properties were outsourcing and in-house sourcing. This was influenced by the level of their familiarity with the tools. Planned and Preventive maintenance should be taken regularly in other to enhance the effectiveness of the facilities management and to satisfy both the owner and customers of the organization.Keywords: commercial properties, facilities management, high-rise buildings, Jos metropolis and outsourcing
Procedia PDF Downloads 5452853 How to Affect Brand Attitude with Authenticity in Advertising
Authors: Tang, Yun-Chia, Chiu, Hung-Chang
Abstract:
Authenticity in advertising, is the cornerstone of modern marketing. Despite research advances related to the role of authenticity in marketing, it remains unclear why customers respond to authentic brand stories. This study shows that different personality traits moderate the influence of various types of authenticity on people’s levels of emotion. Both indexical and iconic authenticity advertising evoke more positive emotions among extroverts and open and agreeable people. When neurotic people and conscientious people read iconic authenticity advertisements, rather than indexical authenticity ones, they produce more negative emotions. The emotion evoked by advertising in turn has a positive impact on brand attitude. These findings provide managerial implications and directions for practitioners.Keywords: advertising, authenticity, emotion, personality traits
Procedia PDF Downloads 4432852 The Value of Store Choice Criteria on Perceived Patronage Intentions
Authors: Susana Marques
Abstract:
Research on how store environment cues influence consumers’ store choice decision criteria, such as store operations, product quality, monetary price, store image and sales promotion, is sparse. Especially absent research on the simultaneous impact of multiple store environment cues. The authors propose a comprehensive store choice model that includes: three types of store environment cues as exogenous constructs; various store choice criteria as possible mediating constructs, and store patronage intentions as an endogenous construct. On the basis of testing with a sample of 561 customers of hypermarkets, the model is partially supported. This study used structural equation modelling to test the proposed model.Keywords: store choice, store patronage, structural equation modelling, retailing
Procedia PDF Downloads 2722851 The Project Evaluation to Develop the Competencies, Capabilities, and Skills in Repairing Computers of People in Jompluak Local Municipality, Bang Khonthi District, Samut Songkram Province
Authors: Wilailuk Meepracha
Abstract:
The results of the study on the project evaluation to develop the competencies, capabilities, and skills in repairing computers of people in Jompluak Local Municipality, Bang Khonthi District, Samut Songkram Province showed that the overall result was good (4.33). When considering on each aspect, it was found that the highest one was on process evaluation (4.60) followed by product evaluation (4.50) and the least one was on feeding factor (3.97). When considering in details, it was found that: 1) the context aspect was high (4.23) with the highest item on the arrangement of the training situation (4.67) followed by the appropriateness of the target (4.30) and the least aspect was on the project cooperation (3.73). 2) The evaluation of average overall primary factor or feeding factor showed high value (4.23) while the highest aspect was on the capability of the trainers (4.47) followed by the suitable venue (4.33) while the least aspect was on the insufficient budget (3.47). 3) The average result of process evaluation was very high (4.60). The highest aspect was on the follow-op supervision (4.70) followed by responsibility of each project staffs (4.50) while the least aspect was on the present situation and the problems of the community (4.40). 4) The overall result of the product evaluation was very high (4.50). The highest aspect was on the diversity of the activities and the community integration (4.67) followed by project target achievement (4.63) while the least aspect was on continuation and regularity of the activities (4.33). The trainees reported high satisfaction on the project management at very high level (43.33%) while 40% reported high level and 16.67% reported moderate level. Suggestions for the project were on the additional number of the computer sets (37.78%) followed by longer training period especially on computer skills (43.48%).Keywords: project evaluation, competency development, the capability on computer repairing and computer skills
Procedia PDF Downloads 3032850 Moving Target Defense against Various Attack Models in Time Sensitive Networks
Authors: Johannes Günther
Abstract:
Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.Keywords: network security, time sensitive networking, moving target defense, cyber security
Procedia PDF Downloads 732849 Teaching–Learning-Based Optimization: An Efficient Method for Chinese as a Second Language
Authors: Qi Wang
Abstract:
In the classroom, teachers have been trained to complete the target task within the limited lecture time, meanwhile learners need to receive a lot of new knowledge, however, most of the time the learners come without the proper pre-class preparation to efficiently take in the contents taught in class. Under this circumstance, teachers do have no time to check whether the learners fully understand the content or not, how the learners communicate in the different contexts, until teachers see the results when the learners are tested. In the past decade, the teaching of Chinese has taken a trend. Teaching focuses less on the use of proper grammatical terms/punctuation and is now placing a heavier focus on the materials from real life contexts. As a result, it has become a greater challenge to teachers, as this requires teachers to fully understand/prepare what they teach and explain the content with simple and understandable words to learners. On the other hand, the same challenge also applies to the learners, who come from different countries. As they have to use what they learnt, based on their personal understanding of the material to effectively communicate with others in the classroom, even in the contexts of a day to day communication. To reach this win-win stage, Feynman’s Technique plays a very important role. This practical report presents you how the Feynman’s Technique is applied into Chinese courses, both writing & oral, to motivate the learners to practice more on writing, reading and speaking in the past few years. Part 1, analysis of different teaching styles and different types of learners, to find the most efficient way to both teachers and learners. Part 2, based on the theory of Feynman’s Technique, how to let learners build the knowledge from knowing the name of something to knowing something, via different designed target tasks. Part 3. The outcomes show that Feynman’s Technique is the interaction of learning style and teaching style, the double-edged sword of Teaching & Learning Chinese as a Second Language.Keywords: Chinese, Feynman’s technique, learners, teachers
Procedia PDF Downloads 1542848 Analyzing Environmental Emotive Triggers in Terrorist Propaganda
Authors: Travis Morris
Abstract:
The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.Keywords: propaganda analysis, emotive triggers environmental security, frames
Procedia PDF Downloads 1382847 Seismic Assessment of Passive Control Steel Structure with Modified Parameter of Oil Damper
Authors: Ahmad Naqi
Abstract:
Today, the passively controlled buildings are extensively becoming popular due to its excellent lateral load resistance circumstance. Typically, these buildings are enhanced with a damping device that has high market demand. Some manufacturer falsified the damping device parameter during the production to achieve the market demand. Therefore, this paper evaluates the seismic performance of buildings equipped with damping devices, which their parameter modified to simulate the falsified devices, intentionally. For this purpose, three benchmark buildings of 4-, 10-, and 20-story were selected from JSSI (Japan Society of Seismic Isolation) manual. The buildings are special moment resisting steel frame with oil damper in the longitudinal direction only. For each benchmark buildings, two types of structural elements are designed to resist the lateral load with and without damping devices (hereafter, known as Trimmed & Conventional Building). The target building was modeled using STERA-3D, a finite element based software coded for study purpose. Practicing the software one can develop either three-dimensional Model (3DM) or Lumped Mass model (LMM). Firstly, the seismic performance of 3DM and LMM models was evaluated and found excellent coincide for the target buildings. The simplified model of LMM used in this study to produce 66 cases for both of the buildings. Then, the device parameters were modified by ± 40% and ±20% to predict many possible conditions of falsification. It is verified that the building which is design to sustain the lateral load with support of damping device (Trimmed Building) are much more under threat as a result of device falsification than those building strengthen by damping device (Conventional Building).Keywords: passive control system, oil damper, seismic assessment, lumped mass model
Procedia PDF Downloads 1142846 Optimal Resource Configuration and Allocation Planning Problem for Bottleneck Machines and Auxiliary Tools
Authors: Yin-Yann Chen, Tzu-Ling Chen
Abstract:
This study presents the case of an actual Taiwanese semiconductor assembly and testing manufacturer. Three major bottleneck manufacturing processes, namely, die bond, wire bond, and molding, are analyzed to determine how to use finite resources to achieve the optimal capacity allocation. A medium-term capacity allocation planning model is developed by considering the optimal total profit to satisfy the promised volume demanded by customers and to obtain the best migration decision among production lines for machines and tools. Finally, sensitivity analysis based on the actual case is provided to explore the effect of various parameter levels.Keywords: capacity planning, capacity allocation, machine migration, resource configuration
Procedia PDF Downloads 4612845 Cytotoxicological Evaluation of a Folate Receptor Targeting Drug Delivery System Based on Cyclodextrins
Authors: Caroline Mendes, Mary McNamara, Orla Howe
Abstract:
For chemotherapy, a drug delivery system should be able to specifically target cancer cells and deliver the therapeutic dose without affecting normal cells. Folate receptors (FR) can be considered key targets since they are commonly over-expressed in cancer cells and they are the molecular marker used in this study. Here, cyclodextrin (CD) has being studied as a vehicle for delivering the chemotherapeutic drug, methotrexate (MTX). CDs have the ability to form inclusion complexes, in which molecules of suitable dimensions are included within the CD cavity. In this study, β-CD has been modified using folic acid so as to specifically target the FR molecular marker. Thus, the system studied here for drug delivery consists of β-CD, folic acid and MTX (CDEnFA:MTX). Cellular uptake of folic acid is mediated with high affinity by folate receptors while the cellular uptake of antifolates, such as MTX, is mediated with high affinity by the reduced folate carriers (RFCs). This study addresses the gene (mRNA) and protein expression levels of FRs and RFCs in the cancer cell lines CaCo-2, SKOV-3, HeLa, MCF-7, A549 and the normal cell line BEAS-2B, quantified by real-time polymerase chain reaction (real-time PCR) and flow cytometry, respectively. From that, four cell lines with different levels of FRs, were chosen for cytotoxicity assays of MTX and CDEnFA:MTX using the MTT assay. Real-time PCR and flow cytometry data demonstrated that all cell lines ubiquitously express moderate levels of RFC. These experiments have also shown that levels of FR protein in CaCo-2 cells are high, while levels in SKOV-3, HeLa and MCF-7 cells are moderate. A549 and BEAS-2B cells express low levels of FR protein. FRs are highly expressed in all the cancer cell lines analysed when compared to the normal cell line BEAS-2B. The cell lines CaCo-2, MCF-7, A549 and BEAS-2B were used in the cell viability assays. 48 hours treatment with the free drug and the complex resulted in IC50 values of 93.9 µM ± 9.2 and 56.0 µM ± 4.0 for CaCo-2 for free MTX and CDEnFA:MTX respectively, 118.2 µM ± 10.8 and 97.8 µM ± 12.3 for MCF-7, 36.4 µM ± 6.9 and 75.0 µM ± 8.5 for A549 and 132.6 µM ± 12.1 and 288.1 µM ± 16.3 for BEAS-2B. These results demonstrate that MTX is more toxic towards cell lines expressing low levels of FR, such as the BEAS-2B. More importantly, these results demonstrate that the inclusion complex CDEnFA:MTX showed greater cytotoxicity than the free drug towards the high FR expressing CaCo-2 cells, indicating that it has potential to target this receptor, enhancing the specificity and the efficiency of the drug.Keywords: cyclodextrins, cancer treatment, drug delivery, folate receptors, reduced folate carriers
Procedia PDF Downloads 3012844 Stakeholder Perceptions of Environmental, Social, and Governance Reporting Patterns: A Multi-Method Study
Authors: Samrina Jafrin, Till Talaulicar
Abstract:
This study investigates stakeholder perceptions of environmental, social, and governance (ESG) reporting patterns and their effectiveness in enhancing trust and transparency. Utilizing a multi-method approach, including experimental research and systematic literature review, insights are gathered from investors, employees, customers, suppliers, managers, and community members. The findings reveal diverse stakeholder expectations and perceptions and emphasize the importance of effective ESG reporting strategies in building credibility and trust. This research contributes to the academic discourse on corporate sustainability reporting and provides practical recommendations for optimizing ESG reporting practices.Keywords: ESG reporting, stakeholder perceptions, corporate sustainability, transparency, trust
Procedia PDF Downloads 172843 Supplier Relationship Management Model for Sme’s E-Commerce Transaction Broker Case Study: Hotel Rooms Provider
Authors: Veronica S. Moertini, Niko Ibrahim, Verliyantina
Abstract:
As market intermediary firms, e-commerce transaction broker firms need to strongly collaborate with suppliers in order to develop brands seek by customers. Developing suitable electronic Supplier Relationship Management (e-SRM) system is the solution to the need. In this paper, we propose our concept of e-SRM for transaction brokers owned by small medium enterprises (SMEs), which includes the integrated e-SRM and e-CRM architecture, the e-SRM applications with their functions. We then discuss the customization and implementation of the proposed e-SRM model in a specific transaction broker selling hotel rooms, which owned by an SME, KlikHotel.com. The implementation of the e-SRM in KlikHotel.com has been successfully boosting the number of suppliers (hotel members) and hotel room sales.Keywords: e-CRM, e-SRM, SME, transaction broker
Procedia PDF Downloads 5002842 Mobulid Ray Post-Release Mortality to Assess the Feasibility of Live-Release Management Measures
Authors: Sila K. Sari, Betty J.L. Laglbauer, Muhammad G. Salim, Irianies C. Gozali, Iqbal Herwata, Fahmi Fahmi, Selvia Oktaviyani, Isabel Ender, Sarah Lewis, Abraham Sianipar, Mark Erdmann
Abstract:
Taking strides towards the sustainable use of marine stocks requires science-based management of target fish populations and reduction of bycatch in non-selective fisheries. Among elasmobranchs, mobulid rays are faced with high extinction risk due to intrinsic vulnerability to fishing and their conservation has been recognized as a strong priority both in Indonesia and worldwide. Despite their common vulnerabilities to fishing pressure due to slow growth, late maturation and low fecundity, only manta rays, but not devil rays, are protected in Indonesian waters. However, both manta and devil rays are captured in non-selective fisheries, in particular drift gillnets, since their habitat overlaps with fishing grounds for primary target species (e.g. marlin, swordfish and bullet tuna off the coast of Muncar). For this reason, mobulid populations are being heavily impacted, and while national-level protections are crucial to help conservation, they may not suffice alone to insure populations sustainability. In order to assess the potential of applying live-release management measures to conserve mobulids captured as bycatch in drift gillnets, we deployed pop-up survival archival transmitters to assess post-release mortality in Indonesian mobulid rays. We also assessed which fishing practices, in particular, soak duration, affected post-release mortality in order to draw relevant conclusions for management.Keywords: Mobulid, Devil ray, Manta ray, Bycatch
