Search results for: customer protection
2286 Particle Swarm Optimization Algorithm vs. Genetic Algorithm for Image Watermarking Based Discrete Wavelet Transform
Authors: Omaima N. Ahmad AL-Allaf
Abstract:
Over communication networks, images can be easily copied and distributed in an illegal way. The copyright protection for authors and owners is necessary. Therefore, the digital watermarking techniques play an important role as a valid solution for authority problems. Digital image watermarking techniques are used to hide watermarks into images to achieve copyright protection and prevent its illegal copy. Watermarks need to be robust to attacks and maintain data quality. Therefore, we discussed in this paper two approaches for image watermarking, first is based on Particle Swarm Optimization (PSO) and the second approach is based on Genetic Algorithm (GA). Discrete wavelet transformation (DWT) is used with the two approaches separately for embedding process to cover image transformation. Each of PSO and GA is based on co-relation coefficient to detect the high energy coefficient watermark bit in the original image and then hide the watermark in original image. Many experiments were conducted for the two approaches with different values of PSO and GA parameters. From experiments, PSO approach got better results with PSNR equal 53, MSE equal 0.0039. Whereas GA approach got PSNR equal 50.5 and MSE equal 0.0048 when using population size equal to 100, number of iterations equal to 150 and 3×3 block. According to the results, we can note that small block size can affect the quality of image watermarking based PSO/GA because small block size can increase the search area of the watermarking image. Better PSO results were obtained when using swarm size equal to 100.Keywords: image watermarking, genetic algorithm, particle swarm optimization, discrete wavelet transform
Procedia PDF Downloads 2262285 Optimal Decisions for Personalized Products with Demand Information Updating and Limited Capacity
Authors: Meimei Zheng
Abstract:
Product personalization could not only bring new profits to companies but also provide the direction of long-term development for companies. However, the characteristics of personalized product cause some new problems. This paper investigates how companies make decisions on the supply of personalized products when facing different customer attitudes to personalized product and service, constraints due to limited capacity and updates of personalized demand information. This study will provide optimal decisions for companies to develop personalized markets, resulting in promoting business transformation and improving business competitiveness.Keywords: demand forecast updating, limited capacity, personalized products, optimization
Procedia PDF Downloads 2622284 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 312283 Understanding Consumer Behaviors by Using Neuromarketing Tools and Methods
Authors: Tabrej Khan
Abstract:
Neuromarketing can refer to the commercial application of neuroscience technologies and insights to drive business further. On the other side, consumer neuroscience can be seen as the academic use of neuroscience to better understand marketing effects on consumer behavior. Consumer Neuroscience and Neuromarketing is a multidisciplinary effort between economics, psychology, and neuroscience and information technology. Traditional methods are using survey, interviews, focus group people are overtly and consciously reporting on their experience and thoughts. The unconscious side of customer behavior is largely unmeasured in the traditional methods. Neuroscience has a potential to understand the unconscious part. Through this paper, we are going to present specific results of selected tools and methods that are used to understand consumer behaviors.Keywords: neuromarketing, neuroscience, consumer behaviors, tools
Procedia PDF Downloads 4022282 Anthropomorphic Brand Mascot Serve as the Vehicle: To Quickly Remind Customers Who You Are and What You Stand for in Indian Cultural Context
Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabati
Abstract:
For many years organization have been exercising a creative technique of applying brand mascots, which results in making a visual ‘ambassador’ of a brand. The goal of mascot’s is just not confined to strengthening the brand identity, improving customer perception, but also acting as a vehicle of anthropomorphic translation towards the consumer. Such that it helps in embracing the power of recognition and processing the experiences happening in our daily lives. The study examines the relationship between the specific mascot features and brand attitude. It eliminates that mascot trust is an important mediator of the mascot features on brand attitude. Anthropomorphic characters turn out to be the key players despite the application of brand mascots in today’s marketing.Keywords: advertising, mascot, branding, recall
Procedia PDF Downloads 3342281 Design of Cloud Service Brokerage System Intermediating Integrated Services in Multiple Cloud Environment
Authors: Dongjae Kang, Sokho Son, Jinmee Kim
Abstract:
Cloud service brokering is a new service paradigm that provides interoperability and portability of application across multiple Cloud providers. In this paper, we designed cloud service brokerage system, any broker, supporting integrated service provisioning and SLA based service life cycle management. For the system design, we introduce the system concept and whole architecture, details of main components and use cases of primary operations in the system. These features ease the Cloud service provider and customer’s concern and support new Cloud service open market to increase cloud service profit and prompt Cloud service echo system in cloud computing related area.Keywords: cloud service brokerage, multiple Clouds, Integrated service provisioning, SLA, network service
Procedia PDF Downloads 4882280 Computational Analysis of Thermal Degradation in Wind Turbine Spars' Equipotential Bonding Subjected to Lightning Strikes
Authors: Antonio A. M. Laudani, Igor O. Golosnoy, Ole T. Thomsen
Abstract:
Rotor blades of large, modern wind turbines are highly susceptible to downward lightning strikes, as well as to triggering upward lightning; consequently, it is necessary to equip them with an effective lightning protection system (LPS) in order to avoid any damage. The performance of existing LPSs is affected by carbon fibre reinforced polymer (CFRP) structures, which lead to lightning-induced damage in the blades, e.g. via electrical sparks. A solution to prevent internal arcing would be to electrically bond the LPS and the composite structures such that to obtain the same electric potential. Nevertheless, elevated temperatures are achieved at the joint interfaces because of high contact resistance, which melts and vaporises some of the epoxy resin matrix around the bonding. The produced high-pressure gasses open up the bonding and can ignite thermal sparks. The objective of this paper is to predict the current density distribution and the temperature field in the adhesive joint cross-section, in order to check whether the resin pyrolysis temperature is achieved and any damage is expected. The finite element method has been employed to solve both the current and heat transfer problems, which are considered weakly coupled. The mathematical model for electric current includes Maxwell-Ampere equation for induced electric field solved together with current conservation, while the thermal field is found from heat diffusion equation. In this way, the current sub-model calculates Joule heat release for a chosen bonding configuration, whereas the thermal analysis allows to determining threshold values of voltage and current density not to be exceeded in order to maintain the temperature across the joint below the pyrolysis temperature, therefore preventing the occurrence of outgassing. In addition, it provides an indication of the minimal number of bonding points. It is worth to mention that the numerical procedures presented in this study can be tailored and applied to any type of joints other than adhesive ones for wind turbine blades. For instance, they can be applied for lightning protection of aerospace bolted joints. Furthermore, they can even be customized to predict the electromagnetic response under lightning strikes of other wind turbine systems, such as nacelle and hub components.Keywords: carbon fibre reinforced polymer, equipotential bonding, finite element method, FEM, lightning protection system, LPS, wind turbine blades
