Search results for: private technology park
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10085

Search results for: private technology park

9125 Visualize Global Warming and Its Consequences Using Augmented Reality

Authors: K. R. Parvathy, R. Rao Bhavani , M. L. McLain, Kamal Bijlani, R. Jayakrishnan

Abstract:

Augmented Reality (AR) technology is considered to be an important emerging technology used in education today. One potentially key use of AR in education is to teach socio-scientific issues (SSI), topics that inure students towards social conscience and critical thinking. This work uses multiple markers and virtual buttons that interact with each other, creating a life-like visual spectacle. Learning about issues such as global warming by using AR technology, students will have an increased sense of experiencing immersion, immediacy, and presence, thereby enhancing their learning as well as likely improving their ability to make better informed decisions about considerations of such issues. Another advantage of AR is that it is a low cost technology, making it advantageous for educators to adapt to their classrooms. Also in this work we compare the effectiveness of AR versus ordinary video by polling a group of students to assess the content understandability, effectiveness and interaction of both the delivery methods.

Keywords: augmented reality, global warming, multiple markers, virtual buttons

Procedia PDF Downloads 400
9124 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 358
9123 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case

Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan

Abstract:

The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.

Keywords: cloud computing, protocols, UDP multicast, virtualization

Procedia PDF Downloads 590
9122 Technological Developments in Logistics and its Applications in the Army

Authors: Gökhan Balci

Abstract:

“Armies march on their stomachs “mentioned Napoleon, who drew attentıon to the importance of logistics for the armies…In today’s World, in whıch continental trade gained importance, the crucial role of logistics became conspicuous since it was accepted by the business World that an effective logistics system is the key factor for success. Depending of the new developments in technology and techniques of logistics, the modern military institutions increase their effectiveness. The modern national armies or allied forces which operate in overseas, realize the importance of logistics as well. This study will focus on the applications of logistics in civilian business sector and modern armies, which may shed light on logistical problems of the other armies.

Keywords: modern logistics, application in armies, new technology in logistics, new developments in technology

Procedia PDF Downloads 491
9121 The Difficulties Male Nurses Facing up Due to the Nurse Degree which has the Meaning of ‘Sister’ in Turkish

Authors: Hacer Erdöl, Merve Aydın, Hacer Kobya Bulut, Kıymet Yeşilçiçek Çalık

Abstract:

Like all occupations, nursing is significantly influenced by the society which it serves and it also affects it. Social structure affects attitudes of nurses, nursing practice, society's attitudes towards nursing and those who have chosen nursing as a profession. People who choose nursing schools take the views of the society’s they live in on nursing to nursing school. Until the 1960s, many nursing schools had not accepted men as students and women had received nursing education and profession had been carried out by women. In our country, in 2007 an amendment to article eight of Nursing Law was passed and with these changes men also began to be able to choose the nursing as a profession. In Turkish, nurse means 'sister'. Hence, in this study to determine the problems that male nursing students likely encounter at the clinic, non-clinical environment and in their private life regarding the title of nurse, among qualitative research methods phenomenological research design was used. Using purpose sampling method, a total of 18 voluntary male students-13 in third grade and 5 in fourth grade at nursing school- were taken to the study. Data were collected through interviews and by the ethical principles much attention was paid to ensure the confidentiality and to protect participants’ identity. During the interviews lasting 30-40 minutes on average, nine pre-configured standard questions were asked and when necessary free questions were also used in order to ensure the clarity of the responses. With pre- configured standard questions, the reasons why students chose the profession, the problems they had in clinical and non-clinical environment and the potential problems they might encounter in their private lives regarding the title of nurse were questioned. Content analysis was performed on data collected and three main themes were obtained. According to the findings of the evaluation of data, it was found that almost all the students preferred the profession due to possible work opportunities, there were students who did not bother nurse title as well as the ones who did bother and as the most important problem they might encounter in their private lives was to feel worried if their kids had to answer "What does your father" question as "my dad is a nurse" and being ridiculed afterwards. The results of this study show that studies should be done to change the social judgment stemmed from the recognition of nursing as a female profession and take advantage of media through creating public spotlight to accomplish this.

Keywords: choice of profession, the title of the profession, title problems, nursing

Procedia PDF Downloads 200
9120 The Role of Information Technology in Supply Chain Management

Authors: V. Jagadeesh, K. Venkata Subbaiah, P. Govinda Rao

Abstract:

This paper explaining about the significance of information technology tools and software packages in supply chain management (SCM) in order to manage the entire supply chain. Managing materials flow and financial flow and information flow effectively and efficiently with the aid of information technology tools and packages in order to deliver right quantity with right quality of goods at right time by using right methods and technology. Information technology plays a vital role in streamlining the sales forecasting and demand planning and Inventory control and transportation in supply networks and finally deals with production planning and scheduling. It achieves the objectives by streamlining the business process and integrates within the enterprise and its extended enterprise. SCM starts with customer and it involves sequence of activities from customer, retailer, distributor, manufacturer and supplier within the supply chain framework. It is the process of integrating demand planning and supply network planning and production planning and control. Forecasting indicates the direction for planning raw materials in order to meet the production planning requirements. Inventory control and transportation planning allocate the optimal or economic order quantity by utilizing shortest possible routes to deliver the goods to the customer. Production planning and control utilize the optimal resources mix in order to meet the capacity requirement planning. The above operations can be achieved by using appropriate information technology tools and software packages for the supply chain management.