Procedia PDF Downloads 1722841 The Importance of Customer Engagement and Service Innovation in Value Co-Creation
Authors: Soheila Raeisi, Meng Lingjie
Abstract:
The interaction of customers with businesses is a process that is critical to the running of those businesses. Different levels of customer engagement and service innovation exist when pursuing value co-creation endeavors. The important thing in this whole process is for business managers know the benefits that can be realized when these activities are pursued effectively. The purpose of this paper is to first identify the importance of value co-creation when pursued via customer engagement and service innovation. Secondly, it will also identify the conditions under which value co-destruction can occur on the same. The background of the topic will be reviewed followed by the literature review with a special focus on the definition of these terms and the research design to be used. The research found that it is beneficial to have a strong relationship between stakeholders and the business in order to have strong customer engagement and service innovation.Keywords: customer engagement, service innovation, value co-creation, value co-destruction
Procedia PDF Downloads 3572840 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 3782839 Effect of Bacillus thuringiensis israelensis against Culex pipiens (Insect: Culicidae) Effect of Bti on Two Non-Target Species Eylais hamata (Acari: Hydrachnidia) and Physa marmorata (Gastropoda: Physidae) and Dosage of Their GST Biomarker
Authors: Meriem Mansouri, Fatiha Bendali Saoudi, Noureddine Soltani
Abstract:
Biological control presents a means of control for the protection of the environment. Bacillus thuringiensis israelensis Berliner 1915 is an inseticide of biological origin because it is a bacterium of the Bacillaceae family. This biocide has a biological importance, because of its specific larvicidal action against Culicidae, blood-sucking insects, responsible for several diseases to humans and animals through the world. As well as, its high specificity for these insects. Also, the freshwater mites, this necessarily parasitic group for aquatic species such as the Physidae, also have an effective biological control against the Culicidae, because of their voracious predation to the larvae of these insects. The present work aims to study the effects of the biocide Bacillus thuringiensis var israelinsis, against non-target adults of water mites Eylais hamata Koenike, 1897, as well as its associated host species Physa marmorata Fitzinger, 1833. After 12 days of oral treatment of adults with lethal concentration (LC50:0.08µg/ml), determined from essays on 4th instar larvae of Culex pipiens (hematophagous insects). No adverse effect has been recorded for adult individuals of Eylais hamata, contrary, snail Physa marmorata were sensitive for this dose of Bti. In parallel, after treatment at the Bti by LC50, the enzyme stress bio marker glutathione S-transferase, was measured after 24, 48 and 72 hours. The enzymatic activity of GST has increased after 24 and 48 hours following treatment.Keywords: biological control, Bacillus thuringiensis var israelinsis, culicidae, hydrachnidia, enzymatic activity
Procedia PDF Downloads 6502838 Repositioning Sodium Valproate for Amelioration of Bleomycin-induced Scleroderma: The Role of Oxidative Stress, Transforming Growth Factor Beta-1, and the Mammalian Target of Rapamycin
Authors: Ahmed M. Kabel, Maaly A. Abd Elmaaboud
Abstract:
Scleroderma is one of the connective tissue disorders characterized by skin and systemic fibrosis. Its pathogenesis involves multiple interrelated processes of autoimmunity, vasculopathy, inflammation, and oxidative stress. This study was a trial to explore the possible ameliorative effects of sodium valproate on an experimental model of skin fibrosis induced by bleomycin. Forty male BALB/c mice were divided into four equal groups as follows: control group; bleomycin group; bleomycin + sodium valproate group, and sodium valproate group. Mice were assessed for their body weight every four days throughout the whole study. Skin tissues were used to evaluate the oxidative stress parameters, transforming growth factor beta 1 (TGF-β1), tumor necrosis factor alpha (TNF-α), interleukin 15, and mammalian target of rapamycin (mTOR). Skin fibrosis was evaluated by measuring dermal thickness and staining the skin tissues with Masson trichrome stain. Also, the skin tissues were immunostained with alpha smooth muscle actin (α-SMA). Administration of sodium valproate to bleomycin-treated mice resulted in the restoration of the body weight with a significant decrease in the dermal thickness, amelioration of oxidative stress, suppression of TGF-β1 and mTOR expression, and significant reduction of the percentage of α-SMA immunostaining and the proinflammatory cytokine levels compared to mice treated with bleomycin alone. In conclusion, sodium valproate has an antifibrotic effect on skin fibrosis which may represent a beneficial therapeutic modality for the management of scleroderma.Keywords: scleroderma, bleomycin, sodium valproate, skin fibrosis
