Search results for: mining organisation
1355 Disability Discrimination in Nigeria Employment Market: A Case Study of Nigeria Airspace Management Agency
Authors: Okupe Temitope Oluwaseun
Abstract:
Purpose: The paper determines the existing position of attitudes to disability in a Nigerian organisation. It further assessed the progress that has been made in relation to employment matters as an indication of the Nigerian employment market. Design/methodology/approach: The paper discusses an investigative study which adopted survey research-based approach involving a Nigerian Management Agency. Findings: The paper finds that, although there have been some steps forward, not much has been done with regard to disability equality in the Nigerian employment market. Lack of education, lack of implementing and enforcing the law, inadequate awareness process and international culture have contributed to the current situation. International culture, in particular, is one of the major attributes to lack of disability equality. For example, in the rural areas, the majority of people believe that disability is a form of witchcraft. This paper argues that these traditions, attitudes, and beliefs make it difficult for an organisation to recruit people with disability. Practical Implications: This paper provides a deeper understanding of how organisations can address attitudes to disability within the workplace in Nigeria. The research findings give a fresher perspective on some of the issues associated with disability in this country. This increased understanding has potential to improve the education and training of staff in this area. Originality/value: A paper which human resources managers in Nigerian organisation and the rest of the world can reflect upon in order to assess their own organisation attitudes to the employment of staff with a disability.Keywords: disability, international culture, Nigeria, attitudes
Procedia PDF Downloads 2561354 Customer Churn Analysis in Telecommunication Industry Using Data Mining Approach
Authors: Burcu Oralhan, Zeki Oralhan, Nilsun Sariyer, Kumru Uyar
Abstract:
Data mining has been becoming more and more important and a wide range of applications in recent years. Data mining is the process of find hidden and unknown patterns in big data. One of the applied fields of data mining is Customer Relationship Management. Understanding the relationships between products and customers is crucial for every business. Customer Relationship Management is an approach to focus on customer relationship development, retention and increase on customer satisfaction. In this study, we made an application of a data mining methods in telecommunication customer relationship management side. This study aims to determine the customers profile who likely to leave the system, develop marketing strategies, and customized campaigns for customers. Data are clustered by applying classification techniques for used to determine the churners. As a result of this study, we will obtain knowledge from international telecommunication industry. We will contribute to the understanding and development of this subject in Customer Relationship Management.Keywords: customer churn analysis, customer relationship management, data mining, telecommunication industry
Procedia PDF Downloads 3161353 Exploring the Relationship between Organisational Identity and Value Systems: Reflecting on the Values-Crafting Process in a Multi-National Organisation within the Entertainment Industry
Authors: Dieter Veldsman, Theo Heyns Veldsman
Abstract:
The knowledge economy demands an organisation that is flexible, adaptable and able to navigate the ever-changing environment. This fast-paced environment has however resulted in an organizational landscape that battles to engage employees, retain top talent and create meaningful work for its members. In the knowledge economy, the concept of organizational identity has become an important consideration as organisations aim to create a compelling and inviting narrative for all stakeholders across the business value chain. Values are often seen as the behavioural framework that informs organisational culture, yet often values are perceived to be inauthentic and misaligned with the true character or identity of the organisation and how it is perceived by different role players. This paper focuses on exploring the relationship between organisational identity and value systems by focusing on a case study within a multi-national organisation within South Africa. The paper evaluates the implementation of mixed methods OD approach that gathered collaborative inputs of more than 4500 employees who participated in crafting the newly established values system post a retrenchment process. The paper will evaluate the relationship between the newly crafted value system and the identity of the organisation as described by various internal and external stakeholders in order to explore potential alignment, dissonance and key insights into understanding the relationship between organisational identity and values. The case study will be reported from the perspective of an OD consultant who supported the transformation process over a period of 8 months and aims to provide key insights into values and identity alignment within knowledge economy organisations. From a practical perspective, the paper provides insights into how values are created, perceived and lived within organisations and the impact on employee engagement and culture.Keywords: culture, organisational development, organisational identity, values
