Search results for: domain parking service
4291 Melanoma Antigen Proteins Are Involved in DNA Damage Response
Authors: Olivier de Backer, Alexis Khelfi, Olivier Svensek, Axelle Nolmans, Dominique Desnoeck
Abstract:
The SMC5-SMC6 complex helps replication and repair of DNA double-strand breaks. Nse1, Nse3 and Nse4 are non-SMC components of the complex in which Nse3 stimulates the E3 ubiquitin ligase activity of Nse1 and is required for recruiting the complex on DNA. In most eukaryotes, Nse3 is a single protein, but in eutherians (placental mammals), it belongs to a large family of proteins called MAGE (Melanoma antigen) that share a conserved domain of about 200 aa known as MHD (Mage homology domain). MAGE assembles specific RING and HECT ubiquitin ligases and determines new substrates for ubiquitination. The MHD is required for the interaction with the cognate E3 ligase. Some MAGEs (referred to as Type I) are exclusively expressed in germ cells of the testis but are often expressed ectopically in cancer cells as the result of epigenetic modifications. The 12 MAGE-A genes belong to this category. Serval MAGE-A proteins could promote tumorigenesis by targeting tumor suppressor proteins (including p53) for ubiquitination and degradation. We showed that depletion of MAGE-A proteins in melanoma cells results in impaired DNA damage response and increased double-strand breaks after exposure to camptothecin. Moreover, it was shown that other actors of the DNA Damage Response were impacted when cells were depleted of MAGEA proteins.Keywords: DNA damage response, melanoma, camptothecin, new role, MAGEA
Procedia PDF Downloads 1014290 The Quality Assurance on the Standard of Private Schools in Bangkok
Authors: Autjira Songjan, Poramatdha Chutimant
Abstract:
This research is intended to study the operational quality assurance of private schools in Bangkok according to the opinions of administrators and teachers. Second is comparing the opinions of administrators and teachers about operating quality assurance process by gender, job and work experience. The sample include administrators and teachers of private schools in the Education School in Bangkok by using a proportion random technic. The questionnaire are used as query operations quality assurance to collect the data of private schools, the statistics that are used to analyze the data using the percentage, mean, standard deviation and Test the difference value and test of variance. The research found that the administrators and teachers have different sex, positions and duties have the different opinions about quality assurance in different statistically insignificant level 0.05 in the elements of performance management and the quality of the service that provided to students in the school.Keywords: educational quality assurance, performance management, private schools in Bangkok, quality of the service
Procedia PDF Downloads 2304289 Marketing Research and Analysis Improvement Effect on Production
Authors: Mina Zaky Sarofim Zaky
Abstract:
Experiential marketing is a form of marketing that offers a unique integration of experiential and entertainment elements into a product or service. Experiential marketing is defined as an unforgettable experience that penetrates the customer's mind. Customer satisfaction is also defined as the emotional response to the experience provided with the purchased product or service. Experiential marketing activities can, therefore, affect the level of customer satisfaction and loyalty. In this context, the study aims to determine the relationship between experiential marketing, customer satisfaction and customer loyalty in cosmetic products in Konya. The least squares method (PLS) was used to analyze the research data. Existing research has shown that experiential marketing is a significant predictor of customer satisfaction and customer loyalty, and that experiential marketing has a positive impact on customer satisfaction and customer loyalty.Keywords: internet, marketing, tourism, tourism management corporate responsibility, employee organizational performance, internal marketing, internal customer experiential marketing, customer satisfaction, customer loyalty, social sciences
Procedia PDF Downloads 464288 Data-Driven Dynamic Overbooking Model for Tour Operators
Authors: Kannapha Amaruchkul
Abstract:
We formulate a dynamic overbooking model for a tour operator, in which most reservations contain at least two people. The cancellation rate and the timing of the cancellation may depend on the group size. We propose two overbooking policies, namely economic- and service-based. In an economic-based policy, we want to minimize the expected oversold and underused cost, whereas, in a service-based policy, we ensure that the probability of an oversold situation does not exceed the pre-specified threshold. To illustrate the applicability of our approach, we use tour package data in 2016-2018 from a tour operator in Thailand to build a data-driven robust optimization model, and we tested the proposed overbooking policy in 2019. We also compare the data-driven approach to the conventional approach of fitting data into a probability distribution.Keywords: applied stochastic model, data-driven robust optimization, overbooking, revenue management, tour operator
Procedia PDF Downloads 1344287 Churn Prediction for Telecommunication Industry Using Artificial Neural Networks
Authors: Ulas Vural, M. Ergun Okay, E. Mesut Yildiz
Abstract:
Telecommunication service providers demand accurate and precise prediction of customer churn probabilities to increase the effectiveness of their customer relation services. The large amount of customer data owned by the service providers is suitable for analysis by machine learning methods. In this study, expenditure data of customers are analyzed by using an artificial neural network (ANN). The ANN model is applied to the data of customers with different billing duration. The proposed model successfully predicts the churn probabilities at 83% accuracy for only three months expenditure data and the prediction accuracy increases up to 89% when the nine month data is used. The experiments also show that the accuracy of ANN model increases on an extended feature set with information of the changes on the bill amounts.Keywords: customer relationship management, churn prediction, telecom industry, deep learning, artificial neural networks
Procedia PDF Downloads 1444286 Policy Analysis on Family Planning in Pakistan: Providing Options to Improve Service Provision
Authors: M. Moiz
Abstract:
Family planning has been known and accepted as a key tool to decrease fertility, provides birth spacing and plays a vital role to attain better outcomes for maternal and child health. Pakistan initiated various family planning programs to preserve maternal and child health for six decades. However, less contraceptive use leading to high fertility and low birth spacing is ultimately a risk for increasing morbidity and mortality. As an outcome of 2012 London Summit on Family Planning where 20 countries including Pakistan made its commitment to increase contraceptive prevalence rate by 55% and provide a universal access to reproductive health to protect human rights of women and ensure safe, choice informed and affordable contraceptives throughout the country. This paper will assess some of the factors of service delivery, coverage and the role of Ministry of Health and Population Welfare Department in providing Family Planning services and how it can be improved in Pakistan. In view of Pakistan Demographic Health Survey 2017-18, there are total nine million potential users of contraceptives and one third among them never used with unmet need while every fifth pregnancy ends into abortion indicates need for Family Planning services. In order to explain this concern, a comprehensive analysis has been done on role of governance in implementing family planning policy and its limitations are discussed. Moreover, this paper highlights policy options and recommendations for improving service provision through public and private sector in creating demand for Family Planning services in Pakistan.Keywords: contraceptive prevalence rate, family planning, maternal and child health, policy options
Procedia PDF Downloads 1644285 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 3504284 GPU-Based Back-Projection of Synthetic Aperture Radar (SAR) Data onto 3D Reference Voxels
Authors: Joshua Buli, David Pietrowski, Samuel Britton
Abstract:
Processing SAR data usually requires constraints in extent in the Fourier domain as well as approximations and interpolations onto a planar surface to form an exploitable image. This results in a potential loss of data requires several interpolative techniques, and restricts visualization to two-dimensional plane imagery. The data can be interpolated into a ground plane projection, with or without terrain as a component, all to better view SAR data in an image domain comparable to what a human would view, to ease interpretation. An alternate but computationally heavy method to make use of more of the data is the basis of this research. Pre-processing of the SAR data is completed first (matched-filtering, motion compensation, etc.), the data is then range compressed, and lastly, the contribution from each pulse is determined for each specific point in space by searching the time history data for the reflectivity values for each pulse summed over the entire collection. This results in a per-3D-point reflectivity using the entire collection domain. New advances in GPU processing have finally allowed this rapid projection of acquired SAR data onto any desired reference surface (called backprojection). Mathematically, the computations are fast and easy to implement, despite limitations in SAR phase history data size and 3D-point cloud size. Backprojection processing algorithms are embarrassingly parallel since each 3D point in the scene has the same reflectivity calculation applied for all pulses, independent of all other 3D points and pulse data under consideration. Therefore, given the simplicity of the single backprojection calculation, the work can be spread across thousands of GPU threads allowing for accurate reflectivity representation of a scene. Furthermore, because reflectivity values are associated with individual three-dimensional points, a plane is no longer the sole permissible mapping base; a digital elevation model or even a cloud of points (collected from any sensor capable of measuring ground topography) can be used as a basis for the backprojection technique. This technique minimizes any interpolations and modifications of the raw data, maintaining maximum data integrity. This innovative processing will allow for SAR data to be rapidly brought into a common reference frame for immediate exploitation and data fusion with other three-dimensional data and representations.Keywords: backprojection, data fusion, exploitation, three-dimensional, visualization
Procedia PDF Downloads 854283 Administrators' Information Management Capacity and Decision-Making Effectiveness on Staff Promotion in the Teaching Service Commissions in South – West, Nigeria
Authors: Olatunji Sabitu Alimi
Abstract:
This study investigated the extent to which administrators’ information storage, retrieval and processing capacities influence decisions on staff promotion in the Teaching Service Commissions (TESCOMs) in The South-West, Nigeria. One research question and two research hypotheses were formulated and tested respectively at 0.05 level of significance. The study used the descriptive research of the survey type. One hundred (100) staff on salary grade level 09 constituted the sample. Multi- stage, stratified and simple random sampling techniques were used to select 100 staff from the TESCOMs in The South-West, Nigeria. Two questionnaires titled Administrators’ Information Storage, Retrieval and Processing Capacities (AISRPC), and Staff Promotion Effectiveness (SPE) were used for data collection. The inventory was validated and subjected to test-re-test and reliability coefficient of r = 0.79 was obtained. The data were collected and analyzed using Pearson Product Moment Correlation coefficient and simple percentage. The study found that Administrators at TESCOM stored their information in files, hard copies, soft copies, open registry and departmentally in varying degrees while they also processed information manually and through electronics for decision making. In addition, there is a significant relationship between administrators’ information storage and retrieval capacities in the TESCOMs in South – West, Nigeria, (r cal = 0.598 > r table = 0.195). Furthermore, administrators’ information processing capacity and staff promotion effectiveness were found to be significantly related (r cal = 0.209 > r table = 0.195 at 0.05 level of significance). The study recommended that training, seminars, workshops should be organized for administrators on information management, while educational organizations should provide Information Management Technology (ICT) equipment for the administrators in the TESCOMs. The staff of TESCOM should be promoted having satisfied the promotion criteria such as spending required number of years on a grade level, a clean record of service and vacancy.Keywords: information processing capacity, staff promotion effectiveness, teaching service commission, Nigeria