Keywords: supply chain management, information technology, business process, extended enterprise

Procedia PDF Downloads 377
9119 The Current Use of Computer Technology in Arabic Language

Authors: Saad Alkahtani

Abstract:

This study aims to identify the extent to which the faculty members who teach Arabic to speakers of other languages in Arabic language institutes at Saudi universities use computer technologies such as language laboratories, websites, software programs, and learning management system (LMS). It also seeks to identify critical difficulties that hinder the use of these technologies by faculty members. The population of the study consisted of 103 faculty members in four Arabic language institutes at Saudi universities. The results of the study showed a disparity in the use of computer technologies in teaching Arabic to non-native speakers. The means of degree of use ranged from 1.20 through 2.83. The study also identified difficulties limiting the use of computer technology in teaching Arabic. And the means of averages of difficulty of use ranged from 1.50 to 2.89. The differences were not statistically significant among the institutes (at 0.05).

Keywords: Arabic language programs, computer technology, using technology in teaching Arabic language, Arabic as a second language, computer skills

Procedia PDF Downloads 462
9118 Food Traceability for Small and Medium Enterprises Using Blockchain Technology

Authors: Amit Kohli, Pooja Lekhi, Gihan Adel Amin Hafez

Abstract:

Blockchain is a distributor ledger technology trend that extended to different fields and proved a remarkable success. Blockchain technology is a vital proliferation technique that recuperates the food supply chain traceability process. While tracing is the core of the food supply chain; still, a complex system mitigates the exceptional risk of food contamination, foodborne, food waste, and food fraud. In addition, the upsurge of food supply chain data variance and variety in the traceability system requires complete transparency, a secure, steadfast, sustainable, and efficient approach to face the food supply chain challenges. On the other hand, blockchain technical aspects merged with a detailed implementation plan, the advantages and challenges in food traceability have not been much elucidated for small and medium enterprises (SMEs.) This paper demonstrated the advantages and challenges of applying blockchain in SMEs combined with the success stories of firms implementing blockchain to cover the gap. Moreover, blockchain architecture in SMEs and how technology, organization, and environment frameworks can guarantee the success of blockchain implementation have been revealed.

Keywords: blockchain technology, small and medium enterprises, food traceability, blockchain architecture

Procedia PDF Downloads 190
9117 Information Communication Technology (ICT) Using Management in Nursing College under the Praboromarajchanok Institute

Authors: Suphaphon Udomluck, Pannathorn Chachvarat

Abstract:

Information Communication Technology (ICT) using management is essential for effective decision making in organization. The Concerns Based Adoption Model (CBAM) was employed as the conceptual framework. The purposes of the study were to assess the situation of Information Communication Technology (ICT) using management in College of Nursing under the Praboromarajchanok Institute. The samples were multi – stage sampling of 10 colleges of nursing that participated include directors, vice directors, head of learning groups, teachers, system administrator and responsible for ICT. The total participants were 280; the instrument used were questionnaires that include 4 parts, general information, Information Communication Technology (ICT) using management, the Stage of concern Questionnaires (SoC), and the Levels of Use (LoU) ICT Questionnaires respectively. Reliability coefficients were tested; alpha coefficients were 0.967for Information Communication Technology (ICT) using management, 0.884 for SoC and 0.945 for LoU. The data were analyzed by frequency, percentage, mean, standard deviation, Pearson Product Moment Correlation and Multiple Regression. They were founded as follows: The high level overall score of Information Communication Technology (ICT) using management and issue were administration, hardware, software, and people. The overall score of the Stage of concern (SoC)ICTis at high level and the overall score of the Levels of Use (LoU) ICTis at moderate. The Information Communication Technology (ICT) using management had the positive relationship with the Stage of concern (SoC)ICTand the Levels of Use (LoU) ICT(p < .01). The results of Multiple Regression revealed that administration hardwear, software and people ware could predict SoC of ICT (18.5%) and LoU of ICT (20.8%).The factors that were significantly influenced by SoCs were people ware. The factors that were significantly influenced by LoU of ICT were administration hardware and people ware.

Keywords: information communication technology (ICT), management, the concerns-based adoption model (CBAM), stage of concern(SoC), the levels of use(LoU)

Procedia PDF Downloads 318
9116 Efficient Utilization of Commodity Computers in Academic Institutes: A Cloud Computing Approach

Authors: Jasraj Meena, Malay Kumar, Manu Vardhan

Abstract:

Cloud computing is a new technology in industry and academia. The technology has grown and matured in last half decade and proven their significant role in changing environment of IT infrastructure where cloud services and resources are offered over the network. Cloud technology enables users to use services and resources without being concerned about the technical implications of technology. There are substantial research work has been performed for the usage of cloud computing in educational institutes and majority of them provides cloud services over high-end blade servers or other high-end CPUs. However, this paper proposes a new stack called “CiCKAStack” which provide cloud services over unutilized computing resources, named as commodity computers. “CiCKAStack” provides IaaS and PaaS using underlying commodity computers. This will not only increasing the utilization of existing computing resources but also provide organize file system, on demand computing resource and design and development environment.

