Search results for: internet market
3765 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment
Authors: Kim Byung-Kon, Kim Young-Jin
Abstract:
As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM
Procedia PDF Downloads 5063764 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS
Authors: Ali Riza Perçin, Eser Bingül
Abstract:
Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.Keywords: social media, "generation Y", terrorist organization, islamic state IS
Procedia PDF Downloads 4263763 The Impact of Dispatching with Rolling Horizon Control in Sizing Thermal Storage for Solar Tower Plant Participating in Wholesale Spot Electricity Market
Authors: Navid Mohammadzadeh, Huy Truong-Ba, Michael Cholette
Abstract:
The solar tower (ST) plant is a promising technology to exploit large-scale solar irradiation. With thermal energy storage, ST plant has the potential to shift generation to high electricity price periods. However, the size of storage limits the dispatchability of the plant, particularly when it should compete with uncertainty in forecasts of solar irradiation and electricity prices. The purpose of this study is to explore the size of storage when Rolling Horizon Control (RHC) is employed for dispatch scheduling. To this end, RHC is benchmarked against perfect knowledge (PK) forecast and two day-ahead dispatching policies. With optimisation of dispatch planning using PK policy, the optimal achievable profit for a specific size of the storage is determined. A sensitivity analysis using Monte-Carlo simulation is conducted, and the size of storage for RHC and day-ahead policies is determined with the objective of reaching the profit obtained from the PK policy. A case study is conducted for a hypothetical ST plant with thermal storage located in South Australia and intends to dispatch under two market scenarios: 1) fixed price and 2) wholesale spot price. The impact of each individual source of uncertainty on storage size is examined for January and August. The exploration of results shows that dispatching with RH controller reaches optimal achievable profit with ~15% smaller storage compared to that in day-ahead policies. The results of this study may be applied to the CSP plant design procedure.Keywords: solar tower plant, spot market, thermal storage system, optimized dispatch planning, sensitivity analysis, Monte Carlo simulation
Procedia PDF Downloads 1253762 Comparison Study of Capital Protection Risk Management Strategies: Constant Proportion Portfolio Insurance versus Volatility Target Based Investment Strategy with a Guarantee
Authors: Olga Biedova, Victoria Steblovskaya, Kai Wallbaum
Abstract:
In the current capital market environment, investors constantly face the challenge of finding a successful and stable investment mechanism. Highly volatile equity markets and extremely low bond returns bring about the demand for sophisticated yet reliable risk management strategies. Investors are looking for risk management solutions to efficiently protect their investments. This study compares a classic Constant Proportion Portfolio Insurance (CPPI) strategy to a Volatility Target portfolio insurance (VTPI). VTPI is an extension of the well-known Option Based Portfolio Insurance (OBPI) to the case where an embedded option is linked not to a pure risky asset such as e.g., S&P 500, but to a Volatility Target (VolTarget) portfolio. VolTarget strategy is a recently emerged rule-based dynamic asset allocation mechanism where the portfolio’s volatility is kept under control. As a result, a typical VTPI strategy allows higher participation rates in the market due to reduced embedded option prices. In addition, controlled volatility levels eliminate the volatility spread in option pricing, one of the frequently cited reasons for OBPI strategy fall behind CPPI. The strategies are compared within the framework of the stochastic dominance theory based on numerical simulations, rather than on the restrictive assumption of the Black-Scholes type dynamics of the underlying asset. An extended comparative quantitative analysis of performances of the above investment strategies in various market scenarios and within a range of input parameter values is presented.Keywords: CPPI, portfolio insurance, stochastic dominance, volatility target
Procedia PDF Downloads 1673761 Need of Trained Clinical Research Professionals Globally to Conduct Clinical Trials
Authors: Tambe Daniel Atem
Abstract:
Background: Clinical Research is an organized research on human beings intended to provide adequate information on the drug use as a therapeutic agent on its safety and efficacy. The significance of the study is to educate the global health and life science graduates in Clinical Research in depth to perform better as it involves testing drugs on human beings. Objectives: to provide an overall understanding of the scientific approach to the evaluation of new and existing medical interventions and to apply ethical and regulatory principles appropriate to any individual research. Methodology: It is based on – Primary data analysis and Secondary data analysis. Primary data analysis: means the collection of data from journals, the internet, and other online sources. Secondary data analysis: a survey was conducted with a questionnaire to interview the Clinical Research Professionals to understand the need