Procedia PDF Downloads 5334282 Usage of Visual Tools for Light Exploring with Children in the Geographical Istria Region Kindergartens in Republic of Croatia and Republic of Slovenia
Authors: Urianni Merlin, Đeni Zuliani Blašković
Abstract:
Inspired by the Reggio Pedagogy approach that explores light from physical, mathematical, artistic, and natural perspectives, emphasizes the value of visual tools in light exploring that opens up a wide area of experiential discovery and knowledge, especially if used in kindergartens with children. While there is some literature evidence of visual tool usage for light exploring in kindergartens in the Republic of Slovenia, in the Republic of Croatia there are few researches, and those published are focused at shadow exploring, exploring of physical characteristics and teatrical play of light and shadow. The objectives of this research are to assess how much visual tools are used for light exploring by preschool teachers from geographical Istria kindergartens as part of the activities offered to children and if the usage of the visual tool for light exploring it’s different regarding the work environment (Slovenian and Croatian Istria kindergartens; city vs. village kindergartens; preschool teachers age and length of service). One hundred one preschool teachers from Croatian Istria Region and 70 preschool teachers from Slovenian Istria Region responded to a self-made questionnaire regarding visual tool usage habits in their work. As predicted, results show significant differences in visual tool usage regarding preschool teachers' work environment, length of service, and age. Preschool teachers from Slovenian Istria that work in kindergartens located in the city that have from 15 to 19 years of service and are more than 30 years of age use significantly more visual tools for light exploring. The results highlight the differences in visual tools usage for light exploring in the small Istria peninsula that can be attributed to different University art curricula in Slovenia and Croatia or lifelong education offered in Slovenia that is more open to Italian reggio pedagogy influence and are further used by older preschool teachers with more service experience. Considering the small number of researches, this research significantly contributes to science and motivates preschool teachers and scientists to implement the use of light tools in the preschool and university curriculum, especially in Croatia.Keywords: activities with light, light exploring, preschool children, visual tools
Procedia PDF Downloads 784281 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System
Authors: Leo Latasch, Mario Di Gennaro
Abstract:
Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.Keywords: coordination, disaster, resilience, volunteers
Procedia PDF Downloads 1424280 Effects of Self-Disclosure and Transparency on Conversational Agents in a Healthcare-Related Decision Support System
Authors: Luca Martignoni, Joseph Nserat, Eric Arand, Marvin Braun
Abstract:
The increasing application of conversational agents in healthcare and the demand for applications that enable patients to take informed decisions is changing the way patients access healthcare and take decisions. Promising results related to the acceptance of CAs in healthcare have been accomplished. In that regard, understanding how to design CAs in a way that patients trust their recommendations and decisions constitutes an important area of research. Our study examines self-disclosure and transparency as drivers of trust to enhance the medical assistance of CAs for patients. Accordingly, we examined the effects of self-disclosure and transparency on patients trust and service satisfaction by conducting an online experiment with 136 participants. Our results show that the expression of both self-disclosure and conversational agents transparency leads to an increased perception of trust but does not necessarily improve the service satisfaction. Therefore, developers should implement self-disclosure and transparency to create a trustworthy environment.Keywords: conversational agent, transparency, self-disclosure, healthcare
Procedia PDF Downloads 1394279 The Hierarchical Model of Fitness Services Quality Perception in Serbia
Authors: Mirjana Ilic, Dragan Zivotic, Aleksandra Perovic, Predrag Gavrilovic
Abstract:
The service quality perception depends on many factors, such as the area in which the services are provided, socioeconomic status, educational status, experience, age and gender of consumers, as well as many others. For this reason, it is not possible to apply instrument for establishing the service quality perception that is developed in other areas and in other populations. The aim of the research was to form an instrument for assessing the quality perception in the field of fitness in Serbia. After analyzing the available literature and conducting a pilot research, there were 15 isolated areas in which it was possible to observe the service quality perception. The areas included: material and technical basis, secondary facilities, coaches, programs, reliability, credibility, security, rapid response, compassion, communication, prices, satisfaction, loyalty, quality outcomes and motives. These areas were covered by a questionnaire consisted of 100 items where the number of items varied from area to area from 3 up to 11. The questionnaire was administered to 350 subjects of both genders (174 men and 176 women) aged from 18 to 68 years, being beneficiaries of fitness services for at least 1 year. In each of the areas was conducted a factor analysis in its exploratory form by principal components method. The number of significant factors has been determined in accordance with the Kaiser Guttman criterion. The initial factor solutions were simplified using the Varimax rotation. Analyses per areas have produced from 1 to 4 factors. Afterward, the factor analysis of factor scores on the first principal component of each of the respondents in each of the analyzed area was performed, and the factor structure was obtained with four latent dimensions interpreted as offer, the relationship with the coaches, the experience of quality and the initial impression. This factor structure was analysed by hierarchical analysis of Oblique factors, which in the second order space produced single factor interpreted as a general factor of the service quality perception. The resulting questionnaire represents an instrument which can serve managers in the field of fitness to optimize the centers development, raising the quality of services in line with consumers needs and expectations.Keywords: fitness, hierarchical model, quality perception, factor analysis