Procedia PDF Downloads 822837 Characterizing Multivariate Thresholds in Industrial Engineering
Authors: Ali E. Abbas
Abstract:
This paper highlights some of the normative issues that might result by setting independent thresholds in risk analyses and particularly with safety regions. A second objective is to explain how such regions can be specified appropriately in a meaningful way. We start with a review of the importance of setting deterministic trade-offs among target requirements. We then show how to determine safety regions for risk analysis appropriately using utility functions.Keywords: decision analysis, thresholds, risk, reliability
Procedia PDF Downloads 3122836 Corporate Governance in India: A Critical Analysis with Respect to Financial Market Crisis
Authors: Sonal Purohit, Animesh Dubey
Abstract:
Corporate governance deals with the entire network of formal and informal relationship with the management of the company and company’s stakeholders including employees, customers, creditors, local communities, and society in general. The recent financial crisis was truly a global crisis in its nature and effects. The Indian financial markets were not immune to this global financial crisis. It is believed that corporate governance also had a major role to play in staggering the effect of this crisis. The objective of this paper is to examine the failure of prevailing corporate governance practice in India during financial crisis. Lack of appropriate implementation of the corporate government norms was a reason behind the phenomenon of money being pulled-out by FIIs, which constitute major investors and influencers of the Indian financial market.Keywords: corporate governance, FII, financial market, financial crisis
Procedia PDF Downloads 4772835 Chatbots and the Future of Globalization: Implications of Businesses and Consumers
Authors: Shoury Gupta
Abstract:
Chatbots are a rapidly growing technological trend that has revolutionized the way businesses interact with their customers. With the advancements in artificial intelligence, chatbots can now mimic human-like conversations and provide instant and efficient responses to customer inquiries. In this research paper, we aim to explore the implications of chatbots on the future of globalization for both businesses and consumers. The paper begins by providing an overview of the current state of chatbots in the global market and their growth potential in the future. The focus is on how chatbots have become a valuable tool for businesses looking to expand their global reach, especially in areas with high population density and language barriers. With chatbots, businesses can engage with customers in different languages and provide 24/7 customer service support, creating a more accessible and convenient customer experience. The paper then examines the impact of chatbots on cross-cultural communication and how they can help bridge communication gaps between businesses and consumers from different cultural backgrounds. Chatbots can potentially facilitate cross-cultural communication by offering real-time translations, voice recognition, and other innovative features that can help users communicate effectively across different languages and cultures. By providing more accessible and inclusive communication channels, chatbots can help businesses reach new markets and expand their customer base, making them more competitive in the global market. However, the paper also acknowledges that there are potential drawbacks associated with chatbots. For instance, chatbots may not be able to address complex customer inquiries that require human input. Additionally, chatbots may perpetuate biases if they are programmed with certain stereotypes or assumptions about different cultures. These drawbacks may have significant implications for businesses and consumers alike. To explore the implications of chatbots on the future of globalization in greater detail, the paper provides a thorough review of existing literature and case studies. The review covers topics such as the benefits of chatbots for businesses and consumers, the potential drawbacks of chatbots, and how businesses can mitigate any risks associated with chatbot use. The paper also discusses the ethical considerations associated with chatbot use, such as privacy concerns and the need to ensure that chatbots do not discriminate against certain groups of people. The ethical implications of chatbots are particularly important given the potential for chatbots to be used in sensitive areas such as healthcare and financial services. Overall, this research paper provides a comprehensive analysis of chatbots and their implications for the future of globalization. By exploring both the potential benefits and drawbacks of chatbot use, the paper aims to provide insights into how businesses and consumers can leverage this technology to achieve greater global reach and improve cross-cultural communication. Ultimately, the paper concludes that chatbots have the potential to be a powerful tool for businesses looking to expand their global footprint and improve their customer experience, but that care must be taken to mitigate any risks associated with their use.Keywords: chatbots, conversational AI, globalization, businesses