Procedia PDF Downloads 1642279 The Effect of Support Program Based on The Health Belief Model on Reproductive Health Behavior in Women with Orthopedic Disabled
Authors: Eda Yakit Ak, Ergül Aslan
Abstract:
The study was conducted using the quasi-experimental design to determine the influence of the nursing support program prepared according to the Health Belief Model on reproductive health behaviors of orthopedically disabled women in the physical therapy and rehabilitation clinic at a university hospital between August 2019-October, 2020. The research sample included 50 women (35 in the control group and 15 in the experimental group with orthopedic disability). A 3-week nursing support program was applied to the experimental group of women. To collect the data, Introductory Information Form and Scale for Determining the Protective Attitudes of Married Women towards Reproductive Health (SDPAMW) were applied. The evaluation was made with a follow-up form for four months. In the first evaluation, the total SDPAMW scores were 119.93±20.59 for the experimental group and 122.20±16.71 for the control group. In the final evaluation, the total SDPAMW scores were 144.27±11.95 for the experimental group and 118.00±16.43 for the control group. The difference between the groups regarding the first and final evaluations for the total SDPAMW scores was statistically significant (p<0.01). In the experimental group, between the first and final evaluations regarding the sub-dimensions of SDPAMW, an increase was found in the behavior of seeing the doctor on reproductive health issues, protection from reproductive organ and breast cancer, general health behaviors to protect reproductive health, and protection from genital tract infections (p<0.05). Consequently, the nursing support program based on the Health Belief Model applied to orthopedically disabled women positively affected reproductive health behaviors.Keywords: orthopedically disabled, woman, reproductive health, nursing support program, health belief model
Procedia PDF Downloads 1482278 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2272277 The Yak of Thailand: Folk Icons Transcending Culture, Religion, and Media
Authors: David M. Lucas, Charles W. Jarrett
Abstract:
In the culture of Thailand, the Yak serve as a mediated icon representing strength, power, and mystical protection not only for the Buddha, but for population of worshipers. Originating from the forests of China, the Yak continue to stand guard at the gates of Buddhist temples. The Yak represents Thai culture in the hearts of Thai people. This paper presents a qualitative study regarding the curious mix of media, culture, and religion that projects the Yak of Thailand as a larger than life message throughout the political, cultural, and religious spheres. The gate guardians, or gods as they are sometimes called, appear throughout the religious temples of Asian cultures. However, the Asian cultures demonstrate differences in artistic renditions (or presentations) of such sentinels. Thailand gate guards (the Yak) stand in front of many Buddhist temples, and these iconic figures display unique features with varied symbolic significance. The temple (or wat), plays a vital role in every community; and, for many people, Thailand’s temples are the country’s most endearing sights. The authors applied folk-nography as a methodology to illustrate the importance of the Thai Yak in serving as meaningful icons that transcend not only time, but the culture, religion, and mass media. The Yak represent mythical, religious, artistic, cultural, and militaristic significance for the Thai people. Data collection included interviews, focus groups, and natural observations. This paper summarizes the perceptions of the Thai people concerning their gate sentries and the relationship, communication, connection, and the enduring respect that Thai people hold for their guardians of the gates.Keywords: communication, culture, folknography, icon, image, media, protection, religion, yak
Procedia PDF Downloads 3992276 The International Constitutional Order and Elements of Human Rights
Authors: Girma Y. Iyassu Menelik
Abstract:
“The world is now like a global village!” so goes the saying that shows that due to development and technology the countries of the world are now closely linked. In the field of Human rights there is a close relationship in the way that rights are recognised and enforced. This paper will show that human rights have evolved from ancient times through important landmarks such as the Magna Carta, the French Declaration of Rights of Man and of the Citizen and the American Bill of Rights. The formation of the United Nations after the Second World War resulted in the need to codify and protect human rights. There are some rights which are so fundamental that they are found in international and continental instruments, national constitutions and domestic legislation. In the civil and political sphere they include the right to vote, to freedom of association, speech and assembly, right to life, privacy and fair trial. In the economic and social sphere you have the right to work, protection of the family, social security and rights to education, health and shelter. In some instance some rights can be suspended in times of public emergency but such derogations shall be circumscribed by the law and in most constitutions such limitations are subject to judicial review. However, some rights are so crucial that they cannot be derogated from under any circumstances and these include the right to life, recognition before the law, freedom from torture and slavery and of thought, conscience and religion. International jurisprudence has been developed to protect fundamental rights and avoid discrimination on the grounds of race, colour, sex, language or social origin. The elaborate protection system go to show that these rights have become part of the international order and they have universal application. We have now got to a stage where UDHR, ICCPR and ICESCR and have come to be regarded as part of an international bill of rights with horizontal and vertical enforcement mechanisms involving state parties, NGO’s , international bodies and other organs.Keywords: rights, international, constitutional, state, judiciary
Procedia PDF Downloads 4522275 Adobe Attenuation Coefficient Determination and Its Comparison with Other Shielding Materials for Energies Found in Common X-Rays Procedures
Authors: Camarena Rodriguez C. S., Portocarrero Bonifaz A., Palma Esparza R., Romero Carlos N. A.