Procedia PDF Downloads 3114278 The Significance of Seasonality on the Airport Efficiency in Touristic Regions
Authors: Ioanna Pagoni, Annitsa Koumoutsidi
Abstract:
The aim of this paper is to estimate the efficiency of airports that are located in touristic regions. It focuses on the regional airports of Greece, which are located at the mainland and the islands that constitute touristic destinations. Most of these airports share the following characteristics. They operate at levels below capacity with a high level of seasonality to their traffic. In addition, in such airports, the operation of charter and low-cost airlines is significant. The efficiency of the study airports is calculated by using the non-parametric data envelopment analysis during the period of 2010-2016. The selected inputs include several airport infrastructure measures such as passenger terminal size, aircraft parking area, runway length, and the number of check-in counters, while the number of employees in each airport is also used. The number of passengers and aircraft movements are selected as outputs. The effect of seasonality, as well as the operation of charter airlines and low-cost carriers on airport efficiency, is estimated by running proper regression models. Preliminary findings indicate that low-cost and charter airlines contribute to increasing airport efficiency for most of the study airports. The results of this research could be useful for airlines, airport operators, hotel businesses, and other tourism-related operators.Keywords: airport efficiency, data envelopment analysis, low-cost carriers, charter airlines, seasonality
Procedia PDF Downloads 1264277 The Study of Information Uses Behaviour of Tourists in Songkhla Province, Thailand
Authors: Patraporn Kaewkhanitarak, Suchada Srichuar, Narawat Kanjanapan
Abstract:
This research is the survey research. The purpose of this research is to study information uses behavior and problem of tourists in Songkhla Province. The tool used in this study include structure questioner standardize in 5 levels rating scale. The 400 participants selected by convenience sampling (allowable error 5%) by Taro Yamane method. The collecting data period is 6 months from January-June 2014. The result of this study found that the type of information that the tourists often use to plan their trip is internet (x̅ = 3.81) and the most popular text is restaurant (x̅ = 3.77). The tourists found that booking or buying service from internet provided more affordable price and they could select appropriate plan by themselves. The most convenience source of information that the tourists often use is internet and website (x̅ = 3.69). Nevertheless, they explained that most of tourist information source in Songkhla province are lack and insufficient of tourist organization that provide information and service related to tourism.Keywords: information, behavior, tourists, Thailand
Procedia PDF Downloads 2534276 Customer Relationship Management: An Essential Tool for Librarians
Authors: Pushkar Lal Sharma, Sanjana Singh, Umesh Kumar Sahu
Abstract:
This paper helps to understand the need of Customer Relationship Management in Libraries and why Librarians should implement the marketing concept of Customer Relationship Management in their libraries. As like any industry, libraries too face growing challenges to continuously meet customer expectations, and attract and retain users in light of overflowing competition. The ability to understand customers, build relationships and market diverse services is essential when considering ways to expand service offerings and improve Return on Investment. Since Library is service oriented Enterprise, hence the Customer/User/ Reader/Patron are the most important element of Library & Information System to whom and for whom library offers various services. How to provide better and most efficient services to its users is the main concern of every Library & Information centre in the present era. The basic difference between Business Enterprise and Library Information System is that ‘in Business System ‘the efficiency is measured in terms of ’profit’ or ‘monetary gains’; whereas in a Library & Information System, the efficiency is measured in terms of ‘services’ and therefore the goals that are set in Business Enterprise are’ profit oriented’ whereas goals set in the Library & Information Centre are ‘Service-oriented’. With the explosion of information and advancement of technology readers have so many choices to get information rather than visiting a library. Everything is available at the click of a mouse, library customers have become more knowledgeable and demanding in an era marked by abundance of information resources and services. With this explosion of information in every field of knowledge and choice in selection of service, satisfying user has become a challenge now a day for libraries. Accordingly, Libraries have to build good relationship with its users by adopting Customer relationship Management. CRM refers to the methods and tools which help an organization to manage its relationship with its customers in an organized way. The Customer Relationship Management (CRM) combines business strategy and technology to identify, acquire and retain good customer relationship. The goal of CRM is to optimize management of customer information needs & interests and increase customer satisfaction and loyalty. Implementing CRM in Libraries can improve customer data and process management, customer loyalty, retention and satisfaction.Keywords: customer relationship management, CRM, CRM tools, customer satisfaction
Procedia PDF Downloads 684275 A New Method to Reduce 5G Application Layer Payload Size
Authors: Gui Yang Wu, Bo Wang, Xin Wang
Abstract:
Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.Keywords: 5G, JSON, payload size, service-based interface
Procedia PDF Downloads 1804274 Knowledge and Preventive Practice of Occupational Health Hazards among Nurses Working in Various Hospitals in Kathmandu
Authors: Sabita Karki
Abstract:
Occupational health hazards are recognized as global problems for health care workers, it is quiet high in developing countries. It is increasing day by day due to change in science and technology. This study aimed to assess the knowledge and practice of occupational health hazards among the nurses. A descriptive, cross sectional study was carried out among 339 nurses working in three different teaching hospitals of the Kathmandu from February 28, 2016 to March 28, 2016. A self-administered questionnaire was used to collect the data. The study findings revealed that out of 339 samples of all 80.5% were below 30 years; 51.6% were married; 57.5% were graduates and above; 91.4% respondents were working as staff nurse; 56.9% were working in general ward; 56.9% have work experience of 1 to 5 years; 79.1% respondents were immunized against HBV; only 8.6% have received training/ in-service education related to OHH and 35.4% respondents have experienced health hazards. The mean knowledge score was 26.7 (SD=7.3). The level of knowledge of occupational health hazards among the nurses was 68.1% (adequate knowledge). The knowledge was statistically significant with education OR = 0.288, CI: 0.17-0.46 and p value 0.00 and immunization against HBV OR= 1.762, CI: 0.97-0.17 and p value 0.05. The mean practice score was 7.6 (SD= 3.1). The level of practice on prevention of OHH was 74.6% (poor practice). The practice was statistically significant with age having OR=0.47, CI: 0.26-0.83 and p value 0.01; designation OR= 0.32, CI: 0.14-0.70 and p value 0.004; working department OR=0.61, CI: 0.36-1.02 and p value 0.05; work experience OR=0.562, CI: 0.33-0.94 and p value 0.02; previous in-service education/ training OR=2.25; CI: 1.02-4.92 and p value 0.04. There was no association between knowledge and practice on prevention of occupational health hazards which is not statistically significant. Overall, nurses working in various teaching hospitals of Kathmandu had adequate knowledge and poor practice of occupational health hazards. Training and in-service education and availability of adequate personal protective equipments for nurses are needed to encourage them adhere to practice.Keywords: occupational health hazard, nurses, knowledge, preventive practice
Procedia PDF Downloads 3564273 Factors Influencing the Enjoyment and Performance of Students in Statistics Service Courses: A Mixed-Method Study
Authors: Wilma Coetzee
Abstract:
Statistics lecturers experience that many students who are taking a service course in statistics do not like statistics. Students in these courses tend to struggle and do not perform well. This research takes a look at the student’s perspective, with the aim to determine how to change the teaching of statistics so that students will enjoy it more and perform better. Questionnaires were used to determine the perspectives of first year service statistics students at a South African university. Factors addressed included motivation to study, attitude toward statistics, statistical anxiety, mathematical abilities and tendency to procrastinate. Logistic regression was used to determine what contributes to students performing badly in statistics. The results show that the factors that contribute the most to students performing badly are: statistical anxiety, not being motivated and having had mathematical literacy instead of mathematics in secondary school. Two open ended questions were included in the questionnaire: 'I will enjoy statistics more if…' and 'I will perform better in statistics if…'. The answers to these questions were analyzed using qualitative methods. Frequent themes were identified for each of the questions. A simulation study incorporating bootstrapping was done to determine the saturation of the themes. The majority of the students indicated that they would perform better in statistics if they studied more, managed their time better, had a flare for mathematics and if the lecturer was able to explain difficult concepts better. They also want more active learning. To ensure that students enjoy statistics more, they want an active learning experience. They want fun activities, more interaction with the lecturer and with one another, more computer based problems, and more challenges. They want a better understanding of the subject, want to understand the relevance of statistics to their future career and want excellent lecturers. These findings can be used to direct the improvement of the tuition of statistics.Keywords: active learning, performance in statistics, statistical anxiety, statistics education
Procedia PDF Downloads 1474272 A Mixed Thought Pattern and the Question of Justification: A Feminist Project
Authors: Angana Chatterjee
Abstract:
The feminist scholars point out the various problematic issues in the traditional mainstream western thought and theories. The thought practices behind the discriminatory and oppressive social practices are based on concepts that play a pivotal role in theorisation. Therefore, many feminist philosophers take up reformation or reconceptualisation projects. Such projects have bearings on various aspects of philosophical thought, namely, ontology, epistemology, logic, ethics, social, political thought, and so on. In tune with this spirit, the present paper suggests a well-established thought pattern which is not western but has got the potential to deal with the problems of mainstream western thought culture that are identified by the feminist critics. The Indian thought pattern is theorised in the domain of Indian logic, which is a study of inference patterns. As, in the Indian context, the inference is considered as a source of knowledge, certain epistemological questions are linked with the discussion of inference. One of the key epistemological issues is one regarding justification. The study about the nature of derivation of knowledge from available evidence, and the nature of the evidence itself, are integral parts of the discipline called Indian logic. But if we contrast the western tradition of thought with the Indian one, we can find that the Indian logic has got some peculiar features which may be shown to deal with the problems identified by the feminist scholars in western thought culture more plausibly. The tradition of western logic, starting from Aristotle, has been maintaining sharp differences between two forms of reasoning, namely, deductive and inductive. These two different forms of reasoning have been theorised and dealt with separately within the domain of the study called ‘logic.’ There are various philosophical problems that are raised around concepts and issues regarding both deductive and inductive reasoning. Indian logic does not distinguish between deduction and induction as thought patterns, but their distinction is very usual to make in the western tradition. Though there can be found various interpretations about this peculiarity of Indian thought pattern, these mixed patterns were actually very close to the cross-cultural pattern in which human beings would tend to argue or infer from the available data or evidence. The feminist theories can successfully operate in the domain of lived experience if they make use of such a mixed pattern of reasoning or inference. By offering sound inferential knowledge on contextual evidences, the Indian thought pattern is potent to serve the feminist purposes in a meaningful way.Keywords: feminist thought, Indian logic, inference, justification, mixed thought pattern