Procedia PDF Downloads 3081352 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database
Authors: Manvar Sagar, Nikul Virpariya
Abstract:
The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing
Procedia PDF Downloads 4061351 Business Intelligence for Profiling of Telecommunication Customer
Authors: Rokhmatul Insani, Hira Laksmiwati Soemitro
Abstract:
Business Intelligence is a methodology that exploits the data to produce information and knowledge systematically, business intelligence can support the decision-making process. Some methods in business intelligence are data warehouse and data mining. A data warehouse can store historical data from transactional data. For data modelling in data warehouse, we apply dimensional modelling by Kimball. While data mining is used to extracting patterns from the data and get insight from the data. Data mining has many techniques, one of which is segmentation. For profiling of telecommunication customer, we use customer segmentation according to customer’s usage of services, customer invoice and customer payment. Customers can be grouped according to their characteristics and can be identified the profitable customers. We apply K-Means Clustering Algorithm for segmentation. The input variable for that algorithm we use RFM (Recency, Frequency and Monetary) model. All process in data mining, we use tools IBM SPSS modeller.Keywords: business intelligence, customer segmentation, data warehouse, data mining
Procedia PDF Downloads 4811350 A Study of Soil Heavy Metal Pollution in the Manganese Mining in Drama, Greece
Authors: A. Argiri, A. Molla, Tzouvalekas, E. Skoufogianni, N. Danalatos
Abstract:
The release of heavy metals into the environment has increased over the last years. In this study, 25 soil samples (0-15 cm) from the fields near the mining area in Drama region were selected. The samples were analyzed in the laboratory for their physicochemical properties and for seven “pseudo-total’’ heavy metals content, namely Pb, Zn, Cd, Cr, Cu, Ni, and Mn. The total metal concentrations (Pb, Zn, Cd, Cr, Cu, Ni and Mn) in digests were determined by using the atomic absorption spectrophotometer. According to the results, the mean concentration of the listed heavy metals in 25 soil samples are Cd 1.1 mg/kg, Cr 15 mg/kg, Cu 21.7 mg/kg, Ni 30.1 mg/kg, Pd 50.8 mg/kg, Zn 99.5 mg/kg and Mn 815.3 mg/kg. The results show that the heavy metals remain in the soil even if the mining closed many years ago.Keywords: Greece, heavy metals, mining, pollution
Procedia PDF Downloads 1271349 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct
Authors: Muhammet Dursun Kaya, Hasan Asil
Abstract:
One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.Keywords: information technology, data mining, scientific development, clustering
Procedia PDF Downloads 2761348 Quantification of GHGs Emissions from Electricity and Diesel Fuel Consumption in Basalt Mining Industry in Thailand
Authors: S. Kittipongvises, A. Dubsok
Abstract:
The mineral and mining industry is necessary for countries to have an adequate and reliable supply of materials to meet their socio-economic development. Despite its importance, the environmental impacts from mineral exploration are hugely significant. This study aimed to investigate and quantify the amount of GHGs emissions emitted from both electricity and diesel vehicle fuel consumption in basalt mining in Thailand. Plant A, located in the northeastern region of Thailand, was selected as a case study. Results indicated that total GHGs emissions from basalt mining and operation (Plant A) were approximately 2,501,086 kgCO2e and 1,997,412 kgCO2e in 2014 and 2015, respectively. The estimated carbon intensity ranged between 1.824 kgCO2e to 2.284 kgCO2e per ton of rock product. Scope 1 (direct emissions) was the dominant driver of its total GHGs compared to scope 2 (indirect emissions). As such, transport related combustion of diesel fuels generated the highest GHGs emission (65%) compared to emissions from purchased electricity (35%). Some of the potential implications for mining entities were also presented.Keywords: basalt mining, diesel fuel, electricity, GHGs emissions, Thailand
Procedia PDF Downloads 2641347 Identification of Environmental Damage Due to Mining Area Bangka Islands in Indonesia
Authors: Aroma Elmina Martha
Abstract:
Environment affects the continuity of life and human well-being and the bodies of other living. Environmental quality is very closely related to the quality of life. Sustainability must be protected from damage due to the use of natural resources, such as tin mining in Bangka island. This research is a descriptive study, which identifies the environmental damage caused by mining land and sea in Bangka district. The approach used is juridical, social and economic. The study uses primary legal materials, secondary, and tertiary, equipped with field research. The analysis technique used is qualitative analysis. The impacts of mining on land among other physical and chemical damage, erosion and widening the depth of the river, a pool of micro-climate, the quality and feasibility, vegetation, wildlife and biodiversity, land values, social and economic. This mining causes damage to the soil structure, and puddles in the former digs which were not backfilled again. The impact of mining on the ocean such as changes in current surge, erosion and abrasion basic coastal waters, shoreline change, marine water quality changes, and changes in marine communities. The findings of the research show that tin mining in the sea also potentially have a significant impact on the life of the reef, populations of marine organisms. However, mining on land needs to consider the impact of the damage, so that the damage can be minimized. In the recovery process needs to be pursued by exploiting the rest of the pile of tin. Thus, mining activities should take into account the distance of beach sediment size, wave height, wave length, wave period, and the acceleration of gravity. The process of the tin washing should be done in a fairly safe area, thus avoiding damage to the coral reefs that will eventually reduce the population of marine life.Keywords: abration, environmental damage, mining, shoreline
Procedia PDF Downloads 3211346 Critical Review of Web Content Mining Extraction Mechanisms
Authors: Rabia Bashir, Sajjad Akbar
Abstract:
There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval
Procedia PDF Downloads 5451345 Static vs. Stream Mining Trajectories Similarity Measures
Authors: Musaab Riyadh, Norwati Mustapha, Dina Riyadh
Abstract:
Trajectory similarity can be defined as the cost of transforming one trajectory into another based on certain similarity method. It is the core of numerous mining tasks such as clustering, classification, and indexing. Various approaches have been suggested to measure similarity based on the geometric and dynamic properties of trajectory, the overlapping between trajectory segments, and the confined area between entire trajectories. In this article, an evaluation of these approaches has been done based on computational cost, usage memory, accuracy, and the amount of data which is needed in advance to determine its suitability to stream mining applications. The evaluation results show that the stream mining applications support similarity methods which have low computational cost and memory, single scan on data, and free of mathematical complexity due to the high-speed generation of data.Keywords: global distance measure, local distance measure, semantic trajectory, spatial dimension, stream data mining
Procedia PDF Downloads 3921344 A GIS Based Composite Land Degradation Assessment and Mapping of Tarkwa Mining Area
Authors: Bernard Kumi-Boateng, Kofi Bonsu
Abstract:
The clearing of vegetation in the Tarkwa Mining Area (TMA) for the purposes of mining, lumbering and development of settlement for the increasing population has caused a large scale denudation of the forest cover and erosion of the top soil thereby degrading the agriculture land. It is, therefore, essential to know the current status of land degradation in TMA so as to facilitate land conservation policy-making. The types of degradation, the extents of the degradations and their various degrees were combined to develop a composite land degradation index to assess the current status of land degradation in TMA using GIS based techniques. The assessment revealed that the most significant types of degradation in TMA were open pit and quarry mining; urbanisation and other construction projects; and surface scraping during land clearing. It was found that 21.62 % of the total area of TMA (353.07 km2) had high degradation index rating. It is recommended that decision makers use this assessment as a reference point for future initiatives that will be taken in order to develop land conservation policy.Keywords: degradation, GIS, land, mining
Procedia PDF Downloads 3521343 The Application of Data Mining Technology in Building Energy Consumption Data Analysis
Authors: Liang Zhao, Jili Zhang, Chongquan Zhong
Abstract:
Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.Keywords: data mining, data analysis, prediction, optimization, building operational performance
Procedia PDF Downloads 8511342 Annual Effective Dose Associated with Radon in Groundwater Samples from Mining Communities Within the Ife-Ilesha Schist Belt, Southwestern Nigeria.