Keywords: commodity computers, cloud-computing, KVM, CloudStack, AppScale

Procedia PDF Downloads 273
9115 Lean Commercialization: A New Dawn for Commercializing High Technologies

Authors: Saheed A. Gbadegeshin

Abstract:

Lean Commercialization (LC) is a transformation of new technologies and knowledge to products and services through application of lean/agile principle. This principle focuses on how resources can be minimized on development, manufacturing, and marketing new products/services, which can be accepted by customers. To understand how the LC has been employed by the technology-based companies, a case study approach was employed by interviewing the founders, observing their high technologies, and interviewing the commercialization experts. Two serial entrepreneurs were interviewed in 2012, and their commercialized technologies were monitored from 2012 till 2016. Some results were collected, but to validate the commercialization strategies of these entrepreneurs, four commercialization experts were interviewed in 2017. Initial results, observation notes, and experts’ opinions were analyzed qualitatively. The final findings showed that the entrepreneurs applied the LC unknowingly, and the experts were aware of the LC. Similarly, the entrepreneurs used the LC due to the financial constraints, and their need for success. Additionally, their commercialization practices revealed that LC appeared to be one of their commercialization strategies. Thus, their practices were analyzed, and a framework was developed. Furthermore, the experts noted that LC is a new dawn, which technologists and scientists need to consider for their high technology commercialization. This article contributes to the theory and practice of commercialization. Theoretically, the framework adds value to the commercialization discussion. And, practically the framework can be used by the technology entrepreneurs (technologists and scientists), technology-based enterprises, and technology entrepreneurship educators as a guide in their commercialization adventures.

Keywords: lean commercialization, high technologies, lean start-up, technology-based companies

Procedia PDF Downloads 168
9114 Economic Community of West African States Court of Justice and the Development of Human Rights Jurisprudence in Africa: A Difficult Take-off with a Bright and Visionary Landing

Authors: Timothy Fwa Yerima

Abstract:

This paper evaluates the development of human rights jurisprudence in Africa by the ECOWAS Court of Justice. It traces that though ECOWAS was not established with the aim of promoting and protecting human rights as the African Court of Human and Peoples’ Rights, no doubt, the 1991 ECOWAS Court Protocol and the 1993 ECOWAS Revised Treaty give the ECOWAS Court its human rights mandate. The paper, however, points out that despite the availability of these two Laws, the ECOWAS Court had difficulty in its human rights mandate, in view of the twin problems of lack of access to the Court by private parties and personal jurisdiction of the Court to entertain cases filed by private parties. The paper considers the 2005 Supplementary Protocol, not only as an effective legal framework in West African Sub-Region that tackles these problems in human rights cases but also a strong foundation upon which the Court has been developing human rights jurisprudence in Africa through the interpretation and application of this Law and other sources of Law of the Court. After a thorough analysis of some principles laid down by the ECOWAS Court so far, the paper observes that human rights jurisprudence in Africa is growing rapidly; depicting that though the ECOWAS Court initially had difficulty in its human rights mandate, today it has a bright and visionary landing. The paper concludes that West African Sub-Region will witness a more effective performance of the ECOWAS Court if some of its challenges are tackled.

Keywords: access, African human rights, ECOWAS court of justice, jurisprudence, personal jurisdiction

Procedia PDF Downloads 349
9113 Determining Variables in Mathematics Performance According to Gender in Mexican Elementary School

Authors: Nora Gavira Duron, Cinthya Moreda Gonzalez-Ortega, Reyna Susana Garcia Ruiz

Abstract:

This paper objective is to analyze the mathematics performance in the Learning Evaluation National Plan (PLANEA for its Spanish initials: Plan Nacional para la Evaluación de los Aprendizajes), applied to Mexican students who are enrolled in the last elementary-school year over the 2017-2018 academic year. Such test was conducted nationwide in 3,573 schools, using a sample of 108,083 students, whose average in mathematics, on a scale of 0 to 100, was 45.6 points. 75% of the sample analyzed did not reach the sufficiency level (60 points). It should be noted that only 2% got a 90 or higher score result. The performance is analyzed while considering whether there are differences in gender, marginalization level, public or private school enrollment, parents’ academic background, and living-with-parents situation. Likewise, this variable impact (among other variables) on school performance by gender is evaluated, considering multivariate logistic (Logit) regression analysis. The results show there are no significant differences in mathematics performance regarding gender in elementary school; nevertheless, the impact exerted by mothers who studied at least high school is of great relevance for students, particularly for girls. Other determining variables are students’ resilience, their parents’ economic status, and the fact they attend private schools, strengthened by the mother's education.