Procedia PDF Downloads 1024271 Ascidian Styela rustica Proteins’ Structural Domains Predicted to Participate in the Tunic Formation
Authors: M. I. Tyletc, O. I. Podgornya, T. G. Shaposhnikova, S. V. Shabelnikov, A. G. Mittenberg, M. A. Daugavet
Abstract:
Ascidiacea is the most numerous class of the Tunicata subtype. These chordates' distinctive feature of the anatomical structure is a tunic consisting of cellulose fibrils, protein molecules, and single cells. The mechanisms of the tunic formation are not known in detail; tunic formation could be used as the model system for studying the interaction of cells with the extracellular matrix. Our model species is the ascidian Styela rustica, which is prevalent in benthic communities of the White Sea. As previously shown, the tunic formation involves morula blood cells, which contain the major 48 kDa protein p48. P48 participation in the tunic formation was proved using antibodies against the protein. The nature of the protein and its function remains unknown. The current research aims to determine the amino acid sequence of p48, as well as to clarify its role in the tunic formation. The peptides that make up the p48 amino acid sequence were determined by mass spectrometry. A search for peptides in protein sequence databases identified sequences homologous to p48 in Styela clava, Styela plicata, and Styela canopus. Based on sequence alignment, their level of similarity was determined as 81-87%. The correspondent sequence of ascidian Styela canopus was used for further analysis. The Styela rustica p48 sequence begins with a signal peptide, which could indicate that the protein is secretory. This is consistent with experimentally obtained data: the contents of morula cells secreted in the tunic matrix. The isoelectric point of p48 is 9.77, which is consistent with the experimental results of acid electrophoresis of morula cell proteins. However, the molecular weight of the amino acid sequence of ascidian Styela canopus is 103 kDa, so p48 of Styela rustica is a shorter homolog. The search for conservative functional domains revealed the presence of two Ca-binding EGF-like domains, thrombospondin (TSP1) and tyrosinase domains. The p48 peptides determined by mass spectrometry fall into the region of the sequence corresponding to the last two domains and have amino acid substitutions as compared to Styela canopus homolog. The tyrosinase domain (pfam00264) is known to be part of the phenoloxidase enzyme, which participates in melanization processes and the immune response. The thrombospondin domain (smart00209) interacts with a wide range of proteins, and is involved in several biological processes, including coagulation, cell adhesion, modulation of intercellular and cell-matrix interactions, angiogenesis, wound healing and tissue remodeling. It can be assumed that the tyrosinase domain in p48 plays the role of the phenoloxidase enzyme, and TSP1 provides a link between the extracellular matrix and cell surface receptors, and may also be responsible for the repair of the tunic. The results obtained are consistent with experimental data on p48. The domain organization of protein suggests that p48 is an enzyme involved in the tunic tunning and is an important regulator of the organization of the extracellular matrix.Keywords: ascidian, p48, thrombospondin, tyrosinase, tunic, tunning
Procedia PDF Downloads 1154270 Evaluation and Selection of SaaS Product Based on User Preferences
Authors: Boussoualim Nacira, Aklouf Youcef
Abstract:
Software as a Service (SaaS) is a software delivery paradigm in which the product is not installed on-premise, but it is available on Internet and Web. The customers do not pay to possess the software itself but rather to use it. This concept of pay per use is very attractive. Hence, we see increasing number of organizations adopting SaaS. However, each customer is unique, which leads to a very large variation in the requirements off the software. As several suppliers propose SaaS products, the choice of this latter becomes a major issue. When multiple criteria are involved in decision making, we talk about a problem of «Multi-Criteria Decision-Making» (MCDM). Therefore, this paper presents a method to help customers to choose a better SaaS product satisfying most of their conditions and alternatives. Also, we know that a good method of adaptive selection should be based on the correct definition of the different parameters of choice. This is why we started by extraction and analysis the various parameters involved in the process of the selection of a SaaS application.Keywords: cloud computing, business operation, Multi-Criteria Decision-Making (MCDM), Software as a Service (SaaS)
Procedia PDF Downloads 4834269 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 124268 Vortex Control by a Downstream Splitter Plate in Psudoplastic Fluid Flow
Authors: Sudipto Sarkar, Anamika Paul
Abstract:
Pseudoplastic (n<1, n is the power index) fluids have great importance in food, pharmaceutical and chemical process industries which require a lot of attention. Unfortunately, due to its complex flow behavior inadequate research works can be found even in laminar flow regime. A practical problem is solved in the present research work by numerical simulation where we tried to control the vortex shedding from a square cylinder using a horizontal splitter plate placed at the downstream flow region. The position of the plate is at the centerline of the cylinder with varying distance from the cylinder to calculate the critical gap-ratio. If the plate is placed inside this critical gap, the vortex shedding from the cylinder suppressed completely. The Reynolds number considered here is in unsteady laminar vortex shedding regime, Re = 100 (Re = U∞a/ν, where U∞ is the free-stream velocity of the flow, a is the side of the cylinder and ν is the maximum value of kinematic viscosity of the fluid). Flow behavior has been studied for three different gap-ratios (G/a = 2, 2.25 and 2.5, where G is the gap between cylinder and plate) and for a fluid with three different flow behavior indices (n =1, 0.8 and 0.5). The flow domain is constructed using Gambit 2.2.30 and this software is also used to generate the mesh and to impose the boundary conditions. For G/a = 2, the domain size is considered as 37.5a × 16a with 316 × 208 grid points in the streamwise and flow-normal directions respectively after a thorough grid independent study. Fine and equal grid spacing is used close to the geometry to capture the vortices shed from the cylinder and the boundary layer developed over the flat plate. Away from the geometry meshes are unequal in size and stretched out. For other gap-ratios, proportionate domain size and total grid points are used with similar kind of mesh distribution. Velocity inlet (u = U∞), pressure outlet (Neumann condition), symmetry (free-slip boundary condition) at upper and lower domain boundary conditions are used for the simulation. Wall boundary condition (u = v = 0) is considered both on the cylinder and the splitter plate surfaces. Discretized forms of fully conservative 2-D unsteady Navier Stokes equations are then solved by Ansys Fluent 14.5. SIMPLE algorithm written in finite volume method is selected for this purpose which is a default solver inculcate in Fluent. The results obtained for Newtonian fluid flow agree well with previous works supporting Fluent’s usefulness in academic research. A thorough analysis of instantaneous and time-averaged flow fields are depicted both for Newtonian and pseudoplastic fluid flow. It has been observed that as the value of n reduces the stretching of shear layers also reduce and these layers try to roll up before the plate. For flow with high pseudoplasticity (n = 0.5) the nature of vortex shedding changes and the value of critical gap-ratio reduces. These are the remarkable findings for laminar periodic vortex shedding regime in pseudoplastic flow environment.Keywords: CFD, pseudoplastic fluid flow, wake-boundary layer interactions, critical gap-ratio
Procedia PDF Downloads 1114267 Korean Smart Cities: Strategic Foci, Characteristics and Effects
Authors: Sang Ho Lee, Yountaik Leem
Abstract:
This paper reviews Korean cases of smart cities through the analysis framework of strategic foci, characteristics and effects. Firstly, national strategies including c(cyber), e(electronic), u(ubiquitous) and s(smart) Korea strategies were considered from strategic angles. Secondly, the characteristics of smart cities in Korea were looked through the smart cities examples such as Seoul, Busan, Songdo and Sejong cities etc. from the views on the by STIM (Service, Technology, Infrastructure and Management) analysis. Finally, the effects of smart cities on socio-economies were investigated from industrial perspective using the input-output model and structural path analysis. Korean smart city strategies revealed that there were different kinds of strategic foci. c-Korea strategy focused on information and communications network building and user IT literacy. e-Korea strategy encouraged e-government and e-business through utilizing high-speed information and communications network. u-Korea strategy made ubiquitous service as well as integrated information and communication operations center. s-Korea strategy is propelling 4th industrial platform. Smart cities in Korea showed their own features and trends such as eco-intelligence, high efficiency and low cost oriented IoT, citizen sensored city, big data city. Smart city progress made new production chains fostering ICTs (Information Communication Technologies) and knowledge intermediate inputs to industries.Keywords: Korean smart cities, Korean smart city strategies, STIM, smart service, infrastructure, technologies, management, effect of smart city
Procedia PDF Downloads 3664266 A Thorough Analysis of the Literature on the Airport Service Quality and Patron Satisfaction
Authors: Mohammed Saad Alanazi
Abstract:
Satisfaction of travelers with services provided in the airports is a sign of competitiveness and the corporate image of the airport. This study conducted a systematic literature review of recent studies published after 2017 regarding the factors that positively influence travelers’ satisfaction and encourage them to report positive reviews online. This study found variations among the studies found. They used several research methodologies, and datasets and focused on different airports, yet, they commonly categorized airport services into seven categories that should receive high intention because their qualities were found increasing review rate and positivity. It was found that studies targeting travelers’ satisfaction and intention of revisiting tended to use primary sources of data (survey); meanwhile, studies concerned positivity and negativity of comments towards airport services often used online reviews provided by travelers.Keywords: business Intelligence, airport service quality, passenger satisfaction, thorough analysis
Procedia PDF Downloads 804265 How Best Mentors mentor: A Metadiscursive Study of Mentoring Styles in Teacher Education
Authors: Cissy Li
Abstract:
Mentorship is a commonly used strategy for career development that has obvious benefits for students in undergraduate pre-service teacher training programs. In contrast to teaching practicum, which generally involves pedagogical supervision and performance evaluation by teachers, mentorship is more focused on sharing experiences, supporting challenges, and nurturing skills in order to promote personal and professional growth. To empower pre-service teachers and prepare them for potential challenges in the context of local English language teaching (ELT), an alumni mentoring program was established in the framework of communities of practice (CoP), with the mentors being in-service graduates working in local schools and mentees being students on the teacher-training programme in a Hong Kong university. By triangulating audio transcripts of mentoring sessions delivered by three top mentors with data from questionnaire responses and mentor logs, this paper examines the mentoring styles of the three best mentors from the metadiscursive perspective. It was found that, in a community of practice, mentors who may seem to enjoy a relative more dominant position, in fact, had to strategically and pragmatically employ metadiscursive resources to manage relationships with the mentees and organize talks in the mentoring process. Other attributing factors for a successful mentoring session include mentor personality and prior mentorship experiences, nature of the activities in the session, and group dynamics. This paper concludes that it is the combination of all the factors that constitute a particular mentoring style. The findings have implications for mentoring programs in teacher preparation.Keywords: mentoring, teacher education, mentoring style, metadiscourse