Abstract:
Adobe is a construction material that fulfills the same function as a conventional brick. Widely used since ancient times, it is present in an appreciable percentage of buildings in Latin America. Adobe is a mixture of clay and sand. The interest in the study of the properties of this material arises due to its presence in the infrastructure of hospital´s radiological services, located in places with low economic resources, for the attenuation of radiation. Some materials such as lead and concrete are the most used for shielding and are widely studied in the literature. The present study will determine the mass attenuation coefficient of Adobe. The minimum required thicknesses for the primary and secondary barriers will be estimated for the shielding of radiological facilities where conventional and dental X-rays are performed. For the experimental procedure, an X-ray source emitted direct radiation towards different thicknesses of an Adobe barrier, and a detector was placed on the other side. For this purpose, an UNFORS Xi solid state detector was used, which collected information on the difference of radiation intensity. The initial parameters of the exposure started at 45 kV; and then the tube tension was varied in increments of 5 kV, reaching a maximum of 125 kV. The X-Ray tube was positioned at a distance of 0.5 m from the surface of the Adobe bricks, and the collimation of the radiation beam was set for an area of 0.15 m x 0.15 m. Finally, mathematical methods were applied to determine the mass attenuation coefficient for different energy ranges. In conclusion, the mass attenuation coefficient for Adobe was determined and the approximate thicknesses of the most common Adobe barriers in the hospital buildings were calculated for their later application in the radiological protection.Keywords: Adobe, attenuation coefficient, radiological protection, shielding, x-rays
Procedia PDF Downloads 1572274 Protective Effect of Saponin Extract from the Root of Garcinia kola (Bitter Kola) against Paracetamol-Induced Hepatotoxicity in Albino Rats
Authors: Alli Smith Yemisi Rufina, Adanlawo Isaac Gbadura
Abstract:
Liver disorders are one of the major problems of the world. Despite its frequent occurrence, high morbidity, and high mortality, its medical management is currently inadequate. This study was designed to evaluate the Hepatoprotective effect of saponin extract of the root of Garcinia kola on the integrity of the liver of paracetamol induced Wistar albino rats. Twenty-five male adult Wistar albino rats were divided into five (5) groups. Group I, was the Control group that received distilled water only, group II was the negative control that received 2 g/kg of paracetamol on the 13th day, and group III, IV, and V were pre-treated with 100, 200 and 400 mg/kg of the saponin extract before inducing the liver damage on the 13th day with 2 g/kg of paracetamol. Twenty-four hours after administration, the rats were sacrificed, and blood samples were collected. The serum Alanine Transaminase (ALT), Aspartate Transaminase (AST), Alkaline Phosphatase (ALP) activities, Bilirubin and Conjugated Bilirubin, Glucose and Protein concentrations were evaluated. The liver was fixed immediately in Formalin and was processed and stained with Haematoxylin and Eosin (H&E). Administration of saponin extract from the root of Garcinia kola significantly decreased paracetamol induced elevated enzymes in the test group. Also, histological observations showed that saponin extract of the root of Garcinia kola exhibited a significant liver protection against the toxicant as evident by the cells trying to return to normal. Saponin extract from the root of Garcinia kola indicated a protection of the structural integrity of the hepatocytic cell membrane and regeneration of the damaged liver.Keywords: hepatoprotective, liver damage, Garcinia kola, saponin, paracetamol
Procedia PDF Downloads 2612273 The Requirements of Developing a Framework for Successful Adoption of Quality Management Systems in the Construction Industry
Authors: Mohammed Ali Ahmed, Vaughan Coffey, Bo Xia
Abstract:
Quality management systems (QMSs) in the construction industry are often implemented to ensure that sufficient effort is made by companies to achieve the required levels of quality for clients. Attainment of these quality levels can result in greater customer satisfaction, which is fundamental to ensure long-term competitiveness for construction companies. However, the construction sector is still lagging behind other industries in terms of its successful adoption of QMSs, due to the relative lack of acceptance of the benefits of these systems among industry stakeholders, as well as from other barriers related to implementing them. Thus, there is a critical need to undertake a detailed and comprehensive exploration of adoption of QMSs in the construction sector. This paper comprehensively investigates in the construction sector setting, the impacts of all the salient factors surrounding successful implementation of QMSs in building organizations, especially those of external factors. This study is part of an ongoing PhD project, which aims to develop a new framework that integrates both internal and external factors affecting QMS implementation. To achieve the paper aim and objectives, interviews will be conducted to define the external factors influencing the adoption of QMSs, and to obtain holistic critical success factors (CSFs) for implementing these systems. In the next stage of data collection, a questionnaire survey will be developed to investigate the prime barriers facing the adoption of QMSs, the CSFs for their implementation, and the external factors affecting the adoption of these systems. Following the survey, case studies will be undertaken to validate and explain in greater detail the real effects of these factors on QMSs adoption. Specifically, this paper evaluates the effects of the external factors in terms of their impact on implementation success within the selected case studies. Using findings drawn from analyzing the data obtained from these various approaches, specific recommendations for the successful implementation of QMSs will be presented, and an operational framework will be developed. Finally, through a focus group, the findings of the study and the new developed framework will be validated. Ultimately, this framework will be made available to the construction industry to facilitate the greater adoption and implementation of QMSs. In addition, deployment of the applicable recommendations suggested by the study will be shared with the construction industry to more effectively help construction companies to implement QMSs, and overcome the barriers experienced by businesses, thus promoting the achievement of higher levels of quality and customer satisfaction.Keywords: barriers, critical success factors, external factors, internal factors, quality management systems
