Search results for: revenue sharing contract
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1734

Search results for: revenue sharing contract

744 Application of Customized Bioaugmentation Inocula to Alleviate Ammonia Toxicity in CSTR Anaerobic Digesters

Authors: Yixin Yan, Miao Yan, Irini Angelidaki, Ioannis Fotidis

Abstract:

Ammonia, which derives from the degradation of urea and protein-substrates, is the major toxicant of the commercial anaerobic digestion reactors causing loses of up to 1/3 of their practical biogas production, which reflects directly on the overall revenue of the plants. The current experimental work is aiming to alleviate the ammonia inhibition in anaerobic digestion (AD) process by developing an innovative bioaugmentation method of ammonia tolerant methanogenic consortia. The ammonia tolerant consortia were cultured in batch reactors and immobilized together with biochar in agar (customized inocula). Three continuous stirred-tank reactors (CSTR), fed with the organic fraction of municipal solid waste at a hydraulic retention time of 15 days and operated at thermophilic (55°C) conditions were assessed. After an ammonia shock of 4 g NH4+-N L-1, the customized inocula were bioaugmented into the CSTR reactors to alleviate ammonia toxicity effect on AD process. Recovery rate of methane production and methanogenic activity will be assessed to evaluate the bioaugmentation performance, while 16s rRNA gene sequence will be used to reveal the difference of microbial community changes through bioaugmentation. At the microbial level, the microbial community structures of the four reactors will be analysed to find the mechanism of bioaugmentation. Changes in hydrogen formation potential will be used to predict direct interspecies electron transfer (DIET) between ammonia tolerant methanogens and syntrophic bacteria. This experimental work is expected to create bioaugmentation inocula that will be easy to obtain, transport, handled and bioaugment in AD reactors to efficiently alleviate the ammonia toxicity, without alternating any of the other operational parameters including the ammonia-rich feedstocks.

Keywords: artisanal fishing waste, acidogenesis, volatile fatty acids, pH, inoculum/substrate ratio

Procedia PDF Downloads 118
743 Virtual Schooling as a Collaboration between Public Schools and the Scientific Community

Authors: Thomas A. Fuller

Abstract:

Over the past fifteen years, virtual schooling has been introduced and implemented in varying degrees throughout the public education system in the United States. It is possible in some states for students to voluntarily take all of their course load online, without ever having to step in a classroom. Experts foresee a dramatic rise in the number of courses taken online by public school students in the United States, with some predicting that by 2019 as many as 50% of public high school courses will be delivered online. This electronic delivery of public education offers tremendous potential to the scientific community because it calls for innovation and is funded by public school revenue. Public accountability provides a ready supply of statistical data for measuring the progress of virtual schools as they are implemented into the public school arena. This allows for a survey of the current use of virtual schooling through examination of past statistical data, as well as forecasting forward for future years based upon this past data. Virtual schooling is on the rise in the United States, but its growth has been tempered by practical problems of implementation. The greatest and best use of virtual schooling thus far has been to supplement the courses offered by public schools (e.g., offering unique language courses, elective courses, and games-based math and science courses). The weaknesses of virtual schooling lay in the problematic accountability in allowing students to take courses online at home and the lack of supportive infrastructure in the public school arena. Virtual schooling holds great promise for the public school education system in the United States, as well as the scientific community. Online courses allow students access to a much greater catalog of courses than is offered through classroom instruction in their local public school. This promising sector needs assistance from the scientific community in implementing new pedagogical methodologies.

Keywords: virtual schools, online classroom, electronic delivery, technological innovation

Procedia PDF Downloads 379
742 'Sextually' Active: Teens, 'Sexting' and Gendered Double Standards in the Digital Age

Authors: Annalise Weckesser, Alex Wade, Clara Joergensen, Jerome Turner

Abstract:

Introduction: Digital mobile technologies afford Generation M a number of opportunities in terms of communication, creativity and connectivity in their social interactions. Yet these young people’s use of such technologies is often the source of moral panic with accordant social anxiety especially prevalent in media representations of teen ‘sexting,’ or the sending of sexually explicit images via smartphones. Thus far, most responses to youth sexting have largely been ineffective or unjust with adult authorities sometimes blaming victims of non-consensual sexting, using child pornography laws to paradoxically criminalise those they are designed to protect, and/or advising teenagers to simply abstain from the practice. Prevention strategies are further skewed, with sex education initiatives often targeted at girls, implying that they shoulder the responsibility of minimising the risks associated with sexting (e.g. revenge porn and sexual predation). Purpose of Study: Despite increasing public interest and concern about ‘teen sexting,’ there remains a dearth of research with young people regarding their experiences of navigating sex and relationships in the current digital media landscape. Furthermore, young people's views on sexting are rarely solicited in the policy and educational strategies aimed at them. To address this research-policy-education gap, an interdisciplinary team of four researchers (from anthropology, media, sociology and education) have undertaken a peer-to-peer research project to co-create a sexual health intervention. Methods: In the winter of 2015-2016, the research team conducted serial group interviews with four cohorts of students (aged 13 to 15) from a secondary school in the West Midlands, UK. To facilitate open dialogue, girls and boys were interviewed separately, and each group consisted of no more than four pupils. The team employed a range of participatory techniques to elicit young people’s views on sexting, its consequences, and its interventions. A final focus group session was conducted with all 14 male and female participants to explore developing a peer-to-peer ‘safe sexting’ education intervention. Findings: This presentation will highlight the ongoing, ‘old school’ sexual double standards at work within this new digital frontier. In the sharing of ‘nudes’ (teens’ preferred term to ‘sexting’) via social media apps (e.g. Snapchat and WhatsApp), girls felt sharing images was inherently risky and feared being blamed and ‘slut-shamed.’ In contrast, boys were seen to gain in social status if they accumulated nudes of female peers. Further, if boys had nudes of themselves shared without consent, they felt they were expected to simply ‘tough it out.’ The presentation will also explore what forms of supports teens desire to help them in their day-to-day navigation of these digitally mediated, heteronormative performances of teen femininity and masculinity expected of them. Conclusion: This is the first research project, within UK, conducted with rather than about teens and the phenomenon of sexting. It marks a timely and important contribution to the nascent, but growing body of knowledge on gender, sexual politics and the digital mobility of sexual images created by and circulated amongst young people.

Keywords: teens, sexting, gender, sexual politics

Procedia PDF Downloads 232
741 A Self-Coexistence Strategy for Spectrum Allocation Using Selfish and Unselfish Game Models in Cognitive Radio Networks

Authors: Noel Jeygar Robert, V. K.Vidya

Abstract:

Cognitive radio is a software-defined radio technology that allows cognitive users to operate on the vacant bands of spectrum allocated to licensed users. Cognitive radio plays a vital role in the efficient utilization of wireless radio spectrum available between cognitive users and licensed users without making any interference to licensed users. The spectrum allocation followed by spectrum sharing is done in a fashion where a cognitive user has to wait until spectrum holes are identified and allocated when the licensed user moves out of his own allocated spectrum. In this paper, we propose a self –coexistence strategy using bargaining and Cournot game model for achieving spectrum allocation in cognitive radio networks. The game-theoretic model analyses the behaviour of cognitive users in both cooperative and non-cooperative scenarios and provides an equilibrium level of spectrum allocation. Game-theoretic models such as bargaining game model and Cournot game model produce a balanced distribution of spectrum resources and energy consumption. Simulation results show that both game theories achieve better performance compared to other popular techniques

Keywords: cognitive radio, game theory, bargaining game, Cournot game

Procedia PDF Downloads 289
740 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 356
739 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 86
738 Stability Analysis of Green Coffee Export Markets of Ethiopia: Markov-Chain Analysis

Authors: Gabriel Woldu, Maria Sassi

Abstract:

Coffee performs a pivotal role in Ethiopia's GDP, revenue, employment, domestic demand, and export earnings. Ethiopia's coffee production and exports show high variability in the amount of production and export earnings. Despite being the continent's fifth-largest coffee producer, Ethiopia has not developed its ability to shine as a major exporter in the globe's green coffee exports. Ethiopian coffee exports were not stable and had high volume and earnings fluctuations. The main aim of this study was to analyze the dynamics of the export of coffee variation to different importing nations using a first-order Markov Chain model. 14 years of time-series data has been used to examine the direction and structural change in the export of coffee. A compound annual growth rate (CAGR) was used to determine the annual growth rate in the coffee export quantity, value, and per-unit price over the study period. The major export markets for Ethiopian coffee were Germany, Japan, and the USA, which were more stable, while countries such as France, Italy, Belgium, and Saudi Arabia were less stable and had low retention rates for Ethiopian coffee. The study, therefore, recommends that Ethiopia should again revitalize its market to France, Italy, Belgium, and Saudi Arabia, as these countries are the major coffee-consuming countries in the world to boost its export stake to the global coffee markets in the future. In order to further enhance export stability, the Ethiopian Government and other stakeholders in the coffee sector should have to work on reducing the volatility of coffee output and exports in order to improve production and quality efficiency, so that stabilize markets as well as to make the product attractive and price competitive in the importing countries.

Keywords: coffee, CAGR, Markov chain, direction of trade, Ethiopia

Procedia PDF Downloads 134
737 An Automatic Model Transformation Methodology Based on Semantic and Syntactic Comparisons and the Granularity Issue Involved

Authors: Tiexin Wang, Sebastien Truptil, Frederick Benaben

Abstract:

Model transformation, as a pivotal aspect of Model-driven engineering, attracts more and more attentions both from researchers and practitioners. Many domains (enterprise engineering, software engineering, knowledge engineering, etc.) use model transformation principles and practices to serve to their domain specific problems; furthermore, model transformation could also be used to fulfill the gap between different domains: by sharing and exchanging knowledge. Since model transformation has been widely used, there comes new requirement on it: effectively and efficiently define the transformation process and reduce manual effort that involved in. This paper presents an automatic model transformation methodology based on semantic and syntactic comparisons, and focuses particularly on granularity issue that existed in transformation process. Comparing to the traditional model transformation methodologies, this methodology serves to a general purpose: cross-domain methodology. Semantic and syntactic checking measurements are combined into a refined transformation process, which solves the granularity issue. Moreover, semantic and syntactic comparisons are supported by software tool; manual effort is replaced in this way.

Keywords: automatic model transformation, granularity issue, model-driven engineering, semantic and syntactic comparisons

Procedia PDF Downloads 387
736 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 296
735 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 166
734 Nectariferous Plant Genetic Resources for Apicultural Entrepreneurship in Nigeria: Prerequisite for Conservation, Sustainable Management and Policy

Authors: C. V. Nnamani, O. L. Adedeji

Abstract:

The contemporary global economic meltdown has devastating effect on the Nigerian’s economy and its frantic search for alternative source of national revenue aside from oil and gas has become imperative for economic emancipation for Nigerians. Apicultural entrepreneurship could provide a source of livelihood if the basic knowledge of those plant genetic resources needed by bees is made available. A palynological evaluation of those palynotaxa which honey bees forage for pollen and nectar was carried out after standard acetolysis method. Results showed that the honey samples were highly diversified and rich in honey plants. A total of 9544.3 honey pollen, consisting of 39 honey plants belonging to 21 plant families and distributed within 38 genera were identified excluding 238 unidentified pollen grains. Data from the analysis equally revealed that Elaeis guineensis Jacq, Anacardium occidentale L, Diospyros mespiliformis Hochist xe ADC, Alchornea cordifolia Muell, Arg, Daniella oliveri (Rolfe) Hutch & Dalz, Irvingia wombolu Okafor ex Baill, Treculia africana Decne, Nauclea latifolia Smith and Crossopteryx febrifuga Afzil ex Benth were the predominant honey plants. It provided a guide to the optimal utilization of floral resources by honeybees in these regions, showing the opportunity and amazing potentials for apiculture entrepreneurship of these palytaxa. Most of these plants are rare, threatened and endangered. It calls for urgent conservation techniques and step by all players. Critical awareness creation to ensure farmers knowledge of these palynotaxa to ensure proper understanding and attendance boost from them as economic empowerment is needed.