Keywords: multivariate regression analysis, academic performance, learning evaluation, mathematics result per gender

Procedia PDF Downloads 147
9112 FisherONE: Employing Distinct Pedagogy through Technology Integration in Senior Secondary Education

Authors: J. Kontoleon, D.Gall, M.Pidskalny

Abstract:

FisherONE offers a distinct pedagogic model for senior secondary education that integrates advanced technology to meet the learning needs of Year 11 and 12 students across Catholic schools in Queensland. As a fully online platform, FisherONE employs pedagogy that combines flexibility with personalized, data-driven learning. The model leverages tools like the MaxHub hybrid interactive system and AI-powered learning assistants to create tailored learning pathways that promote student autonomy and engagement. This paper examines FisherONE’s success in employing pedagogic strategies through technology. Initial findings suggest that students benefit from the blended approach of virtual assessments and real-time support, even as AI-assisted tools remain in the proof-of-concept phase. The study outlines how FisherONE plans to continue refining its educational methods to better serve students in distance learning environments, specifically in challenging subjects like physics. The integration of technology in FisherONE enhances the effectiveness of teaching and learning, addressing common challenges in online education by offering scalable, individualized learning experiences. This approach demonstrates the future potential of technology in education and the role it can play in fostering meaningful student outcomes.

Keywords: AI-assisted learning, innovative pedagogy, personalized learning, senior education, technology in education

Procedia PDF Downloads 18
9111 Rational Bureaucracy and E-Government: A Philosophical Study of Universality of E-Government

Authors: Akbar Jamali

Abstract:

Hegel is the first great political philosopher who specifically contemplates on bureaucracy. For Hegel bureaucracy is the function of the state. Since state, essentially is a rational organization, its function; namely, bureaucracy must be rational. Since, what is rational is universal; Hegel had to explain how the bureaucracy could be understood as universal. Hegel discusses bureaucracy in his treatment of ‘executive power’. He analyses modern bureaucracy as a form of political organization, its constituent members, and its relation to the social environment. Therefore, the essence of bureaucracy in Hegel’s philosophy is the implementation of law and rules. Hegel argues that unlike the other social classes that are particular because they look for their own private interest, bureaucracy as a class is a ‘universal’ because their orientation is the interest of the state. State for Hegel is essentially rational and universal. It is the actualization of ‘objective Spirit’. Marx criticizes Hegel’s argument on the universality of state and bureaucracy. For Marx state is equal to bureaucracy, it constitutes a social class that based on the interest of bourgeois class that dominates the society and exploits proletarian class. Therefore, the main disagreement between these political philosophers is: whether the state (bureaucracy) is universal or particular. Growing e-government in modern state as an important aspect of development leads us to contemplate on the particularity and universality of e-government. In this article, we will argue that e-government essentially is universal. E-government, in itself, is impartial; therefore, it cannot be particular. The development of e-government eliminates many side effects of the private, personal or particular interest of the individuals who work as bureaucracy. Finally, we will argue that more a state is developed more it is universal. Therefore, development of e-government makes the state a more universal and affects the modern philosophical debate on the particularity or universality of bureaucracy and state.

Keywords: particularity, universality, rational bureaucracy, impartiality

Procedia PDF Downloads 249
9110 Predicting Wearable Technology Readiness in a South African Government Department: Exploring the Influence of Wearable Technology Acceptance and Positive Attitude

Authors: Henda J Thomas, Cornelia PJ Harmse, Cecile Schultz

Abstract:

Wearables are one of the technologies that will flourish within the fourth industrial revolution and digital transformation arenas, allowing employers to integrate collected data into organisational information systems. The study aimed to investigate whether wearable technology readiness can predict employees’ acceptance to wear wearables in the workplace. The factors of technology readiness predisposition that predict acceptance and positive attitudes towards wearable use in the workplace were examined. A quantitative research approach was used. The population consisted of 8 081 South African Department of Employment and Labour employees (DEL). Census sampling was used, and questionnaires to collect data were sent electronically to all 8 081 employees, 351 questionnaires were received back. The measuring instrument called the Technology Readiness and Acceptance Model (TRAM) was used in this study. Four hypotheses were formulated to investigate the relationship between readiness and acceptance of wearables in the workplace. The results found consistent predictions of technology acceptance (TA) by eagerness, optimism, and discomfort in the technology readiness (TR) scales. The TR scales of optimism and eagerness were consistent positive predictors of the TA scales, while discomfort proved to be a negative predictor for two of the three TA scales. Insecurity was found not to be a predictor of TA. It was recommended that the digital transformation policy of the DEL should be revised. Wearables in the workplace should be embraced from the viewpoint of convenience, automation, and seamless integration with the DEL information systems. The empirical contribution of this study can be seen in the fact that positive attitude emerged as a factor that extends the TRAM. In this study, positive attitude is identified as a new dimension to the TRAM not found in the original TA model and subsequent studies of the TRAM. Furthermore, this study found that Perceived Usefulness (PU) and Behavioural Intention to Use and (BIU) could not be separated but formed one factor. The methodological contribution of this study can lead to the development of a Wearable Readiness and Acceptance Model (WRAM). To the best of our knowledge, no author has yet introduced the WRAM into the body of knowledge.