Procedia PDF Downloads 972834 Abandoned Mine Methane Mitigation in the United States
Authors: Jerome Blackman, Pamela Franklin, Volha Roshchanka
Abstract:
The US coal mining sector accounts for 6% of total US Methane emissions (2021). 60% of US coal mining methane emissions come from active underground mine ventilation systems. Abandoned mines contribute about 13% of methane emissions from coal mining. While there are thousands of abandoned underground coal mines in the US, the Environmental Protection Agency (EPA) estimates that fewer than 100 have sufficient methane resources for viable methane recovery and use projects. Many abandoned mines are in remote areas far from potential energy customers and may be flooded, further complicating methane recovery. Because these mines are no longer active, recovery projects can be simpler to implement.Keywords: abandoned mines, coal mine methane, coal mining, methane emissions, methane mitigation, recovery and use
Procedia PDF Downloads 782833 Ebola Virus Glycoprotein Inhibitors from Natural Compounds: Computer-Aided Drug Design
Authors: Driss Cherqaoui, Nouhaila Ait Lahcen, Ismail Hdoufane, Mehdi Oubahmane, Wissal Liman, Christelle Delaite, Mohammed M. Alanazi
Abstract:
The Ebola virus is a highly contagious and deadly pathogen that causes Ebola virus disease. The Ebola virus glycoprotein (EBOV-GP) is a key factor in viral entry into host cells, making it a critical target for therapeutic intervention. Using a combination of computational approaches, this study focuses on the identification of natural compounds that could serve as potent inhibitors of EBOV-GP. The 3D structure of EBOV-GP was selected, with missing residues modeled, and this structure was minimized and equilibrated. Two large natural compound databases, COCONUT and NPASS, were chosen and filtered based on toxicity risks and Lipinski’s Rule of Five to ensure drug-likeness. Following this, a pharmacophore model, built from 22 reported active inhibitors, was employed to refine the selection of compounds with a focus on structural relevance to known Ebola inhibitors. The filtered compounds were subjected to virtual screening via molecular docking, which identified ten promising candidates (five from each database) with strong binding affinities to EBOV-GP. These compounds were then validated through molecular dynamics simulations to evaluate their binding stability and interactions with the target. The top three compounds from each database were further analyzed using ADMET profiling, confirming their favorable pharmacokinetic properties, stability, and safety. These results suggest that the selected compounds have the potential to inhibit EBOV-GP, offering new avenues for antiviral drug development against the Ebola virus.Keywords: EBOV-GP, Ebola virus glycoprotein, high-throughput drug screening, molecular docking, molecular dynamics, natural compounds, pharmacophore modeling, virtual screening
Procedia PDF Downloads 222832 High Throughput Virtual Screening against ns3 Helicase of Japanese Encephalitis Virus (JEV)
Authors: Soma Banerjee, Aamen Talukdar, Argha Mandal, Dipankar Chaudhuri
Abstract:
Japanese Encephalitis is a major infectious disease with nearly half the world’s population living in areas where it is prevalent. Currently, treatment for it involves only supportive care and symptom management through vaccination. Due to the lack of antiviral drugs against Japanese Encephalitis Virus (JEV), the quest for such agents remains a priority. For these reasons, simulation studies of drug targets against JEV are important. Towards this purpose, docking experiments of the kinase inhibitors were done against the chosen target NS3 helicase as it is a nucleoside binding protein. Previous efforts regarding computational drug design against JEV revealed some lead molecules by virtual screening using public domain software. To be more specific and accurate regarding finding leads, in this study a proprietary software Schrödinger-GLIDE has been used. Druggability of the pockets in the NS3 helicase crystal structure was first calculated by SITEMAP. Then the sites were screened according to compatibility with ATP. The site which is most compatible with ATP was selected as target. Virtual screening was performed by acquiring ligands from databases: KinaseSARfari, KinaseKnowledgebase and Published inhibitor Set using GLIDE. The 25 ligands with best docking scores from each database were re-docked in XP mode. Protein structure alignment of NS3 was performed using VAST against MMDB, and similar human proteins were docked to all the best scoring ligands. The low scoring ligands were chosen for further studies and the high scoring ligands were screened. Seventy-three ligands were listed as the best scoring ones after performing HTVS. Protein structure alignment of NS3 revealed 3 human proteins with RMSD values lesser than 2Å. Docking results with these three proteins revealed the inhibitors that can interfere and inhibit human proteins. Those inhibitors were screened. Among the ones left, those with docking scores worse than a threshold value were also removed to get the final hits. Analysis of the docked complexes through 2D interaction diagrams revealed the amino acid residues that are essential for ligand binding within the active site. Interaction analysis will help to find a strongly interacting scaffold among the hits. This experiment yielded 21 hits with the best docking scores which could be investigated further for their drug like properties. Aside from getting suitable leads, specific NS3 helicase-inhibitor interactions were identified. Selection of Target modification strategies complementing docking methodologies which can result in choosing better lead compounds are in progress. Those enhanced leads can lead to better in vitro testing.Keywords: antivirals, docking, glide, high-throughput virtual screening, Japanese encephalitis, ns3 helicase