Keywords: palynotaxa, acetolysis, enterprise, livelihood, Nigeria

Procedia PDF Downloads 287
733 Investigation of the Factors Influencing the Construction Planning Process Using Participant Observation Method

Authors: Ashokkumar Subbiah

Abstract:

This study investigates the impact of factors that influenced the success of construction planning for a major construction project in Qatar. An approach of participant observation is adopted which is informed by the principles of ethnography: one that reports the participants’ view of their world rather than imposing an artificial theoretical framework upon it. As participant observant, key factors were observed and identified that had an impact on the management and execution of the construction planning. It is found that a ‘shadow culture’ exists between the project participants which, it is argued, is only observable from the perspective of an embedded participant observer. The shadow culture acts to enable the management of the planning process, and its efficacy relates to the ‘quality’ of human inter-relationships amongst immediate stakeholders. Whilst this study uses the concept of shadow culture, it is treated as both a methodological stance and one of the findings of this research in the context of the major construction project in Qatar. The concept of shadow culture is not imposed upon the findings, but instead is used as a research tool: respondents report their own worldview and this is reported from the view of a participant observant in a manner that is understandable and useful to those who are not part of the construction project. The findings of this study identify similar factors influencing the planning process of the Qatar project, but the shadow culture predominantly influences these factors towards the failure of planning process. The research concludes by questioning the assumption that construction planning is a mechanistic process that has to be conducted solely by the planning team. Instead, it is a highly social phenomenon in which the seemingly mechanistic process is made workable by the quality of relationships that exist in the project. Drawing on this the final section provides a series of recommendations that may be helpful in enhancing the efficacy of project planning; these include better training/education at the pre-construction phase; recognition of the importance of shadow processes at management levels, and better appreciation of the impact of contract type and chosen procurement route.

Keywords: construction planning, participant observation, project participants, shadow culture

Procedia PDF Downloads 289
732 The Analysis of Underground Economy Transaction Existence of Junk Night Market (JNM) in Malang City

Authors: Sebastiana Viphindratin, Silvi Asna

Abstract:

The under ground economy phenomenon is exist in Indonesia. There are some factors which affect the existence this underground economy activity. One of them is a hierarchy power structure that handles the underground economy existence. The example of the existence of underground economy is the occurring informal market in Indonesia. Malang city is one of the city which has this kind of market. Junk night market (JNM) as an underground economy activity is arising in that city. The JNM is located in Gatot Subroto Sidewalk Street. The JNM is a illegal market which sell thrift, antique, imitation and black market goods. The JNM is interesting topic to be discussed, because this market is running in long time without any policy from local government. The JNM activity has their own “power” that run the market rules. Thus, it is important to analyze how the existence and power structure of JNM actors community are in Malang city. This research using qualitative method with phenomenological approach where we try to understand the phenomenon and related actors deeply. The aim of this research is to know the existence and power structure of JNM actors community in Malang. In JNM, there is no any entry barriers and tax charge from Malang government itself. Price competition also occurs because the buyer can do a bargain with the seller. In maintaining buyer loyalty, the JNM actors also do pre-order system. Even though, this market is an illegal market but the JNM actors also give the goods guarantee (without legal contract) as a formal market. In JNM actor’s community, there is no hierarchy and formal power structure. The role in JNM is managed by informal leaders who come up from the trading activity problems that are sidewalk and parking area dividing. Therefore, can be concluded that even the JNM is illegal market but it can survive with natural market pattern. In JNM development, JNM has positive and negative impact for Malang city. The positive impact of JNM is this market can open a new employment but the negative impact is there is no tax income from that market. Therefore, suggested that the government of Malang city should manage and give appropriate policies in this case.

Keywords: junk night market (JNM), Malang city, underground economy, illegal

Procedia PDF Downloads 401
731 Understanding the Semantic Network of Tourism Studies in Taiwan by Using Bibliometrics Analysis

Authors: Chun-Min Lin, Yuh-Jen Wu, Ching-Ting Chung

Abstract:

The formulation of tourism policies requires objective academic research and evidence as support, especially research from local academia. Taiwan is a small island, and its economic growth relies heavily on tourism revenue. Taiwanese government has been devoting to the promotion of the tourism industry over the past few decades. Scientific research outcomes by Taiwanese scholars may and will help lay the foundations for drafting future tourism policy by the government. In this study, a total of 120 full journal articles published between 2008 and 2016 from the Journal of Tourism and Leisure Studies (JTSL) were examined to explore the scientific research trend of tourism study in Taiwan. JTSL is one of the most important Taiwanese journals in the tourism discipline which focuses on tourism-related issues and uses traditional Chinese as the study language. The method of co-word analysis from bibliometrics approaches was employed for semantic analysis in this study. When analyzing Chinese words and phrases, word segmentation analysis is a crucial step. It must be carried out initially and precisely in order to obtain meaningful word or word chunks for further frequency calculation. A word segmentation system basing on N-gram algorithm was developed in this study to conduct semantic analysis, and 100 groups of meaningful phrases with the highest recurrent rates were located. Subsequently, co-word analysis was employed for semantic classification. The results showed that the themes of tourism research in Taiwan in recent years cover the scope of tourism education, environmental protection, hotel management, information technology, and senior tourism. The results can give insight on the related issues and serve as a reference for tourism-related policy making and follow-up research.

Keywords: bibliometrics, co-word analysis, word segmentation, tourism research, policy

Procedia PDF Downloads 224
730 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 187
729 Examining Private Law's Role in Promoting Human Rights: Prospects, Obstacles, and Safeguarding Challenges

Authors: Laura Cami Vorpsi

Abstract:

This research paper examines the potential of private law as a means to promote and safeguard human rights while also addressing the associated challenges and limitations of adopting such an approach. Historically, private law mechanisms, namely contract law, tort law, and property law, have been employed to govern and oversee private relationships and transactions. Nevertheless, it is increasingly acknowledged that private law can also assume a significant role in safeguarding and advancing human rights, particularly in circumstances where the safeguards provided by public law are insufficient or inaccessible. This study assesses the benefits associated with the utilization of private law as a complementary measure to public law safeguards. These advantages encompass enhanced efficacy and efficiency of remedies, as well as the capacity to customize solutions to suit the unique requirements and circumstances of individuals. Nevertheless, the present study also considers the constraints associated with private law mechanisms, such as the financial and procedural intricacies of legal proceedings, the possibility of imbalanced negotiation power, and the potential to worsen pre-existing disparities and systemic inequities. The paper posits that the adoption of a private law-based approach to human rights necessitates a meticulous design and implementation process in order to mitigate potential risks and optimize the advantages. In conclusion, this study examines the ramifications of these discoveries on policy and practice, highlighting the necessity for heightened awareness and education regarding the capacity of private law to advance and safeguard human rights. Additionally, it underscores the significance of establishing efficient and easily accessible mechanisms for upholding human rights within the private domain. The paper concludes by providing recommendations for future research in this domain, specifically emphasizing the necessity for additional empirical investigations to assess the efficacy and consequences of private law-oriented strategies in safeguarding human rights.

Keywords: private law, human rights, promoting, protecting, access to justice

Procedia PDF Downloads 69
728 The Use of Hedging Devices in Studens’ Oral Presentation

Authors: Siti Navila

Abstract:

Hedging as a kind of pragmatic competence is an essential part in achieving the goal in communication, especially in academic discourse where the process of sharing knowledge among academic community takes place. Academic discourse demands an appropriateness and modesty of an author or speaker in stating arguments, to name but few, by considering the politeness, being cautious and tentative, and differentiating personal opinions and facts in which these aspects can be achieved through hedging. This study was conducted to find the hedging devices used by students as well as to analyze how they use them in their oral presentation. Some oral presentations from English Department students of the State University of Jakarta on their Academic Presentation course final test were recorded and explored formally and functionally. It was found that the most frequent hedging devices used by students were shields from all hedging devices that students commonly used when they showed suggestion, stated claims, showed opinion to provide possible but still valid answer, and offered the appropriate solution. The researcher suggests that hedging can be familiarized in learning, since potential conflicts that is likely to occur while delivering ideas in academic contexts such as disagreement, criticism, and personal judgment can be reduced with the use of hedging. It will also benefit students in achieving the academic competence with an ability to demonstrate their ideas appropriately and more acceptable in academic discourse.