Keywords: technology acceptance model, technology readiness index, technology readiness and acceptance model, wearable devices, wearable technology, fourth industrial revolution

Procedia PDF Downloads 89
9109 Blockchain Technology in Supply Chain Management: A Systematic Review And Meta-Analysis

Authors: Mohammad Yousuf Khan, Bhavya Alankar

Abstract:

Blockchain is a promising technology with its features such as immutability and decentralized database. It has applications in various fields such as pharmaceutical, finance, & the food industry. At the core of its heart lies its feature, traceability which is the most desired key in supply chains. However, supply chains have always been hit rock bottom by scandals and controversies. In this review paper, we have explored the advancement and research gaps of blockchain technology (BT) in supply chain management (SCM). We have used the Prisma framework for systematic literature review (SLR) and included a minuscule amount of grey literature to reduce publication bias. We found that supply chain traceability and transparency is the most researched objective in SCM. There was hardly any research in supply chain resilience. Further, we found that 40 % of the papers were application based. Most articles have focused on the advantages of BT, rather than analyzing it critically. This study will help identify gaps and suitable actions to be followed for an efficient implementation of BT in SCM.

Keywords: blockchain technology, supply chain management, supply chain transparency, supply chain resilience

Procedia PDF Downloads 161
9108 Theatre, Tea-Time and Harpsichords: Women’s Entertainment and Sensibility in Eighteenth-Century England

Authors: Ayako Otomo

Abstract:

This paper will examines the rise of a feminine orientation regarding arts and culture associated with the notion of Sensibility during the early part of the English long eighteenth century. As is widely known, the prosperous modernisation that occurred in this period was a significant factor in the nation taking a leading role in the emergent Enlightenment via the social, political and scientific advancement of Britain. As a result, this prompted the relaxing of the strictures of class and gender hierarchies in line with the new consumerism and cosmopolitanism of the nation. Accordingly, there was a significant increase of female involvement in artistic and cultural consumption. This can be understood in terms of the notion of Sensibility, associating it further with the fields of physiology, psychology and aesthetics, indebted in their turn to British Empiricism. This paper first traces the background of how women were recognisably involved in artistic and cultural circulation within an historical perspective that is articulated by the notion of Sensibility. Then, the discussion turns to the confluence of the issues of female association, creativity and the feminisation of the aesthetic of the arts and culture employing an interdisciplinary perspective. Arts and culture can also classified by public and private social spheres and gender according to Jürgen Habermas. The relationship between women and the theatre became a public issue. Music-making such as playing the harpsichord, reading, and conversation within the ritualistic teatime space dominated many of the artistic and cultural activities within the domestic private sphere.

Keywords: theatre, arts, sensibility, 18th century England

Procedia PDF Downloads 363
9107 Optimizing the Location of Parking Areas Adapted for Dangerous Goods in the European Road Transport Network

Authors: María Dolores Caro, Eugenio M. Fedriani, Ángel F. Tenorio

Abstract:

The transportation of dangerous goods by lorries throughout Europe must be done by using the roads conforming the European Road Transport Network. In this network, there are several parking areas where lorry drivers can park to rest according to the regulations. According to the "European Agreement concerning the International Carriage of Dangerous Goods by Road", parking areas where lorries transporting dangerous goods can park to rest, must follow several security stipulations to keep safe the rest of road users. At this respect, these lorries must be parked in adapted areas with strict and permanent surveillance measures. Moreover, drivers must satisfy several restrictions about resting and driving time. Under these facts, one may expect that there exist enough parking areas for the transport of this type of goods in order to obey the regulations prescribed by the European Union and its member countries. However, the already-existing parking areas are not sufficient to cover all the stops required by drivers transporting dangerous goods. Our main goal is, starting from the already-existing parking areas and the loading-and-unloading location, to provide an optimal answer to the following question: how many additional parking areas must be built and where must they be located to assure that lorry drivers can transport dangerous goods following all the stipulations about security and safety for their stops? The sense of the word “optimal” is due to the fact that we give a global solution for the location of parking areas throughout the whole European Road Transport Network, adjusting the number of additional areas to be as lower as possible. To do so, we have modeled the problem using graph theory since we are working with a road network. As nodes, we have considered the locations of each already-existing parking area, each loading-and-unloading area each road bifurcation. Each road connecting two nodes is considered as an edge in the graph whose weight corresponds to the distance between both nodes in the edge. By applying a new efficient algorithm, we have found the additional nodes for the network representing the new parking areas adapted for dangerous goods, under the fact that the distance between two parking areas must be less than or equal to 400 km.

Keywords: trans-european transport network, dangerous goods, parking areas, graph-based modeling

Procedia PDF Downloads 280
9106 Efficient Elimination of Common Allergens through the Application of Dry Microfine Steam on Innate Surfaces

Authors: O. Rachinel, C. Recchia, M. Bourel, B. Recchia

Abstract:

Dry microfine steam (DMS) technology, developed by Laurastar, was shown to effectively eliminate a range of pathogens such as Sars-CoV-2, E. coli, S. aureus and C. Albicans. The aim of this study was to investigate the effect of DMS technology on allergens. Therefore, the application of the DMS technology was tested on two common allergens (Dermatophagoides pteronyssinus and cat allergen Fel d 1), on different inert surfaces (e.g., cotton), during 2 to 3 seconds. Quantification of the remaining allergens was performed and the reduction rates reached 100% in 3 seconds for D. pteronyssinus and 97,74% in 2 seconds for cat allergens. In conclusion, DMS showed high efficacy in the elimination of common allergens and could be seen as a natural solution to improve domestic hygiene and reduce allergies.