of training to perform clinical trials globally. The questionnaire consisted details of the professionals working with the expertise. It also included the areas of clinical research which needed intense training before entering into hardcore clinical research domain. Results: The Clinical Trials market worldwide worth over USD 26 billion and the industry has employed an estimated 2,10,000 people in the US and over 70,000 in the U.K, and they form one-third of the total research and development staff. There are more than 2,50,000 vacant positions globally with salary variations in the regions for a Clinical Research Coordinator. R&D cost on new drug development is estimated at US$ 70-85 billion. The cost of doing clinical trials for a new drug is US$ 200-250 million. Due to an increase trained Clinical Research Professionals India has emerged as a global hub for clinical research. The Global Clinical Trial outsourcing opportunity in India in the pharmaceutical industry increased to more than $2 billion in 2014 due to increased outsourcing from U.S and Europe to India. Conclusion: Assessment of training need is recommended for newer Clinical Research Professionals and trial sites, especially prior the conduct of larger confirmatory clinical trials.Keywords: clinical research, clinical trials, clinical research professionals
Procedia PDF Downloads 4523760 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation
Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez
Abstract:
With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling
Procedia PDF Downloads 1993759 Determinants of Foreign Direct Investment in Tourism: A Panel Data Analysis of Developing Countries
Authors: Malraj Bharatha Kiriella
Abstract:
The purpose of this paper is to investigate the determinants of tourism foreign direct investment (TFDI) to selected developing countries during 1978-2017. The study used pooled panel data to estimate an econometric model. The findings show that market size and institutional barriers are determining factors for TFDI in countries, while other variables of positive country conditions, FDI-related government policy, tourism-related infrastructure and labor conditions are insignificant. The result shows that institutional effects are positive, while market size negatively affects TFDI inflows. The research is limited to eight developing countries. The results can be used to support government policy on TFDI. The paper makes the following contributions: First, it provides important insight and understanding into the TFDI decision-making process in developing countries. Second, both TFDI theory and evidence are minimal, and an econometric model developed on the basis of available literature has been empirically tested.Keywords: determinants, developing countries, FDI in tourism, panel data
Procedia PDF Downloads 1073758 Commercialization of Smallholder Rice Producers and Its Determinants in Ethiopia
Authors: Abebaw Assaye, Seiichi Sakurai, Marutama Atsush, Dawit Alemu
Abstract:
Rice is considered as a strategic agricultural commodity targeting national food security and import substitution in Ethiopia and diverse measures are put in place a number of initiatives to ensure the growth and development of rice sector in the country. This study assessed factors that influence smallholder farmers' level of rice commercialization in Ethiopia. The required data were generated from 594 randomly sampled rice producers using multi-stage sampling techniques from four major rice-producing regional states. Both descriptive and econometric methods were used to analyze the data. We adopted the ordered probit model to analyze factors determining output commercialization in the rice market. The ordered probit model result showed that the sex of the household head, educational status of the household head, credit use, proportion of irrigated land cultivated, membership in social groups, and land dedicated to rice production were found to influence significantly and positively the probability of being commercial-oriented. Conversely, the age of the household, total cultivated land, and distance to the main market were found to influence negatively. These findings suggest that promoting productivity-increasing technologies, development of irrigation facilities, strengthening of social institutions, and facilitating access to credit are crucial for enhancing the commercialization of rice in the study area. Since agricultural lands are limited, intensified farming through promoting improved rice technologies and mechanized farming could be an option to enhance marketable surplus and increase level of rice market particicpation.Keywords: rice, commercialization, Tobit, ordered probit, Ethiopia
Procedia PDF Downloads 833757 Sanction Influences and Reconstruction Strategies for Iran Oil Market in Post-Sanctions
Authors: Mehrdad HassanZadeh Dugoori, Iman Mohammadali Tajrishi
Abstract:
Since Iran's nuclear program became public in 2002, the International Atomic Energy Agency (IAEA) has been unable to confirm Tehran's assertions that its nuclear activities are exclusively for peaceful purposes and that it has not sought to develop nuclear weapons. The United Nations Security Council has adopted six resolutions since 2006 requiring Iran to stop enriching uranium - which can be used for civilian purposes, but also to build nuclear bombs, which Iran never follow this strategy- and co-operate with the IAEA. Four resolutions have included progressively expansive sanctions to persuade Tehran to comply. The US and EU have imposed additional sanctions on Iranian oil exports and banks since 2012. In this article we reassess the sanction dimensions of Iran and the influences. Then according to the last agreement between P5+1 and Iran in 15 July 2015, we mention reconstruction strategies for oil export markets of Iran and the operational program for one million barrel of crude oil sales per day. These strategies are the conclusion of focus group and brain storming with Iran's oil and gas managers during content analysis.Keywords: post-sanction, oil market, reconstruction, marketing, strategy
Procedia PDF Downloads 4563756 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention
Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis
Abstract:
The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.Keywords: cybercrime, disinformation, fake news, prevention
Procedia PDF Downloads 1423755 Impact of Brand Origin on Brand Loyalty: A Case of Personal Care Products in Pakistan
Authors: Aimen Batool Bint-E-Rashid, Syed Muhammad Dawood Ali Shah, Muhammad Usman Farooq, Mahgul Anwar
Abstract:
As the world is progressing, the needs and demands of the consumer market are also changing. Nowadays the trends of consumer purchase decisions are dependent upon multiple factors. This study aims to identify the influential impact of country of origin over the perception and devotion towards daily personal care products specifically in reference to the knowledge and awareness regarding that particular brand in Pakistan. To corroborate this study, a 30-item brand origin questionnaire has been used with 300 purchase decision makers belonging to different age groups. To illustrate this study, a model has been developed based on brand origin, brand awareness and brand loyalty. Correlation and regression analysis have been used to find out the results which conclude the findings on the perspective of Pakistan’s consumer market as that brand origin has a direct relationship with brand loyalty provided that the consumer has a positive brand awareness. Support for the fact that brand origin impacts brand loyalty through brand awareness has been presented in this study.Keywords: brand awareness, brand loyalty, brand origin, personal care products, P&G, Unilever
Procedia PDF Downloads 2413754 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 2393753 Information Technology Governance Implementation and Its Determinants in the Egyptian Market
Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb
Abstract:
Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.Keywords: effective IT governance, Egyptian market, information security, risk controls
Procedia PDF Downloads 1673752 Untangling the Greek Seafood Market: Authentication of Crustacean Products Using DNA-Barcoding Methodologies
Authors: Z. Giagkazoglou, D. Loukovitis, C. Gubili, A. Imsiridou
Abstract:
Along with the increase in human population, demand for seafood has increased. Despite the strict labeling regulations that exist for most marketed species in the European Union, seafood substitution remains a persistent global issue. Food fraud occurs when food products are traded in a false or misleading way. Mislabeling occurs when one species is substituted and traded under the name of another, and it can be intentional or unintentional. Crustaceans are one of the most regularly consumed seafood in Greece. Shrimps, prawns, lobsters, crayfish, and crabs are considered a delicacy and can be encountered in a variety of market presentations (fresh, frozen, pre-cooked, peeled, etc.). With most of the external traits removed, products as such are susceptible to species substitution. DNA barcoding has proven to be the most accurate method for the detection of fraudulent seafood products. To our best knowledge, the DNA barcoding methodology is used for the first time in Greece, in order to investigate the labeling practices for crustacean products available in the market. A total of 100 tissue samples were collected from various retailers and markets across four Greek cities. In an effort to cover the highest range of products possible, different market presentations were targeted (fresh, frozen and cooked). Genomic DNA was extracted using the DNeasy Blood & Tissue Kit, according to the manufacturer's instructions. The mitochondrial gene selected as the target region of the analysis was the cytochrome c oxidase subunit I (COI). PCR products were purified and sequenced using an ABI 3500 Genetic Analyzer. Sequences were manually checked and edited using BioEdit software and compared against the ones available in GenBank and BOLD databases. Statistical analyses were conducted in R and PAST software. For most samples, COI amplification was successful, and species-level identification was possible. The preliminary results estimate moderate mislabeling rates (25%) in the identified samples. Mislabeling was most commonly detected in fresh products, with 50% of the samples in this category labeled incorrectly. Overall, the mislabeling rates detected by our study probably relate to some degree of unintentional misidentification, and lack of knowledge surrounding the legal