Keywords: academic discourse, hedging, hedging devices, lexical hedges, Meyer classification

Procedia PDF Downloads 459
727 Adoption of Climate-Smart Agriculture Practices Among Farmers and Its Effect on Crop Revenue in Ethiopia

Authors: Fikiru Temesgen Gelata

Abstract:

Food security, adaptation, and climate change mitigation are all problems that can be resolved simultaneously with Climate-Smart Agriculture (CSA). This study examines determinants of climate-smart agriculture (CSA) practices among smallholder farmers, aiming to understand the factors guiding adoption decisions and evaluate the impact of CSA on smallholder farmer income in the study areas. For this study, three-stage sampling techniques were applied to select 230 smallholders randomly. Mann-Kendal test and multinomial endogenous switching regression model were used to analyze trends of decrease or increase within long-term temporal data and the impact of CSA on the smallholder farmer income, respectively. Findings revealed education level, household size, land ownership, off-farm income, climate information, and contact with extension agents found to be highly adopted CSA practices. On the contrary, erosion exerted a detrimental impact on all the agricultural practices examined within the study region. Various factors such as farming methods, the size of farms, proximity to irrigated farmlands, availability of extension services, distance to market hubs, and access to weather forecasts were recognized as key determinants influencing the adoption of CSA practices. The multinomial endogenous switching regression model (MESR) revealed that joint adoption of crop rotation and soil and water conservation practices significantly increased farm income by 1,107,245 ETB. The study recommends that counties and governments should prioritize addressing climate change in their development agendas to increase the adoption of climate-smart farming techniques.

Keywords: climate-smart practices, food security, Oincome, MERM, Ethiopia

Procedia PDF Downloads 18
726 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm

Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 525
725 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 398
724 Business Entrepreneurs in the Making

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to revise the skills of an entrepreneur in the making and to guide future Entrepreneurs into a promising future. The study presents a broader review of entrepreneurship, starting from its definition and antecedents. A well-developed original set of guidelines can help budding entrepreneurs and practitioners seeking an answer to being successful as an entrepreneur. It is a journey full of excitement, experiences, rewards, and learning. Dedication, work ethics and a never-say-die attitude will largely contribute to the success as a businessman and an entrepreneur. This paper is sharing an experience of how an entrepreneur can act as a catalyst for young minds while ensuring them that ethics and principles do pay in business when followed in true spirit and action. It is very important for an entrepreneur to enhance his product or services, marketing skills, and market share, along with providing customer satisfaction and opportunities for teams to improve their leadership qualities. To have strong employee loyalty and job satisfaction among its employees. Based on Research objectives, primarily in-depth interviews and focused group interviews were conducted as a qualitative research method. And to support this survey, questionnaires were used as a qualitative research method to explore how Indian Entrepreneurs face the challenge of the changing, volatile socio-political environment in India.

Keywords: entrepreneur, business ethics, sales, marketing

Procedia PDF Downloads 86
723 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 71
722 Using Short Learning Programmes to Develop Students’ Digital Literacies in Art and Design Education

Authors: B.J. Khoza, B. Kembo

Abstract:

Global socioeconomic developments and ever-growing technological advancements of the art and design industry indicate the pivotal importance of lifelong learning. There exists a discrepancy between competencies, personal ambition, and workplace requirements. There are few , if at all, institutions of higher learning in South Africa which offer Short Learning Programmes (SLP) in Art and Design Education. Traditionally, Art and Design education is delivered face to face via a hands-on approach. In this way the enduring perception among educators is that art and design education does not lend itself to online delivery. Short Learning programmes (SLP) are a concentrated approach to make revenue and lure potential prospective students to embark on further education study, this is often of weighted value to both students and employers. SLPs are used by Higher Education institutions to generate income in support of the core academic programmes. However, there is a gap in terms of the translation of art and design studio pedagogy into SLPs which provide quality education, are adaptable and delivered via a blended mode. In our paper, we propose a conceptual framework drawing on secondary research to analyse existing research to SLPs for arts and design education. We aim to indicate a new dimension to the process of using a design-based research approach for short learning programmes in art and design education. The study draws on a conceptual framework, a qualitative analysis through the lenses of Herrington, McKenney, Reeves and Oliver (2005) principles of the design-based research approach. The results of this study indicate that design-based research is not only an effective methodological approach for developing and deploying arts and design education curriculum for 1st years in Higher Education context but it also has the potential to guide future research. The findings of this study propose that the design-based research approach could bring theory and praxis together regarding a common purpose to design context-based solutions to educational problems.