Keywords: steam, allergens, dust mites, pollens

Procedia PDF Downloads 136
9105 Disclosing a Patriarchal Society: A Socio-Legal Study on the Indigenous Women's Involvement in Natural Resources Management in Kasepuhan Cirompang

Authors: Irena Lucy Ishimora, Eva Maria Putri Salsabila

Abstract:

The constellation on Indonesian Legal System that varies shows a structural injustice – as a result of patriarchy – exists from the biggest range as a country to the smallest such as a family. Women in their lives, carry out excessive responsibilities in the community. However, the unequal positions between men and women in the society restrain women to fulfill their constructed role. Therefore, increasing the chance for women to become the victim of structural injustice. The lack of authority given to women and its effects can be seen through a case study of the Cirompang Indigenous Women’s involvement in natural resources management. The decision to make the Mount Halimun-Salak as a National Park and the expansion itself did not involve nor consider the existence of indigenous people (Kasepuhan Ciromopang) – especially the women’s experience regarding natural resources management – has been significantly impacting the fulfillment of the indigenous women’s rights. Moreover, the adat law that still reflects patriarchy, made matters worse because women are restricted from expressing their opinion. The writers explored the experience of Cirompang indigenous women through in-depth interviews with them and analyzed it with several theories such as ecofeminism, woman’s access to land and legal pluralism. This paper is important to show how the decision and expansion of the National Park reduced the rights of access to land, natural resources, expressing an opinion, and participating in development. Reflecting on the Cirompang Indigenous Women’s conditions on natural resources management, this paper aims to present the implications of the regulations that do not acknowledge Indigenous women’s experience and the proposed solutions. First, there should be an integration between the law regarding indigenous people and traditional rights in a regulation to align the understanding of indigenous people and their rights. Secondly, Indonesia as a country that’s rich with diversity should ratify the ILO Convention no 169 to reaffirm the protection of Indigenous people’s rights. Last, considering the position of indigenous women that still experienced unjustness in the community, the government and NGOs must collaborate to provide adequate assistance for them.

Keywords: Cirompang indigenous women, indigenous women’s rights, structural injustice, women access to land

Procedia PDF Downloads 214
9104 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 392
9103 Improving Creative Problem Solving for Teams through a Web-Based Peer Review System

Authors: JungYeon Park, Jooyong Park

Abstract:

Brainstorming and discussion are widely used around the world as formal techniques of collaborative creative problem solving. This study investigated whether a web-based peer review system would improve collaborative creative problem solving. In order to assess the efficiency of using web-based peer review system before brainstorming and discussion, we conducted a between-group design study for two conditions (a web-based peer review system vs. face-to-face brainstorming only) using two different scenarios. One hundred and twenty participants were divided into teams of four and randomly assigned to one of the four conditions. The participants were given problems for them to solve. The participants in the experimental group first generated ideas independently for 20 minutes and wrote down their ideas. Afterwards, they reviewed the list of ideas of their peers and gave and received feedback for 10 minutes. These activities were performed on-line. The last activity was face-to-face brain-storming and discussion for 30 minutes. In contrast, the control group participated in brainstorming and discussion for 60 minutes. The quantity and the quality of ideas were measured as dependent variables of creative problem solving. Two evaluators rated the quantity and quality of the proposed ideas. Inter-rater agreement rate was good or strong. The results showed that both the average number of unique ideas and the average quality of ideas generated for the experimental condition were significantly higher than those for the control condition in both scenarios. The results of this study support the hypothesis that collaborative creative problem solving is enhanced when individuals write their thoughts individually and review ideas written by peers before face-to-face brainstorming and discussion. The present study provides preliminary evidence that a web-based peer review system can be instrumental in improving creative problem solving for teams. This system also offers an effective means to quantify the contribution of each member in collaborative team activity. We are planning to replicate these results in real-life situations.

Keywords: brainstorming, creative problem solving, peer-review, team efficiency

Procedia PDF Downloads 158
9102 The Interaction of Country-of-Manufacturing with Country-of-Design within Different Consumption Context

Authors: Ebru Genc, Shih-Ching Wang

Abstract:

In today’s globalized world, while companies move their production centers to developing countries in order to gain cost advantage, they receive negative responses from consumers because of the weak image of those countries. In this study, we looked at this tradeoff faced by multinational companies. Some companies that have headquarters in developed countries have devised a strategy of manipulating country-of-origin (COO) information by introducing the concept of country of design (COD). We analyzed the impact of country-of-manufacturing (COM) information on consumers’ product evaluation and purchase intention in the presence of different levels of COD information, namely, in terms of developed and developing countries. We found that it is not advantageous for a firm to publish a design location with a strong image if the firm is producing in a country that has a weak image. On the other hand, revealing COD information has a reinforcing effect on consumers’ product evaluation and purchase intention if the firm is producing in a country with a strong image. Second, we studied the impact of consumption context on this relationship (in terms of public or private use) and found that for products that are typically used in public, COM has significantly shown higher importance on product evaluation and purchase intention, compared to products typically used in private. However, our results show that consumption context shows no effect of an impact resulting from COD information.