Procedia PDF Downloads 924264 Process Optimization and Automation of Information Technology Services in a Heterogenic Digital Environment
Authors: Tasneem Halawani, Yamen Khateeb
Abstract:
With customers’ ever-increasing expectations for fast services provisioning for all their business needs, information technology (IT) organizations, as business partners, have to cope with this demanding environment and deliver their services in the most effective and efficient way. The purpose of this paper is to identify optimization and automation opportunities for the top requested IT services in a heterogenic digital environment and widely spread customer base. In collaboration with systems, processes, and subject matter experts (SMEs), the processes in scope were approached by analyzing four-year related historical data, identifying and surveying stakeholders, modeling the as-is processes, and studying systems integration/automation capabilities. This effort resulted in identifying several pain areas, including standardization, unnecessary customer and IT involvement, manual steps, systems integration, and performance measurement. These pain areas were addressed by standardizing the top five requested IT services, eliminating/automating 43 steps, and utilizing a single platform for end-to-end process execution. In conclusion, the optimization of IT service request processes in a heterogenic digital environment and widely spread customer base is challenging, yet achievable without compromising the service quality and customers’ added value. Further studies can focus on measuring the value of the eliminated/automated process steps to quantify the enhancement impact. Moreover, a similar approach can be utilized to optimize other IT service requests, with a focus on business criticality.Keywords: automation, customer value, heterogenic, integration, IT services, optimization, processes
Procedia PDF Downloads 1074263 Introduction to Two Artificial Boundary Conditions for Transient Seepage Problems and Their Application in Geotechnical Engineering
Authors: Shuang Luo, Er-Xiang Song
Abstract:
Many problems in geotechnical engineering, such as foundation deformation, groundwater seepage, seismic wave propagation and geothermal transfer problems, may involve analysis in the ground which can be seen as extending to infinity. To that end, consideration has to be given regarding how to deal with the unbounded domain to be analyzed by using numerical methods, such as finite element method (FEM), finite difference method (FDM) or finite volume method (FVM). A simple artificial boundary approach derived from the analytical solutions for transient radial seepage problems, is introduced. It should be noted, however, that the analytical solutions used to derive the artificial boundary are particular solutions under certain boundary conditions, such as constant hydraulic head at the origin or constant pumping rate of the well. When dealing with unbounded domains with unsteady boundary conditions, a more sophisticated artificial boundary approach to deal with the infinity of the domain is presented. By applying Laplace transforms and introducing some specially defined auxiliary variables, the global artificial boundary conditions (ABCs) are simplified to local ones so that the computational efficiency is enhanced significantly. The introduced two local ABCs are implemented in a finite element computer program so that various seepage problems can be calculated. The two approaches are first verified by the computation of a one-dimensional radial flow problem, and then tentatively applied to more general two-dimensional cylindrical problems and plane problems. Numerical calculations show that the local ABCs can not only give good results for one-dimensional axisymmetric transient flow, but also applicable for more general problems, such as axisymmetric two-dimensional cylindrical problems, and even more general planar two-dimensional flow problems for well doublet and well groups. An important advantage of the latter local boundary is its applicability for seepage under rapidly changing unsteady boundary conditions, and even the computational results on the truncated boundary are usually quite satisfactory. In this aspect, it is superior over the former local boundary. Simulation of relatively long operational time demonstrates to certain extents the numerical stability of the local boundary. The solutions of the two local ABCs are compared with each other and with those obtained by using large element mesh, which proves the satisfactory performance and obvious superiority over the large mesh model.Keywords: transient seepage, unbounded domain, artificial boundary condition, numerical simulation
Procedia PDF Downloads 2944262 Energy Efficient Routing Protocol with Ad Hoc On-Demand Distance Vector for MANET
Authors: K. Thamizhmaran, Akshaya Devi Arivazhagan, M. Anitha
Abstract:
On the case of most important systematic issue that must need to be solved in means of implementing a data transmission algorithm on the source of Mobile adhoc networks (MANETs). That is, how to save mobile nodes energy on meeting the requirements of applications or users as the mobile nodes are with battery limited. On while satisfying the energy saving requirement, hence it is also necessary of need to achieve the quality of service. In case of emergency work, it is necessary to deliver the data on mean time. Achieving quality of service in MANETs is also important on while. In order to achieve this requirement, Hence, we further implement the Energy-Aware routing protocol for system of Mobile adhoc networks were it being proposed, that on which saves the energy as on every node by means of efficiently selecting the mode of energy efficient path in the routing process by means of Enhanced AODV routing protocol.Keywords: Ad-Hoc networks, MANET, routing, AODV, EAODV
Procedia PDF Downloads 370