Authors: Paulinah Oyindamola Fasanmi, Matthew Omoniyi Isinkaye
Abstract:
In this study, the activity concentration of ²²²Rn in groundwater samples collected from gold and kaolin mining communities within the Ife-Ilesha schist belt, southwestern Nigeria, with their corresponding annual effective doses have been determined using the Durridge RAD-7, radon-in-water detector. The mean concentration of ²²²Rn in all the groundwater samples was 13.83 Bql-¹. In borehole water, ²²²Rn had a mean value of 20.68 Bql-¹, while it had a mean value of 11.67 Bql-¹ in well water samples. The mean activity concentration of radon obtained from the gold mining communities ranged from 1.6 Bql-¹ from Igun town to 4.8 Bql-¹ from Ilesha town. A higher mean value of 41.8 Bql-¹ was, however, obtained from Ijero, which is the kaolin mining community. The mean annual effective dose due to ingestion and inhalation of radon from groundwater samples was obtained to be 35.35 μSvyr-¹ and 34.86 nSvyr-¹, respectively. The mean annual ingestion dose estimated for well water samples was 29.90 μSvyr-¹, while 52.85 μSvyr-¹ was obtained for borehole water samples. On the other hand, the mean annual inhalation dose for well water was 29.49 nSvyr-¹, while for borehole water, 52.13 nSvyr-¹ was obtained. The mean annual effective dose due to ingestion of radon in groundwater from the gold mining communities ranged from 4.10 μSvyr-¹ from Igun to 13.1 μSvyr-¹ from Ilesha, while a mean value of 106.7 μSvyr-¹ was obtained from Ijero kaolin mining community. For inhalation, the mean value varied from 4.0 nSvyr-¹ from Igun to 12.9 nSvyr-¹ from Ilesha, while 105.2 nSvyr-¹ was obtained from the kaolin mining community. The mean annual effective dose due to ingestion and inhalation is lower than the reference level of 100 μSvyr-¹ recommended by World Health Organization except for values obtained from Ijero kaolin mining community, which exceeded the reference levels. It has been concluded that as far as radon-related health risks are concerned, groundwater from gold mining communities is generally safe, while groundwater from kaolin mining communities needs mitigation and monitoring. It has been discovered that Kaolin mining impacts groundwater with ²²²Rn than gold mining. Also, the radon level in borehole water exceeds its level in well water.Keywords: 222Rn, Groundwater, Radioactivity, Annual Effective Dose, Mining.
Procedia PDF Downloads 681341 Spontaneous Message Detection of Annoying Situation in Community Networks Using Mining Algorithm
Authors: P. Senthil Kumari
Abstract:
Main concerns in data mining investigation are social controls of data mining for handling ambiguity, noise, or incompleteness on text data. We describe an innovative approach for unplanned text data detection of community networks achieved by classification mechanism. In a tangible domain claim with humble secrecy backgrounds provided by community network for evading annoying content is presented on consumer message partition. To avoid this, mining methodology provides the capability to unswervingly switch the messages and similarly recover the superiority of ordering. Here we designated learning-centered mining approaches with pre-processing technique to complete this effort. Our involvement of work compact with rule-based personalization for automatic text categorization which was appropriate in many dissimilar frameworks and offers tolerance value for permits the background of comments conferring to a variety of conditions associated with the policy or rule arrangements processed by learning algorithm. Remarkably, we find that the choice of classifier has predicted the class labels for control of the inadequate documents on community network with great value of effect.Keywords: text mining, data classification, community network, learning algorithm
Procedia PDF Downloads 5081340 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 4131339 Abandoned Mine Methane Mitigation in the United States
Authors: Jerome Blackman, Pamela Franklin, Volha Roshchanka
Abstract:
The US coal mining sector accounts for 6% of total US Methane emissions (2021). 60% of US coal mining methane emissions come from active underground mine ventilation systems. Abandoned mines contribute about 13% of methane emissions from coal mining. While there are thousands of abandoned underground coal mines in the US, the Environmental Protection Agency (EPA) estimates that fewer than 100 have sufficient methane resources for viable methane recovery and use projects. Many abandoned mines are in remote areas far from potential energy customers and may be flooded, further complicating methane recovery. Because these mines are no longer active, recovery projects can be simpler to implement.Keywords: abandoned mines, coal mine methane, coal mining, methane emissions, methane mitigation, recovery and use
Procedia PDF Downloads 751338 Optimal Classifying and Extracting Fuzzy Relationship from Query Using Text Mining Techniques
Authors: Faisal Alshuwaier, Ali Areshey
Abstract:
Text mining techniques are generally applied for classifying the text, finding fuzzy relations and structures in data sets. This research provides plenty text mining capabilities. One common application is text classification and event extraction, which encompass deducing specific knowledge concerning incidents referred to in texts. The main contribution of this paper is the clarification of a concept graph generation mechanism, which is based on a text classification and optimal fuzzy relationship extraction. Furthermore, the work presented in this paper explains the application of fuzzy relationship extraction and branch and bound method to simplify the texts.Keywords: extraction, max-prod, fuzzy relations, text mining, memberships, classification, memberships, classification
Procedia PDF Downloads 5781337 Predicting Customer Purchasing Behaviour in Retail Marketing: A Research for a Supermarket Chain
Authors: Sabri Serkan Güllüoğlu
Abstract:
Analysis can be defined as the process of gathering, recording and researching data related to products and services, in order to learn something. But for marketers, analyses are not only used for learning but also an essential and critical part of the business, because this allows companies to offer products or services which are focused and well targeted. Market analysis also identify market trends, demographics, customer’s buying habits and important information on the competition. Data mining is used instead of traditional research, because it extracts predictive information about customer and sales from large databases. In contrast to traditional research, data mining relies on information that is already available. Simply the goal is to improve the efficiency of supermarkets. In this study, the purpose is to find dependency on products. For instance, which items are bought together, using association rules in data mining. Moreover, this information will be used for improving the profitability of customers such as increasing shopping time and sales of fewer sold items.Keywords: data mining, association rule mining, market basket analysis, purchasing
Procedia PDF Downloads 4821336 Small-Scale Mining Policies in Ghana: Miners' Knowledge, Attitudes and Practices
Authors: Franklin Nantui Mabe, Robert Osei
Abstract:
Activities and operations of artisanal small scale mining (ASM) have recently appealed to the attention of policymakers, researchers, and the general public in Ghana. This stems from the negative impacts of ASM operations on the environment and livelihoods of local inhabitants, as well as the disregard for available ASM mining policies. This study, therefore, investigates whether or not artisanal small-scale miners have enough knowledge of the mining policies and their implementations. The study adopted the Knowledge, Attitudes, and Practices (KAP) framework approach to design the research, collect and analyze primary data. The most aware ASM policy provision is the one that mandates the government to reserve demarcated ASM areas for Ghanaians, whilst the least aware provision is the one that admonishes the government to promote co-operative saving among ASM. The awareness index is lower than the attitude index towards the policy provisions. In terms of practices, miners continued to use bad practices with the associated negative impacts on the environment and rural livelihoods. It is therefore important for the government through mineral commission, district, municipal and metropolitan assemblies to intensify the education on the ASM policies. These could be done with the help of ASM associations. The current systems where a cluster of districts have a single Mineral Commission Office should be restructured to make sure that each mining district has an office.Keywords: mining policies, KAP, awareness, artisanal small-scale mining
Procedia PDF Downloads 1841335 Dietary Risk Assessment of Green Leafy Vegetables (GLV) Due to Heavy Metals from Selected Mining Areas
Authors: Simon Mensah Ofosu
Abstract:
Illicit surface mining activities pollutes agricultural lands and water bodies and results in accumulation of heavy metals in vegetables cultivated in such areas. Heavy metal (HM) accumulation in vegetables is a serious food safety issues due to the adverse effects of metal toxicities, hence the need to investigate the levels of these metals in cultivated vegetables in the eastern region. Cocoyam leaves, cabbage and cucumber were sampled from selected farms in mining areas (Atiwa District) and non -mining areas (Yilo Krobo and East Akim District) of the region for the study. Levels of Cadmium, Lead, Mercury and Arsenic were investigated in the vegetables with Atomic Absorption Spectrometer, and the results statistically analyzed with Microsoft Office Excel (2013) Spread Sheet and ANOVA. Cadmium (Cd) and arsenic (As) were the highest and least concentrated HM in the vegetables sampled, respectively. The mean concentrations of Cd and Pb in cabbage (0.564 mg/kg, 0.470 mg/kg), cucumber (0.389 mg/kg, 0.190 mg/kg), cocoyam leaves (0.410 mg/kg, 0.256 mg/kg) respectively