Procedia PDF Downloads 2302831 In vitro Skin Model for Enhanced Testing of Antimicrobial Textiles
Authors: Steven Arcidiacono, Robert Stote, Erin Anderson, Molly Richards
Abstract:
There are numerous standard test methods for antimicrobial textiles that measure activity against specific microorganisms. However, many times these results do not translate to the performance of treated textiles when worn by individuals. Standard test methods apply a single target organism grown under optimal conditions to a textile, then recover the organism to quantitate and determine activity; this does not reflect the actual performance environment that consists of polymicrobial communities in less than optimal conditions or interaction of the textile with the skin substrate. Here we propose the development of in vitro skin model method to bridge the gap between lab testing and wear studies. The model will consist of a defined polymicrobial community of 5-7 commensal microbes simulating the skin microbiome, seeded onto a solid tissue platform to represent the skin. The protocol would entail adding a non-commensal test organism of interest to the defined community and applying a textile sample to the solid substrate. Following incubation, the textile would be removed and the organisms recovered, which would then be quantitated to determine antimicrobial activity. Important parameters to consider include identification and assembly of the defined polymicrobial community, growth conditions to allow the establishment of a stable community, and choice of skin surrogate. This model could answer the following questions: 1) is the treated textile effective against the target organism? 2) How is the defined community affected? And 3) does the textile cause unwanted effects toward the skin simulant? The proposed model would determine activity under conditions comparable to the intended application and provide expanded knowledge relative to current test methods.Keywords: antimicrobial textiles, defined polymicrobial community, in vitro skin model, skin microbiome
Procedia PDF Downloads 1372830 Evaluation Means in English and Russian Academic Discourse: Through Comparative Analysis towards Translation
Authors: Albina Vodyanitskaya
Abstract:
Given the culture- and language-specific nature of evaluation, this phenomenon is widely studied around the linguistic world and may be regarded as a challenge for translators. Evaluation penetrates all the levels of a scientific text, influences its composition and the reader’s attitude towards the information presented. One of the most challenging and rarely studied phenomena is the individual style of the scientific writer, which is mostly reflected in the use of evaluative language means. The evaluative and expressive potential of a scientific text is becoming more and more welcoming area for researchers, which stems in the shift towards anthropocentric paradigm in linguistics. Other reasons include: the cognitive and psycholinguistic processes that accompany knowledge acquisition, a genre-determined nature of a scientific text, the increasing public concern about the quality of scientific papers and some such. One more important issue, is the fact that linguists all over the world still argue about the definition of evaluation and its functions in the text. The author analyzes various approaches towards the study of evaluation and scientific texts. A comparative analysis of English and Russian dissertations and other scientific papers with regard to evaluative language means reveals major differences and similarities between English and Russian scientific style. Though standardized and genre-specific, English scientific texts contain more figurative and expressive evaluative means than the Russian ones, which should be taken into account while translating scientific papers. The processes that evaluation undergoes while being expressed by means of a target language are also analyzed. The author offers a target-language-dependent strategy for the translation of evaluation in English and Russian scientific texts. The findings may contribute to the theory and practice of translation and can increase scientific writers’ awareness of inter-language and intercultural differences in evaluative language means.Keywords: academic discourse, evaluation, scientific text, scientific writing, translation
Procedia PDF Downloads 3542829 Ex-vivo Bio-distribution Studies of a Potential Lung Perfusion Agent
Authors: Shabnam Sarwar, Franck Lacoeuille, Nadia Withofs, Roland Hustinx
Abstract:
After the development of a potential surrogate of MAA, and its successful application for the diagnosis of pulmonary embolism in artificially embolized rats’ lungs, this microparticulate system were radiolabelled with gallium-68 to synthesize 68Ga-SBMP with high radiochemical purity >99%. As a prerequisite step of clinical trials, 68Ga- labelled starch based microparticles (SBMP) were analysed for their in-vivo behavior in small animals. The purpose of the presented work includes the ex-vivo biodistribution studies of 68Ga-SBMP in order to assess the activity uptake in target organs with respect to time, excretion pathways of the radiopharmaceutical, %ID/g in major organs, T/NT ratios, in-vivo stability of the radiotracer and subsequently the microparticles in the target organs. Radiolabelling of starch based microparticles was performed by incubating it with 68Ga generator eluate (430±26 MBq) at room temperature and pressure without using any harsh reaction condition. For Ex-vivo biodistribution studies healthy White Wistar rats weighing between 345-460 g were injected intravenously 68Ga-SBMP 20±8 MBq, containing about 2,00,000-6,00,000 SBMP particles in a volume of 700µL. The rats were euthanized at predefined time intervals (5min, 30min, 60min and 120min) and their organ parts were cut, washed, and put in the pre-weighed tubes and measured for radioactivity counts through automatic Gamma counter. The 68Ga-SBMP produced >99% RCP just after 10-20 min incubation through a simple and robust procedure. Biodistribution of 68Ga-SBMP showed that initially just after 5 min post injection major uptake was observed in the lungs following by blood, heart, liver, kidneys, bladder, urine, spleen, stomach, small intestine, colon, skin and skeleton, thymus and at last the smallest activity was found in brain. Radioactivity counts stayed stable in lungs with gradual decrease with the passage of time, and after 2h post injection, almost half of the activity were seen in lungs. This is a sufficient time to perform PET/CT lungs scanning in humans while activity in the liver, spleen, gut and urinary system decreased with time. The results showed that urinary system is the excretion pathways instead of hepatobiliary excretion. There was a high value of T/NT ratios which suggest fine tune images for PET/CT lung perfusion studies henceforth further pre-clinical studies and then clinical trials should be planned in order to utilize this potential lung perfusion agent.Keywords: starch based microparticles, gallium-68, biodistribution, target organs, excretion pathways
Procedia PDF Downloads 1732828 A Process Model for Online Trip Reservation System
Authors: Sh. Wafa, M. Alanoud, S. Liyakathunisa
Abstract:
Online booking for a trip or hotel has become an indispensable traveling tool today, people tend to be more interested in selecting air flight travel as their first choice when going for a long trip. People's shopping behavior has greatly changed by the advent of social network. Traditional ticket booking methods are considered as outdated with the advancement in tools and technology. Web based booking framework is an 'absolute necessity to have' for any visit or movement business that is investing heaps of energy noting telephone calls, sending messages or considering employing more staff. In this paper, we propose a process model for online trip reservation for our designed web application. Our proposed system will be highly beneficial and helps in reduction in time and cost for customers.Keywords: trip, hotel, reservation, process model, time, cost, web app
Procedia PDF Downloads 2142827 Optimizing Nitrogen Fertilizer Application in Rice Cultivation: A Decision Model for Top and Ear Dressing Dosages
Authors: Ya-Li Tsai
Abstract:
Nitrogen is a vital element crucial for crop growth, significantly influencing crop yield. In rice cultivation, farmers often apply substantial nitrogen fertilizer to maximize yields. However, excessive nitrogen application increases the risk of lodging and pest infestation, leading to yield losses. Additionally, conventional flooded irrigation methods consume significant water resources, necessitating precise agricultural and intelligent water management systems. In this study, it leveraged physiological data and field images captured by unmanned aerial vehicles, considering fertilizer treatment and irrigation as key factors. Statistical models incorporating rice physiological data, yield, and vegetation indices from image data were developed. Missing physiological data were addressed using multiple imputation and regression methods, and regression models were established using principal component analysis and stepwise regression. Target nitrogen accumulation at key growth stages was identified to optimize fertilizer application, with the difference between actual and target nitrogen accumulation guiding recommendations for ear dressing dosage. Field experiments conducted in 2022 validated the recommended ear dressing dosage, demonstrating no significant difference in final yield compared to traditional fertilizer levels under alternate wetting and drying irrigation. These findings highlight the efficacy of applying recommended dosages based on fertilizer decision models, offering the potential for reduced fertilizer use while maintaining yield in rice cultivation.Keywords: intelligent fertilizer management, nitrogen top and ear dressing fertilizer, rice, yield optimization
Procedia PDF Downloads 822826 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target
Authors: Lawan Ja’afar Tahir
Abstract:
This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.Keywords: border, insecurity, weapons, management
Procedia PDF Downloads 68