Procedia PDF Downloads 1872272 Evolving Paradigm of Right to Development in International Human Rights Law and Its Transformation into the National Legal System: Challenges and Responses in Pakistan
Authors: Naeem Ullah Khan, Kalsoom Khan
Abstract:
No state can be progressive and prosperous in which a large number of people is deprived of their basic economic rights and freedoms. In the contemporary world of globalization, the right to development has gained a momentum force in the domain of International Development Law (IDL) and has integrated into the National Legal System (NLS) of the major developed states. The international experts on human rights argued that the right to development (RTD) is called a third-generation human right which tends to enhance the welfare and prosperity of individuals, and thus, it is a right to a process whose outcomes are human rights despite the controversy on the implications of RTD. In the Pakistan legal system, the RTD has not been expressly stated in the constitution of the Islamic Republic of Pakistan, 1973. However, there are some implied constitutional provisions which reflect the concept of RTD. The jurisprudence on RTD is still an evolving paradigm in the contextual perspective of Pakistan, and the superior court of diverse jurisdiction acts as a catalyst regarding the protection and enforcement of RTD in the interest of the public at large. However, the case law explores the positive inclination of the courts in Pakistan on RTD be incorporated as an express provision in the chapters of fundamental rights; in this scenario, the high court’s of Pakistan under Article 199 and the supreme court of Pakistan under Article 184(3) have exercised jurisdiction on the enforcement of RTD. This paper inter-alia examines the national dimensions of RTD from the standpoint of state practice in Pakistan and it analyzes the experience of judiciary in the protection and enforcement of RTD. Moreover, the paper highlights the social and cultural challenges to Pakistan in the implementation of RTD and possible solution to improve the conditions of human rights in Pakistan. This paper will also highlight the steps taken by Pakistan regarding the awareness, incorporation, and propagation of RTD at the national level.Keywords: globalization, Pakistan, RTD, third-generation right
Procedia PDF Downloads 1682271 Altruistic and Hedonic Motivations to Write eWOM Reviews on Hotel Experience
Authors: Miguel Llorens-Marin, Adolfo Hernandez, Maria Puelles-Gallo
Abstract:
The increasing influence of Online Travel Agencies (OTAs) on hotel bookings and the electronic word-of-mouth (eWOM) contained in them has been featured by many scientific studies as a major factor in the booking decision. The main reason is that nowadays, in the hotel sector, consumers first come into contact with the offer through the web and the online environment. Due to the nature of the hotel product and the fact that it is booked in advance to actually seeing it, there is a lack of knowledge about its actual features. This makes eWOM a major channel to help consumers to reduce their perception of risk when making their booking decisions. This research studies the relationship between aspects of customer influenceability by reading eWOM communications, at the time of booking a hotel, with the propensity to write a review. In other words, to test relationships between the reading and the writing of eWOM. Also investigates the importance of different underlying motivations for writing eWOM. Online surveys were used to obtain the data from a sample of hotel customers, with 739 valid questionnaires. A measurement model and Path analysis were carried out to analyze the chain of relationships among the independent variable (influenceability from reading reviews) and the dependent variable (propensity to write a review) with the mediating effects of additional variables, which help to explain the relationship. The authors also tested the moderating effects of age and gender in the model. The study considered three different underlying motivations for writing a review on a hotel experience, namely hedonic, altruistic and conflicted. Results indicate that the level of influenceability by reading reviews has a positive effect on the propensity to write reviews; therefore, we manage to link the reading and the writing of reviews. Authors also discover that the main underlying motivation to write a hotel review is the altruistic motivation, being the one with the higher Standard regression coefficient above the hedonic motivation. The authors suggest that the propensity to write reviews is not related to sociodemographic factors (age and gender) but to attitudinal factors such as ‘the most influential factor when reading’ and ‘underlying motivations to write. This gives light on the customer engagement motivations to write reviews. The implications are that managers should encourage their customers to write eWOM reviews on altruistic grounds to help other customers to make a decision. The most important contribution of this work is to link the effect of reading hotel reviews with the propensity to write reviews.Keywords: hotel reviews, electronic word-of-mouth (eWOM), online consumer reviews, digital marketing, social media
Procedia PDF Downloads 1002270 Environmental Protection by Optimum Utilization of Car Air Conditioners
Authors: Sanchita Abrol, Kunal Rana, Ankit Dhir, S. K. Gupta
Abstract:
According to N.R.E.L.’s findings, 700 crore gallons of petrol is used annually to run the air conditioners of passenger vehicles (nearly 6% of total fuel consumption in the USA). Beyond fuel use, the Environmental Protection Agency reported that refrigerant leaks from auto air conditioning units add an additional 5 crore metric tons of carbon emissions to the atmosphere each year. The objective of our project is to deal with this vital issue by carefully modifying the interiors of a car thereby increasing its mileage and the efficiency of its engine. This would consequently result in a decrease in tail emission and generated pollution along with improved car performance. An automatic mechanism, deployed between the front and the rear seats, consisting of transparent thermal insulating sheet/curtain, would roll down as per the requirement of the driver in order to optimize the volume for effective air conditioning, when travelling alone or with a person. The reduction in effective volume will yield favourable results. Even on a mild sunny day, the temperature inside a parked car can quickly spike to life-threatening levels. For a stationary parked car, insulation would be provided beneath its metal body so as to reduce the rate of heat transfer and increase the transmissivity. As a result, the car would not require a large amount of air conditioning for maintaining lower temperature, which would provide us similar benefits. Authors established the feasibility studies, system engineering and primarily theoretical and experimental results confirming the idea and motivation to fabricate and test the actual product.Keywords: automation, car, cooling insulating curtains, heat optimization, insulation, reduction in tail emission, mileage
Procedia PDF Downloads 2772269 Developments in corporate governance and economic growth in Sub Saharan Africa
Authors: Martha Matashu
Abstract:
This study examined corporate governance and economic growth trends in Sub Saharan African (SSA) countries. The need for corporate governance arise from the fact that the day to day running of the business is done by management who in accordance with the neoclassical theory and agency theory have inborn tendencies to use the resources of the company to their advantage. This prevails against a background where the endogenous economic growth theory hold the assumption that economic growth is an outcome of the overall performance of all companies within an economy. This suggest that corporate governance at firm level determine economic growth through its impact on the overall performance. Nevertheless, insight into literature suggest that efforts to promote corporate governance in countries across SSA since the 1980s to date have not yet yielded desired outcomes. The board responsibilities, shareholder rights, disclosure and transparency, protection of minority shareholder, and liability of directors were thus used as proxies of corporate governance because these are believed to be mechanisms that are believed to enhance company performance their effect on enhancing accountability and transparency. Using panel data techniques, corporate governance and economic growth data for 29 SSA countries from the period of 2008 to 2019 was analysed. The findings revealed declining economic growth trend despite an increase in corporate governance aspects such as director liability, shareholders’ rights, and protection of minority shareholder in SSA countries. These findings are in contradiction to the popularly held theoretical principles of economic growth and corporate governance. The study reached the conclusion thata nonlinearrelationship exists between corporate governance and economic growth within the selectedSSA countries during the period under investigation. This study thus recommends that measures should be taken to create conditions for corporate governance that would bolster significant positive contributions to economic growth in the region.Keywords: corporate governance, economic growth, sub saharan Africa, agency theory, endogenous theory
Procedia PDF Downloads 1492268 The Use of Electronic Shelf Labels in the Retail Food Sector
Authors: Brent McKenzie, Victoria Taylor
Abstract:
The use of QR (Quick Response Codes) codes for customer scanning with mobile phones is a rapidly growing trend. The QR code can provide the consumer with product information, user guides, product use, competitive pricing, etc. One sector for QR use has been in retail, through the use of Electronic Shelf Labeling (henceforth, ESL). In Europe, the use of ESL for pricing has been in practice for a number of years but continues to lag in acceptance in North America. Stated concerns include costs as a key constraint, but there is also evidence that consumer acceptance represents a limitation as well. The purpose of this study is to present the findings of a consumer based study to gage the impact on their use in the retail food sector.Keywords: electronic price labels, consumer behaviour, grocery shopping, mixed methods research
Procedia PDF Downloads 3372267 Female Frontline Health Workers in High-Risk Workplaces: Legal Protection in Bangladesh amid the Covid-19 Pandemic
Authors: Nabila Farhin, Israt Jahan
Abstract:
Despite the feminisation of the global health force, women mostly engage in nursing, midwifery and community health workers (HWs), and the posts like surgeons, doctors, and specialists are generally male-dominated. It is also prominent in Bangladesh, where female HWs witness systematic workplace inequalities, discrimination, and underpayment. The Covid-19 pandemic put unsurmountable pressure on HWs as they had to serve in high-risk workplaces as frontliners. The already disadvantaged female HWs shouldered the same burden, were overworked without adequate occupational health and safety measures (OSH) and risked their lives. Acknowledging their vulnerable workplace conditions, the World Health Organization (WHO) and International Labour Organization (ILO) circulated a few specialised guidelines amid the peril. Bangladesh tried to adhere to international guidelines while formulating pandemic management strategies. In reality, the already weak and understaffed health sector collapsed with the patient influx and many HWs got infected and died in the line of duty, exposing the high-risk nature of the work. Unfortunately, the gender-segregated data of infected HWs are absent. This qualitative research investigates whether the existing laws of Bangladesh are adequate in protecting female HWs as frontliners in high-risk workplaces during the Covid-19 pandemic. The paper first examines international labour laws safeguarding female frontline HWs. It also analyses the specialised Covid-19 pandemic guidelines protecting their interests. Finally, the research investigates the compliance of Bangladesh as per international legal guidance during the pandemic. In doing so, it explores the domestic laws, professional guidelines for HWs and pandemic response strategies. The paper critically examines the primary sources like international