from the mining areas exceeded the permissible limits set by Joint FAO/WHO. The mean concentrations of the metals in vegetables from the mining and non-mining areas varied significantly (P<0.05). The Target Hazard Quotient (THQ) was used to assess the health risk posed to the human population via vegetable consumption. The THQ values of cadmium, mercury, and lead in adults and children through vegetable consumption in the mining areas were greater than 1 (THQ >1). This indicates the potential health risk that the children and adults may be facing. The THQ values of adults and children in the non-mining areas were less than the safe limit of 1 (THQ<1), hence no significant health risk posed to the population from such areas.Keywords: food safety, risk assessment, illicit mining, public health, contaminated vegetables
Procedia PDF Downloads 911334 Doing Durable Organisational Identity Work in the Transforming World of Work: Meeting the Challenge of Different Workplace Strategies
Authors: Theo Heyns Veldsman, Dieter Veldsman
Abstract:
Organisational Identity (OI) refers to who and what the organisation is, what it stands for and does, and what it aspires to become. OI explores the perspectives of how we see ourselves, are seen by others and aspire to be seen. It provides as rationale the ‘why’ for the organisation’s continued existence. The most widely accepted differentiating features of OI are encapsulated in the organisation’s core, distinctive, differentiating, and enduring attributes. OI finds its concrete expression in the organisation’s Purpose, Vision, Strategy, Core Ideology, and Legacy. In the emerging new order infused by hyper-turbulence and hyper-fluidity, the VICCAS world, OI provides a secure anchor and steady reference point for the organisation, particularly the growing widespread focus on Purpose, which is indicative of the organisation’s sense of social citizenship. However, the transforming world of work (TWOW) - particularly the potent mix of ongoing disruptive innovation, the 4th Industrial Revolution, and the gig economy with the totally unpredicted COVID19 pandemic - has resulted in the consequential adoption of different workplace strategies by organisations in terms of how, where, and when work takes place. Different employment relations (transient to permanent); work locations (on-site to remote); work time arrangements (full-time at work to flexible work schedules); and technology enablement (face-to-face to virtual) now form the basis of the employer/employee relationship. The different workplace strategies, fueled by the demands of TWOW, pose a substantive challenge to organisations of doing durable OI work, able to fulfill OI’s critical attributes of core, distinctive, differentiating, and enduring. OI work is contained in the ongoing, reciprocally interdependent stages of sense-breaking, sense-giving, internalisation, enactment, and affirmation. The objective of our paper is to explore how to do durable OI work relative to different workplace strategies in the TWOW. Using a conceptual-theoretical approach from a practice-based orientation, the paper addresses the following topics: distinguishes different workplace strategies based upon a time/place continuum; explicates stage-wise the differential organisational content and process consequences of these strategies for durable OI work; indicates the critical success factors of durable OI work under these differential conditions; recommends guidelines for OI work relative to TWOW; and points out ethical implications of all of the above.Keywords: organisational identity, workplace strategies, new world of work, durable organisational identity work
Procedia PDF Downloads 1971333 Concept Drifts Detection and Localisation in Process Mining
Authors: M. V. Manoj Kumar, Likewin Thomas, Annappa
Abstract:
Process mining provides methods and techniques for analyzing event logs recorded in modern information systems that support real-world operations. While analyzing an event-log, state-of-the-art techniques available in process mining believe that the operational process as a static entity (stationary). This is not often the case due to the possibility of occurrence of a phenomenon called concept drift. During the period of execution, the process can experience concept drift and can evolve with respect to any of its associated perspectives exhibiting various patterns-of-change with a different pace. Work presented in this paper discusses the main aspects to consider while addressing concept drift phenomenon and proposes a method for detecting and localizing the sudden concept drifts in control-flow perspective of the process by using features extracted by processing the traces in the process log. Our experimental results are promising in the direction of efficiently detecting and localizing concept drift in the context of process mining research discipline.Keywords: abrupt drift, concept drift, sudden drift, control-flow perspective, detection and localization, process mining