Keywords: design education, design-based research, digital literacies, multi-literacies, short learning programme

Procedia PDF Downloads 160
721 Lean Thinking and E-Commerce as New Opportunities to Improve Partnership in Supply Chain of Construction Industries

Authors: Kaustav Kundu, Alberto Portioli Staudacher

Abstract:

Construction industry plays a vital role in the economy of the world. But due to high uncertainty and variability in the industry, its performance is not as efficient in terms of quality, lead times, productivity and costs as of other industries. Moreover, there are continuous conflicts among the different actors in the construction supply chains in terms of profit sharing. Previous studies suggested partnership as an important approach to promote cooperation among the different actors in the construction supply chains and thereby it improves the overall performance. Construction practitioners tried to focus on partnership which can enhance the performance of construction supply chains but they are not fully aware of different approaches and techniques for improving partnership. In this research, a systematic review on partnership in relation to construction supply chains is carried out to understand different elements influencing the partnership. The research development of this domain is analyzed by reviewing selected articles published from 1996 to 2015. Based on the papers, three major elements influencing partnership in construction supply chains are identified: “Lean approach”, “Relationship building” and “E-commerce applications”. This study analyses the contributions in the areas within each element and provides suggestions for future developments of partnership in construction supply chains.

Keywords: partnership, construction, lean, SCM, supply chain management

Procedia PDF Downloads 428
720 Experimental Film Class: Watbangkapom School, Samut Songkhram

Authors: J. Areerut

Abstract:

Experimental Film Class Project is supported by the Institute for Research and Development at Suan Sunandha Rajabhat University. This project is purported to provide academic and professional services to improve the quality standards of the community and locals in accordance with the mission of the university, which is to improve and expand knowledge for the community and to develop and transfer such knowledge and professions to the next generation. Eventually, it leads to sustainable development because the development of human resources is deemed as the key for sustainable development. Moreover, the Experimental Film Class is an integral part of the teaching of film production at Suan Sunandha International School of Art (SISA). By means of giving opportunities to students for participation in projects by sharing experience, skill and knowledge and participation in field activities, it helps students in the film production major to enhance their abilities and potentials as preparation for their readiness in the marketplace. Additionally, in this class, we provide basic film knowledge, screenwriting techniques, editing and subtitles including uploading videos on social media such as YouTube and Facebook for the participant students.

Keywords: experimental film class, Watbangkapom School, participant students, basic of film production, film workshop

Procedia PDF Downloads 334
719 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 186
718 Study of Hydrocarbons Metering Issues in Algerian Fields under the New Law Context

Authors: A. Hadjadj, S. Maamir

Abstract:

Since the advent of the law 86/14 concerning the
exploitation of the national territory by foreign companies in
partnership with the Algerian oil and gas company, the problem of
hydrocarbons metering in the sharing production come out.
More generally, good management counting hydrocarbons can
provide data on the production wells, the field and the reservoir for
medium and long term planning, particularly in the context of the
management and field development.
In this work, we are interested in the transactional metering which
is a very delicate and crucial period in the current context of the new
hydrocarbon’s law characterized by assets system between the
various activities of Sonatrach and its foreign partners.
After a state of the art on hydrocarbons metering devices in
Algeria and elsewhere, we will decline the advantages and
disadvantages of each system, and then we describe the problem to
try to reach an optimal solution.

Keywords: transactional metering, flowmeter orifice, heat flow, Sonatrach

Procedia PDF Downloads 357
717 The Role of Privatization as a Moderator of the Impact of Non-Institutional Factors on the Performance of the Enterprises in Central and Eastern Europe

Authors: Margerita Topalli

Abstract:

In this paper, we analyze the impact of corruption (business environment, informal payments and state capture), crime and tax time, on the enterprise's performance during economic transition in the Central and Eastern Europe and the role of privatization as a moderator. We examine this effect by comparing the performance of the privatized enterprises and the state-owned-enterprises, while controlling for various forms of selection bias. The present study is based on firm-level panel data collected by the BEEPS for 27 transition countries over 2002, 2005, 2007, and 2011. In addition to firm characteristics, BEEPS collects valuable survey information on different forms of corruption, crime, tax time and firm ownership. We estimate the impact of corruption, crime, tax time on the different performance measures (sales, productivity, employment, labor costs and material costs) of the enterprise, whereby we control for firm ownership, with a special focus on the role of the privatization as a moderator. It argues that in general terms, the privatization has positive effects on the performance of enterprises during transition, but these effects are significantly different, depending on the examined performance measure (sales, productivity, employment, labor costs and material costs). When the privatization is effective, the privatized enterprises show a considerable performance improvements, particularly in terms of revenue growth and productivity growth. It also argues that the effects of privatization are different depending on the types of owner (outsider or insider) to whom it gives control. The results show that privatization to insider owners has no significant performance effect.