and national statutes, rules, regulations and guidelines. Secondary sources like authoritative journal articles, books and newspaper reports are contextually analysed in line with the objective of the paper. The definition of HW is ambiguous in the labour laws of Bangladesh. It leads to confusion regarding the extent of legal protection rendered to female HWs at private hospitals in high-risk situations. The labour laws are not applicable in Public hospitals, as the employees follow the public service rules. Unfortunately, the country has no specialised law to protect HWs in high-risk workplaces, and the professional guidelines for HWs also remain inadequate in this regard. Even though the pandemic management strategies highlight some protective measures in high-risk situations, they only deal with HWs who are pregnant or have underlying health issues. No specialised protective guidelines can be found for female HWs as frontliners. Therefore, the laws are insufficient and failed to render adequate legal protection to female frontline HWs during the pandemic. The country also lacks comprehensive health legislation and uniform institutional and professional guidelines, preventing them from accessing grievance mechanisms. Hence, the female HWs felt victimised while duty-bound to serve in high-risk workplaces without adequate safeguards. Bangladesh should clarify the definition of HWs and standardise the service rules for providing medical care in high-risk workplaces. The research also recommends adequate health legislation and specialised legal protection to safeguard female HWs in future emergencies.Keywords: female health workers (HWs), high-risk workplaces, Covid-19 pandemic, Bangladesh
Procedia PDF Downloads 782266 Hybrid Model: An Integration of Machine Learning with Traditional Scorecards
Authors: Golnush Masghati-Amoli, Paul Chin
Abstract:
Over the past recent years, with the rapid increases in data availability and computing power, Machine Learning (ML) techniques have been called on in a range of different industries for their strong predictive capability. However, the use of Machine Learning in commercial banking has been limited due to a special challenge imposed by numerous regulations that require lenders to be able to explain their analytic models, not only to regulators but often to consumers. In other words, although Machine Leaning techniques enable better prediction with a higher level of accuracy, in comparison with other industries, they are adopted less frequently in commercial banking especially for scoring purposes. This is due to the fact that Machine Learning techniques are often considered as a black box and fail to provide information on why a certain risk score is given to a customer. In order to bridge this gap between the explain-ability and performance of Machine Learning techniques, a Hybrid Model is developed at Dun and Bradstreet that is focused on blending Machine Learning algorithms with traditional approaches such as scorecards. The Hybrid Model maximizes efficiency of traditional scorecards by merging its practical benefits, such as explain-ability and the ability to input domain knowledge, with the deep insights of Machine Learning techniques which can uncover patterns scorecard approaches cannot. First, through development of Machine Learning models, engineered features and latent variables and feature interactions that demonstrate high information value in the prediction of customer risk are identified. Then, these features are employed to introduce observed non-linear relationships between the explanatory and dependent variables into traditional scorecards. Moreover, instead of directly computing the Weight of Evidence (WoE) from good and bad data points, the Hybrid Model tries to match the score distribution generated by a Machine Learning algorithm, which ends up providing an estimate of the WoE for each bin. This capability helps to build powerful scorecards with sparse cases that cannot be achieved with traditional approaches. The proposed Hybrid Model is tested on different portfolios where a significant gap is observed between the performance of traditional scorecards and Machine Learning models. The result of analysis shows that Hybrid Model can improve the performance of traditional scorecards by introducing non-linear relationships between explanatory and target variables from Machine Learning models into traditional scorecards. Also, it is observed that in some scenarios the Hybrid Model can be almost as predictive as the Machine Learning techniques while being as transparent as traditional scorecards. Therefore, it is concluded that, with the use of Hybrid Model, Machine Learning algorithms can be used in the commercial banking industry without being concerned with difficulties in explaining the models for regulatory purposes.Keywords: machine learning algorithms, scorecard, commercial banking, consumer risk, feature engineering
Procedia PDF Downloads 1342265 The Portuguese Framework of the Professional Internship without Public Funds
Authors: Ana Lambelho
Abstract:
In an economic crisis such as the one that shook (and still shake) Europe, one does not question the importance of the measures that encourage the hiring and integration of young people into the labour market. In the mentioned context, enterprises tend to reduce the cost of labour and to seek flexible contracting instruments. The professional internships allow innovation and creativity at low cost, because, as they are not labour contracts, the enterprises do not have to respect the minimum standards related to wages, working time duration and so on. In Portugal, we observe a widespread existence of training contracts in which the trainee worked several hours without salary or was paid below the legally prescribed for the function and the work period. For this reason, under the tripartite agreement for a new system of regulation of labour relations, employment policies and social protection, between the Government and the social partners, in June 2008, foresaw a prohibition of professional internships unpaid and the legal regulation of the mandatory internships for access to an activity. The first Act about private internship contracts, i.e., internships without public funding was embodied in the Decree-Law N. 66/2011, of 1st June. This work is dedicated to the study of the legal regime of the internship contract in Portugal, by analysing the problems brought by the new set of rules and especially those which remains unresolved. In fact, we can conclude that the number of situations covered by the Act is much lower than what was expected, because of the exclusion of the mandatory internship for access to a profession when the activity is developed autonomously. Since the majority of the activities can be developed both autonomously or subordinated, it is quite easy to out of the Act requirements and, so, out of the protection that it confers to the intern. In order to complete this study, we considered not only the mentioned legal Act, but also the few doctrine and jurisprudence about the theme.Keywords: intern, internship contact, labour law, Portugal