Procedia PDF Downloads 3451332 Data Mining and Knowledge Management Application to Enhance Business Operations: An Exploratory Study
Authors: Zeba Mahmood
Abstract:
The modern business organizations are adopting technological advancement to achieve competitive edge and satisfy their consumer. The development in the field of Information technology systems has changed the way of conducting business today. Business operations today rely more on the data they obtained and this data is continuously increasing in volume. The data stored in different locations is difficult to find and use without the effective implementation of Data mining and Knowledge management techniques. Organizations who smartly identify, obtain and then convert data in useful formats for their decision making and operational improvements create additional value for their customers and enhance their operational capabilities. Marketers and Customer relationship departments of firm use Data mining techniques to make relevant decisions, this paper emphasizes on the identification of different data mining and Knowledge management techniques that are applied to different business industries. The challenges and issues of execution of these techniques are also discussed and critically analyzed in this paper.Keywords: knowledge, knowledge management, knowledge discovery in databases, business, operational, information, data mining
Procedia PDF Downloads 5371331 On an Approach for Rule Generation in Association Rule Mining
Authors: B. Chandra
Abstract:
In Association Rule Mining, much attention has been paid for developing algorithms for large (frequent/closed/maximal) itemsets but very little attention has been paid to improve the performance of rule generation algorithms. Rule generation is an important part of Association Rule Mining. In this paper, a novel approach named NARG (Association Rule using Antecedent Support) has been proposed for rule generation that uses memory resident data structure named FCET (Frequent Closed Enumeration Tree) to find frequent/closed itemsets. In addition, the computational speed of NARG is enhanced by giving importance to the rules that have lower antecedent support. Comparative performance evaluation of NARG with fast association rule mining algorithm for rule generation has been done on synthetic datasets and real life datasets (taken from UCI Machine Learning Repository). Performance analysis shows that NARG is computationally faster in comparison to the existing algorithms for rule generation.Keywords: knowledge discovery, association rule mining, antecedent support, rule generation
Procedia PDF Downloads 3221330 Reclamation of Mining Using Vegetation - A Comparative Study of Open Pit Mining
Authors: G. Surendra Babu
Abstract:
We all know the importance of mineral wealth, which has been buried inside the layers of the earth for decades. These are the natural energy sources that are used in our day to day life like fuel, electricity, construction, etc. but the process of extraction causes damage to the nature that can’t be returned back and which are left over after completion of mining we can see these are barren from decades these remain unused degraded land. Most of them are covered with vegetation before the start during mining which damages the native vegetation of the region and disturbs the watershed boundary of the regions and it also disturbs the biodiversity of the reign. The major motto of the study is to understand the various issues that are found and to understand various methods of reclamations process that are suitable for revegetating and also variously practiced which are carried out in the different case studies and government guidelines procedure of lease licenses which includes the environmental clearances and also to study the vegetation pattern according to the major issues identified. And finally suggesting the new guidelines with respect to the old guidelines which helps in the revegetation of the mine-sites which helps in establishing of its own sustainable ecosystem in future.Keywords: reclamation, open-pit mining, revegetation, reclamation methods
Procedia PDF Downloads 1901329 Harmonic Data Preparation for Clustering and Classification
Authors: Ali Asheibi
Abstract:
The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.Keywords: data mining, harmonic data, clustering, classification
Procedia PDF Downloads 2451328 Opportunity Development and Entrepreneurial Process
Authors: Abosede Mosunmola Odeseye
Abstract:
The sustainability of nations’ economies today have proven to be unrealistic in a constantly changing world without appropriate accordance to entrepreneurship role and its processes. This role has therefore proven to be a product of the available and discoverable opportunities by an individual/organisation in any pattern – innovation, discovery, diffusion, imitation amidst possible challenges. In light of these, this paper examined the relationship between opportunity development and entrepreneurial processes as well as the factors determining individual’s opportunity development and the success of entrepreneurial processes. Systematic review method was adopted for selecting relevant academic materials. The theoretical base of this paper was anchored on Schumpeter’s entrepreneurial innovation model and Drucker and Stevenson’s opportunity-based entrepreneurship theory. Based on the reviewed literature, it was discovered that rough business idea “opportunity” in any form – techniques/product encounter various obstacles to achieve its development, acceptability and sustainability. In essence, the findings revealed that the birth of every opportunity is as a result of the individual/organisation and environmental factors to be able to scale through the whole process successfully. Due to the outcome of this paper, it was recommended that the organisations/government should endeavour to create an enabling environment for a rough business idea to come to life amidst the hurdles of the entrepreneurial process.Keywords: entrepreneurial process, entrepreneurship, opportunity, opportunity development, organisation, sustainability
Procedia PDF Downloads 2401327 The Impact of Demographic Profile on Strategic HRM Practices and its Challenges Faced by HR Managers in IT Firm, India: An Empirical Study
Authors: P. Saravanan, A. Vasumathi
Abstract:
Strategic Human Resource Management (SHRM) plays a vital role in formulating the policies and strategies for the company, in order to fulfill the employee’s requirement and to perform the job efficiently within the organisation. Human Resource Management (HRM) functions helps in attracting and motivating the talented workforce for the organisation and by increasing the performance of an individual, will result in achieving the defined goals and objectives for the company. HRM function plays an important role in managing the workers within organisation through a formal communication channel. Since HR functions acts as a mediatory role in between the employee as well as the employers within the organisation that helps in improving the efficacy and skills of the individuals employed within the company. HR manager acts as a change agent, enabling and driving the change management program with respect to business HR functions and its future requirements of the company. Due to change in the business environment, the focus of HR manager is shifting from administrative/personal functions in to a strategic business HR function. HR managers plays a strategic role in managing various HR functions such as recruitment and selection, human resource information system, manpower planning, performance management, conflict management, employee engagement, compensation management, policy formation and retention strategies followed within the industry. Major challenges faced by HR managers at work place are managing the level of engagement for the talented resources within the organisation, reducing the conflicts at workplace, mapping the talented resources through succession planning process, building the effective appraisal process and performance management system and mapping the compensation based on the skills and experience possed by the employee within the company. The authors conducted a study for the sample size of 75 HR managers from an Indian IT company through systematic sampling method. This study identifies that the female employees are facing lesser conflict than the male employees against their managers within the organisation and also the study determines the impact of demographic profile on strategic HRM practices and its challenges faced by HR managers in IT firm, India.Keywords: strategic human resource management, change agent, employee engagement, performance management, succession planning and conflict management
Procedia PDF Downloads 2971326 Business-Intelligence Mining of Large Decentralized Multimedia Datasets with a Distributed Multi-Agent System
Authors: Karima Qayumi, Alex Norta
Abstract:
The rapid generation of high volume and a broad variety of data from the application of new technologies pose challenges for the generation of business-intelligence. Most organizations and business owners need to extract data from multiple sources and apply analytical methods for the purposes of developing their business. Therefore, the recently decentralized data management environment is relying on a distributed computing paradigm. While data are stored in highly distributed systems, the implementation of distributed data-mining techniques is a challenge. The aim of this technique is to gather knowledge from every domain and all the datasets stemming from distributed resources. As agent technologies offer significant contributions for managing the complexity of distributed systems, we consider this for next-generation data-mining processes. To demonstrate agent-based business intelligence operations, we use agent-oriented modeling techniques to develop a new artifact for mining massive datasets.Keywords: agent-oriented modeling (AOM), business intelligence model (BIM), distributed data mining (DDM), multi-agent system (MAS)
Procedia PDF Downloads 428