Keywords: consumption context, country of design, country of manufacturing, country of origin

Procedia PDF Downloads 249
9101 The Effect of Information Technology on the Quality of Accounting Information

Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Hamid Golnari

Abstract:

This study aimed to investigate the impact of information technology on the quality of accounting information was made in 2014. A survey of 425 executives of listed companies in Tehran Stock Exchange, using the Cochran formula simple random sampling method, 84 managers of these companies as the sample size was considered. Methods of data collection based on questionnaire information technology some of the questions of the impact of information technology was standardized questionnaires and the questions were designed according to existing components. After the distribution and collection of questionnaires, data analysis and hypothesis testing using structural equation modeling Smart PLS2 and software measurement model and the structure was conducted in two parts. In the first part of the questionnaire technical characteristics including reliability, validity, convergent and divergent validity for PLS has been checked and in the second part, application no significant coefficients were used to examine the research hypotheses. The results showed that IT and its dimensions (timeliness, relevance, accuracy, adequacy, and the actual transfer rate) affect the quality of accounting information of listed companies in Tehran Stock Exchange influence.

Keywords: information technology, information quality, accounting, transfer speed

Procedia PDF Downloads 277
9100 The Temporal Pattern of Bumble Bees in Plant Visiting

Authors: Zahra Shakoori, Farid Salmanpour

Abstract:

Pollination services are a vital service for the ecosystem to maintain environmental stability. The decline of pollinators can disrupt the ecological balance by affecting components of biodiversity. Bumble bees are crucial pollinators, playing a vital role in maintaining plant diversity. This study investigated the temporal patterns of their visitation to flowers in Kiasar National Park, Iran. Observations were conducted in Jun 2024, totaling 442 person-minutes of observation. Five species of bumble bees were identified. The study revealed that they consistently visited an average of 12-15 flowers per minute, regardless of species. The findings highlight the importance of protecting natural habitats, where their populations are thriving in the absence of human-induced stressors. This study was conducted in Kiasar National Park, located in the southeast of Mazandaran, northern Iran. The surveyed area, at an altitude of 1800-2200 meters, includes both forest and pasture. Bumble bee surveys were carried out on sunny days from June 2024, starting at dawn and ending at sunset. To avoid double-counting, we systematically searched for foraging habitats on low-sloping ridges with high mud density, frequently moving between patches. We recorded bumble bee visits to flowers and plant species per minute using direct observation, a stopwatch, and a pre-prepared form. We used statistical analysis of variance (ANOVA) with a confidence level of 95% to examine potential differences in foraging rates across different bumble bee species, flowers, plant bases, and plant species visited. Bumble bee identification relied on morphological indicators. A total of 442 person-minutes of bumble bee observations were recorded. Five species of bumble bees (Bombus fragrans, Bombus haematurus, Bombus lucorum, Bombus melanurus, Bombus terrestris) were identified during the study. The results of this study showed that the visits of bumble bees to flower sources were not different from each other. In general, bumble bees visit an average of 12-15 flowers every 60 seconds. In addition, at the same time they visit between 3-5 plant bases. Finally, they visit an average of 1 to 3 plant species per minute. While many taxa contribute to pollination, insects—especially bees—are crucial for maintaining plant diversity and ecosystem functions. As plant diversity increases, the stopping rate of pollinating insects rises, which reduces their foraging activity. Bumble bees, therefore, stop more frequently in natural areas than in agricultural fields due to higher plant diversity. Our findings emphasize the need to protect natural habitats like Kiasar National Park, where bumble bees thrive without human-induced stressors like pesticides, livestock grazing, and pollution. With bumble bee populations declining globally, further research is essential to understand their behavior in different environments and develop effective conservation strategies to protect them.

Keywords: bumble bees, pollination, pollinator, plant diversity, Iran

Procedia PDF Downloads 30
9099 The Characteristics of Transformation of Institutional Changes and Georgia

Authors: Nazira Kakulia

Abstract:

The analysis of transformation of institutional changes outlines two important characteristics. These are: the speed of the changes and their sequence. Successful transformation must be carried out in three different stages; On the first stage, macroeconomic stabilization must be achieved with the help of fiscal and monetary tools. Two-tier banking system should be established and the active functions of central bank should be replaced by the passive ones (reserve requirements and refinancing rate), together with the involvement growth of private sector. Fiscal policy by itself here means the creation of tax system which must replace previously existing direct state revenues; the share of subsidies in the state expenses must be reduced also. The second stage begins after reaching the macroeconomic stabilization at a time of change of formal institutes which must stimulate the private business. Corporate legislation creates a competitive environment at the market and the privatization of state companies takes place. Bankruptcy and contract law is created. he third stage is the most extended one, which means the formation of all state structures that is necessary for the further proper functioning of a market economy. These three stages about the cycle period of political and social transformation and the hierarchy of changes can also be grouped by the different methodology: on the first and the most short-term stage the transfer of power takes place. On the second stage institutions corresponding to new goal are created. The last phase of transformation is extended in time and it includes the infrastructural, socio-cultural and socio-structural changes. The main goal of this research is to explore and identify the features of such kind of models.