Procedia PDF Downloads 3102264 Innovative Design Considerations for Adaptive Spacecraft
Authors: K. Parandhama Gowd
Abstract:
Space technologies have changed the way we live in the present day society and manage many aspects of our daily affairs through Remote sensing, Navigation & Communications. Further, defense and military usage of spacecraft has increased tremendously along with civilian purposes. The number of satellites deployed in space in Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and the Geostationary Orbit (GEO) has gone up. The dependency on remote sensing and operational capabilities are most invariably to be exploited more and more in future. Every country is acquiring spacecraft in one way or other for their daily needs, and spacecraft numbers are likely to increase significantly and create spacecraft traffic problems. The aim of this research paper is to propose innovative design concepts for adaptive spacecraft. The main idea here is to improve existing design methods of spacecraft design and development to further improve upon design considerations for futuristic adaptive spacecraft with inbuilt features for automatic adaptability and self-protection. In other words, the innovative design considerations proposed here are to have future spacecraft with self-organizing capabilities for orbital control and protection from anti-satellite weapons (ASAT). Here, an attempt is made to propose design and develop futuristic spacecraft for 2030 and beyond due to tremendous advancements in VVLSI, miniaturization, and nano antenna array technologies, including nano technologies are expected.Keywords: satellites, low earth orbit (LEO), medium earth orbit (MEO), geostationary earth orbit (GEO), self-organizing control system, anti-satellite weapons (ASAT), orbital control, radar warning receiver, missile warning receiver, laser warning receiver, attitude and orbit control systems (AOCS), command and data handling (CDH)
Procedia PDF Downloads 2962263 A Phenomenological Study on the Role of Civil Society Organizations in Supporting Urban Refugees in Thailand
Authors: Rowena Clemino Alcoba
Abstract:
Thailand is host to the largest number of refugees in the region. The country has been one of the most accessible points of entry to refugees around the world because it has relatively lenient visa requirements, enabling asylum seekers to enter the country and subsequently search for legal assistance. However, because Thailand is not a signatory to the 1951 Geneva Convention on Refugees which governs the refugee status determination and safeguards several rights of the refugees, there are no national laws or administrative framework on the protection of refugees. Refugees are considered as illegal migrants, and certain groups are permitted to stay temporarily only upon executive discretion. Aside from the documented group of refugees from the Myanmar border, there are many others who came from different parts of the world. They are known as urban refugees believed to be in the thousands and are scattered in the impoverished areas of Bangkok and the suburbs. This study aims to advance understanding of the role of civil society organizations in supporting refugees, with particular focus on urban refugees. Using the method of triangulation in qualitative research, the study investigates the life journey of a refugee family from Pakistan, their difficulties and struggles to survive in perilous situations. The study presents the dynamics of how civil society works and collaborates to fill the gap for much-needed social services. It also discusses the depth and scope of the role of faith actors in the protection and support of this vulnerable sector. The engagement of civil society reveals framework and structure that aims to create long-term impact. The help provided is not merely monetary or material dole-outs but a platform for refugees to integrate with community, develop skills and make productive use of their time.Keywords: asylum seeker, civil society, faith actors, refugees
Procedia PDF Downloads 1472262 Durability of Cement Bonded Particleboards Produced from Terminalia superba and Gmelina arborea against Subterranean Termite Attack
Authors: Amos Olajide Oluyege, Emmanuel Uchechukwu Opara, Sunday Adeniyi Adedutan, Joseph Adeola Fuwape
Abstract:
This study was conducted to determine the durability of wood-cement particleboards when exposed to attack by subterranean termites, Macrotermes subhylinus. The boards were made from Terminalia superba and Gmelina arborea wood sawdust at nominal board densities (BD) of 1000, 900, and 800 kg/m³ using wood-cement mixing ratios (MR) of 3:1, 2.5:1, 2:1, and 1:1. Above ground durability tests against termite attack were carried out according to ASTM D 2017 for 14 weeks. Results of visual assessment of the wood cement particleboards show that all the board samples had a visual rating that was not less than 7 (i.e., moderate attack) for both species irrespective of the MR and BD. T. superba boards were found to have higher resistance to termite attack compared to their G. arborea counterparts. The mean values for weight loss following exposure ranged from 1.93 to 6.13% and 3.24 to 12.44%. Analysis of variance (ANOVA) results of the weight loss assessment revealed a significant (p < 0.05) effect of species and mixing ratio on the weight loss of the boards due to termite attack with F(₁,₇₂) = 92.890 and P = 0.000 and F(₃,₇₂) = 8.318 and p = 0.000, while board density did not have any significant effect (p > 0.05) with F (₂,₇₂) = 1.307 and p = 0.277. Thus, boards made from a higher mixing ratio had better resistance against termite attacks. Thus, it can be concluded that the durability of cement-bonded particleboards when exposed to subterranean termite attack is not only dependent on the quality of the wood raw material (species) but also on the enhanced protection imparted by the cement matrix; the protection increased with increase in cement/wood mixing ratio.Keywords: cement-bonded particleboard, mixing ratio, board density, Gmelina arborea, Terminalia superba