Keywords: effects of privatization, enterprise performance, state capture, corruption, firm ownership, economic transition, Central and Eastern Europe

Procedia PDF Downloads 317
716 Developing a Spatial Transport Model to Determine Optimal Routes When Delivering Unprocessed Milk

Authors: Sunday Nanosi Ndovi, Patrick Albert Chikumba

Abstract:

In Malawi, smallholder dairy farmers transport unprocessed milk to sell at Milk Bulking Groups (MBGs). MBGs store and chill the milk while awaiting collection by processors. The farmers deliver milk using various modes of transportation such as foot, bicycle, and motorcycle. As a perishable food, milk requires timely transportation to avoid deterioration. In other instances, some farmers bypass the nearest MBGs for facilities located further away. Untimely delivery worsens quality and results in rejection at MBG. Subsequently, these rejections lead to revenue losses for dairy farmers. Therefore, the objective of this study was to optimize routes when transporting milk by selecting the shortest route using time as a cost attribute in Geographic Information Systems (GIS). A spatially organized transport system impedes milk deterioration while promoting profitability for dairy farmers. A transportation system was modeled using Route Analysis and Closest Facility network extensions. The final output was to find the quickest routes and identify the nearest milk facilities from incidents. Face-to-face interviews targeted leaders from all 48 MBGs in the study area and 50 farmers from Namahoya MBG. During field interviews, coordinates were captured in order to create maps. Subsequently, maps supported the selection of optimal routes based on the least travel times. The questionnaire targeted 200 respondents. Out of the total, 182 respondents were available. Findings showed that out of the 50 sampled farmers that supplied milk to Namahoya, only 8% were nearest to the facility, while 92% were closest to 9 different MBGs. Delivering milk to the nearest MBGs would minimize travel time and distance by 14.67 hours and 73.37 km, respectively.

Keywords: closest facility, milk, route analysis, spatial transport

Procedia PDF Downloads 47
715 Managing Physiological and Nutritional Needs of Rugby Players in Kenya

Authors: Masita Mokeira, Kimani Rita, Obonyo Brian, Kwenda Kennedy, Mugambi Purity, Kirui Joan, Chomba Eric, Orwa Daniel, Waiganjo Peter

Abstract:

Rugby is a highly intense and physical game requiring speed and strength. The need for physical fitness therefore cannot be over-emphasized. Sports are no longer about lifting weights so as to build muscle. Most professional teams are investing much more in the sport in terms of time, equipment and other resources. To play competitively, Kenyan players may therefore need to complement their ‘home-grown’ and sometimes ad-hoc training and nutrition regimes with carefully measured strength and conditioning, diet, nutrition, and supplementation. Nokia Research Center and University of Nairobi conducted an exploratory study on needs and behaviours surrounding sports in Africa. Rugby being one sport that is gaining ground in Kenya was selected as the main focus. The end goal of the research was to identify areas where mobile technology could be used to address gaps, challenges and/or unmet needs. Themes such as information gap, social culture, growth, and development, revenue flow, and technology adoption among others emerged about the sport. From the growth and development theme, it was clear that as rugby continues to grow in the country, teams, coaches, and players are employing interesting techniques both in training and playing. Though some of these techniques are indeed scientific, those employing them are sometimes not fully aware of their scientific basis. A further case study on sports science in rugby in Kenya focusing on physical fitness and nutrition revealed interesting findings. This paper discusses findings on emerging adoption of techniques in managing physiological and nutritional needs of rugby players across different levels of rugby in Kenya namely high school, club and national levels.

Keywords: rugby, nutrition, physiological needs, sports science

Procedia PDF Downloads 379