Keywords: competitive environment, fiscal policy, macroeconomic stabilization, tax system

Procedia PDF Downloads 264
9098 Guidance for Strengthening Ethics of Entrepreneurs in Information and Communication Technology Professional

Authors: Routsukol Sunalai

Abstract:

The objectives of this paper were to study current problem of ethics of entrepreneurs in information and communication technology professional, and to build their awareness of ethics, which would be useful as guidance for strengthening professional ethics among them. The study employed quantitative research method in order to analyze relationships or differences found in each ethics factor and report in statistics. The sample of this paper was 300 information technology users of Rajabhat Universities in Bangkok. The findings revealed that the ethics factors which gained the highest and high level of opinion included possessing principles of righteousness, having trust in themselves and others, and respecting different opinions of others and accepting the fact that people of different opinions.

Keywords: communication, ethics, information, entrepreneurs

Procedia PDF Downloads 411
9097 Transcranial Electric Field Treatments on Redox-Toxic Iron Deposits in Transgenic Alzheimer’s Disease Mouse Models: The Electroceutical Targeting of Alzheimer’s Disease

Authors: Choi Younshick, Lee Wonseok, Lee Jaemeun, Park Sun-Hyun, Kim Sunwoung, Park Sua, Kim Eun Ho, Kim Jong-Ki

Abstract:

Iron accumulation in the brain accelerates Alzheimer’s disease progression. To cure iron toxicity, we assessed the therapeutic effects of noncontact transcranial electric field stimulation to the brain on toxic iron deposits in either the Aβ-fibril structure or the Aβ plaque in a mouse model of Alzheimer’s disease (AD). A capacitive electrode-based alternating electric field (AEF) was applied to a suspension of magnetite (Fe₃O₄) to measure the field-sensitized electro-Fenton effect and resultant reactive oxygen species (ROS) generation. The increase in ROS generation compared to the untreated control was both exposure-time and AEF-frequency dependent. The frequency-specific exposure of AEF to 0.7–1.4 V/cm on a magnetite-bound Aβ-fibril or a transgenic Alzheimer’s disease (AD) mouse model revealed the removal of intraplaque ferrous magnetite iron deposit and Aβ-plaque burden together at the same time compared to the untreated control. The results of the behavioral tests show an improvement in impaired cognitive function following AEF treatment on the AD mouse model. Western blot assay found some disease-modifying biological responses, including down-regulating ferroptosis, neuroinflammation and reactive astrocytes that eventually made cognitive improvement feasible. Tissue clearing and 3D-imaging analysis revealed no induced damage to the neuronal structures of normal brain tissue following AEF treatment. In conclusion, our results suggest that the effective degradation of magnetite-bound amyloid fibrils or plaques in the AD brain by the electro-Fenton effect from electric field-sensitized magnetite offers a potential electroceutical treatment option for AD.

Keywords: electroceutical, intraplaque magnetite, alzheimer’s disease, transcranial electric field, electro-fenton effect

Procedia PDF Downloads 71
9096 Robotics Technology Supported Pedagogic Models in Science, Technology, Engineering, Arts and Mathematics Education

Authors: Sereen Itani

Abstract:

As the world aspires for technological innovation, Innovative Robotics Technology-Supported Pedagogic Models in STEAM Education (Science, Technology, Engineering, Arts, and Mathematics) are critical in our global education system to build and enhance the next generation 21st century skills. Thus, diverse international schools endeavor in attempts to construct an integrated robotics and technology enhanced curriculum based on interdisciplinary subjects. Accordingly, it is vital that the globe remains resilient in STEAM fields by equipping the future learners and educators with Innovative Technology Experiences through robotics to support such fields. A variety of advanced teaching methods is employed to learn about Robotics Technology-integrated pedagogic models. Therefore, it is only when STEAM and innovations in Robotic Technology becomes integrated with real-world applications that transformational learning can occur. Robotics STEAM education implementation faces major challenges globally. Moreover, STEAM skills and concepts are communicated in separation from the real world. Instilling the passion for robotics and STEAM subjects and educators’ preparation could lead to the students’ majoring in such fields by acquiring enough knowledge to make vital contributions to the global STEAM industries. Thus, this necessitates the establishment of Pedagogic models such as Innovative Robotics Technologies to enhance STEAM education and develop students’ 21st-century skills. Moreover, an ICT innovative supported robotics classroom will help educators empower and assess students academically. Globally, the Robotics Design System and platforms are developing in schools and university labs creating a suitable environment for the robotics cross-discipline STEAM learning. Accordingly, the research aims at raising awareness about the importance of robotics design systems and methodologies of effective employment of robotics innovative technology-supported pedagogic models to enhance and develop (STEAM) education globally and enhance the next generation 21st century skills.

Keywords: education, robotics, STEAM (Science, Technology, Engineering, Arts and Mathematics Education), challenges

Procedia PDF Downloads 384