Procedia PDF Downloads 2162261 Strategic Management of a Geoscience Education and Training Program
Authors: Lee Ock-Sun
Abstract:
The effective development of a geoscience education and training program takes account of the rapidly changing environment in the geoscience market, includes information about resource-rich countries which have international education demands. In this paper, we introduce the geoscience program run bythe International School for Geoscience Resources at the Korea Institute of Geoscience and Mineral Resources (IS-Geo of KIGAM),and show its remarkable performance. To further effective geoscience program planning and operation, we present recommendations for strategic management for customer-oriented operation with a more favorable program format and advanced training aids. Above all, the IS-Geo of KIGAM should continue improve through‘plan-do-see-feedback’activities based on the recommendations.Keywords: demand survey, geoscience program, program performance, strategic management
Procedia PDF Downloads 4442260 Study of the Protective Effects of Summer Savory against Multiple Organ Damage Induced by Lead Acetate in Rats
Authors: Bassant M. M. Ibrahim, Doha H. Abou Baker, Ahmed Abd Elghafour
Abstract:
Excessive exposure to heavy metals contributes to the occurrence of deleterious health problems that affect vital organs like the brain, liver, kidneys, and heart. The use of natural products that have antioxidant capabilities may contribute to the protection of these organs. In the present study, the essential oil of summer savory (Satureja hortensis) was used to evaluate its protective effects against lead acetate induced damaging effect on rats’ vital organs, due to its high contents of carvacrol, y-terpinene, and p-cymene. Forty female Wister Albino rats were classified into five equal groups, the 1st served as normal group, the 2nd served as positive control group was given lead acetate (60 mg/kg) intra-peritoneal (IP), the third to fifth groups were treated with calcium disodium (EDTA) as chelating agent and summer savory essential oil in doses of (50 and 100mg/kg) respectively. All treatments were given IP concomitant with lead acetate for ten successive days. At the end of the experiment duration electrocardiogram (ECG), an open field test for the evaluation of psychological state, rotarod test as for the evaluation of locomotor coordination ability as well as anti-inflammatory and oxidative stress biomarkers in serum and histopathology of vital organs were performed. The investigations in this study show that the protective effect of high dose of summer savory essential oil is more than the low dose and that the essential oil of summer savory is a promising agent that can contribute to the protection of vital organs against the hazardous damaging effects of lead acetate.Keywords: brain, heart, kidneys, lead acetate, liver, protective, summer savory
Procedia PDF Downloads 1242259 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 1162258 Artificial Intelligence in Enterprise Information Systems: A Review
Authors: Danah S. Alabdulmohsin
Abstract:
Due to the fast growth of organizational data as well as the emergence of new technologies such as artificial intelligence (AI), organizations tend to utilize these new technologies in their enterprise information systems (EIS) either to overcome the issues they struggle with or to enhance their functions. The aim of this paper is to review the potential role of AI technologies in EIS, namely: enterprise resource planning systems (ERP), customer relation management systems (CRM), supply chain management systems (SCM), knowledge systems (KM), and human resources management systems (HRM). The paper provided the definitions of these systems as well as the definitions of AI technologies that have been used in EIS. In addition, the paper discussed the challenges that organizations might face while integrating AI with their information systems and explained why some organizations fail in achieving successful implementations of the integration.Keywords: artificial intelligence, AI, enterprise information system, EIS, integration
Procedia PDF Downloads 972257 Antifeedant Activity of Plant Extracts on the Spongy Moth (Lymantria dispar) Larvae
Authors: Jovana M. Ćirković, Aleksandar M. Radojković, Sanja Z. Perać, Jelena N. Jovanović, Zorica M. Branković, Slobodan D. Milanović, Ivan Lj. Milenković, Jovan N. Dobrosavljević, Nemanja V. Simović, Vanja M. Tadić, Ana R. Žugić, Goran O. Branković
Abstract:
The protection of forests is a national interest and of strategic importance in every country. The spongy moth (Lymantria dispar) is a damaging invasive pest that can weaken and destroy trees by defoliating them. Chemical pesticides commonly used to protect forests against spongy moths not only have a negative impact on terrestrial and aquatic organisms/ecosystems but also often fail to provide significant protection. Therefore, many eco-friendly alternatives have been considered. Within this research, a new biopesticide was developed based on the method of nanoencapsulation of plant extracts in a biopolymer matrix, which provides a slow release of the active components during a substantial time period. The antifeedant activity of plant extracts of common (Fraxinus excelsior L.), manna (F. ornus L.) ash tree, and the tree of heaven Ailanthus altissima (Mill.) was tested on the spongy moth (Lymantria dispar L, 1758) larvae. To test the antifeedant activity of these compounds, the choice and non-choice tests in laboratory conditions for different plant extract concentrations (0.01, 0.1, 0.5, and 1 % v/v) were carried out. In both cases, the best results showed formulations based on the tree of heaven and common ash for the concentration of 1%, with deterioration indices of 163 and 132, respectively. The main benefit of these formulations is their versatility, effectiveness, prolonged effect, and because they are completely environmentally acceptable. Therefore, they can be considered for suppression of the spongy moth in forest ecosystems.Keywords: Ailanthus altissima (Mill.), Fraxinus excelsior L., encapsulation, Lymantria dispar
Procedia PDF Downloads 77