designations by both retailers and consumers. For some species of crustaceans (i.e. Squila mantis) the mislabeling appears to be also affected by the local labeling practices. Across Greece, S. mantis is sold in the market under two common names, but only one is recognized by the country's legislation, and therefore any mislabeling is probably not profit-motivated. However, the substitution of the speckled shrimp (Metapenaus monoceros) for the distinct, giant river prawn (Macrobranchium rosenbergii), is a clear example of deliberate fraudulent substitution, aiming for profit. To our best knowledge, no scientific study investigating substitution and mislabeling rates in crustaceans has been conducted in Greece. For a better understanding of Greece's seafood market, similar DNA barcoding studies in other regions with increased touristic importance (e.g., the Greek islands) should be conducted. Regardless, the expansion of the list of species-specific designations for crustaceans in the country is advised.Keywords: COI gene, food fraud, labelling control, molecular identification
Procedia PDF Downloads 673751 Effects of the Supplementary for Understanding and Preventing Plagiarism on EFL Students’ Writing
Authors: Surichai Butcha, Dararat Khampusaen
Abstract:
As the Internet is recognized as a high potential and powerful educational tool to access sources of knowledge, plagiarism is an increasing unethical issue found in students’ writing. This paper is deriving from the 1st phase of an on-going study investigating the effects of the supplementary on citing sources on undergraduate students’ writing. The 40 participants were divided into 1 experimental group and 1 control group. Both groups were administered with a questionnaire on knowledge and an interview on attitude related to using sources in writing. Only the experimental group undertook the 4 lessons focusing on using outside sources and citing the original work (quoting, synthesizing, summarizing and paraphrasing) were delivered to them via e-learning tools throughout a semester. Participants were required to produce 4 writing tasks after each lesson. The results were concerned with types and factors on using outside sources in writing of Thai undergraduate EFL students from the survey. The interview results supported and clarified the survey result. In addition, the writing rubrics confirmed the types of plagiarism frequently occurred in students’ writing. The results revealed the types and factors on plagiarism including their perceptions on using the outside sources in their writing from the interview. The discussion shed the lights on cultural dimensions of plagiarism in student writing, roles of teachers, library, and university policy on the rate of plagiarism. Also, the findings promoted the awareness on ethics in writing and prevented the rate of potential unintentional plagiarism. Additionally, the results of this phase of study could lead to the appropriate contents to be considered for inclusion in the supplementary on using sources for writing for future research.Keywords: citing source, EFL writing, e-learning, Internet, plagiarism
Procedia PDF Downloads 1493750 Integrated Free Space Optical Communication and Optical Sensor Network System with Artificial Intelligence Techniques
Authors: Yibeltal Chanie Manie, Zebider Asire Munyelet
Abstract:
5G and 6G technology offers enhanced quality of service with high data transmission rates, which necessitates the implementation of the Internet of Things (IoT) in 5G/6G architecture. In this paper, we proposed the integration of free space optical communication (FSO) with fiber sensor networks for IoT applications. Recently, free-space optical communications (FSO) are gaining popularity as an effective alternative technology to the limited availability of radio frequency (RF) spectrum. FSO is gaining popularity due to flexibility, high achievable optical bandwidth, and low power consumption in several applications of communications, such as disaster recovery, last-mile connectivity, drones, surveillance, backhaul, and satellite communications. Hence, high-speed FSO is an optimal choice for wireless networks to satisfy the full potential of 5G/6G technology, offering 100 Gbit/s or more speed in IoT applications. Moreover, machine learning must be integrated into the design, planning, and optimization of future optical wireless communication networks in order to actualize this vision of intelligent processing and operation. In addition, fiber sensors are important to achieve real-time, accurate, and smart monitoring in IoT applications. Moreover, we proposed deep learning techniques to estimate the strain changes and peak wavelength of multiple Fiber Bragg grating (FBG) sensors using only the spectrum of FBGs obtained from the real experiment.Keywords: optical sensor, artificial Intelligence, Internet of Things, free-space optics
Procedia PDF Downloads 633749 Green Housing Projects in Egypt: A Futuristic Approach
Authors: Shimaa Mahmoud Ali Ahmed, Boshra Tawfek El-Shreef
Abstract:
Sustainable development has become an important concern worldwide, and climate change has become a global threat. Some of these affect how we approach environmental issues — and how we should approach them. Environmental aspects have an important impact on the built environment, that’s why knowledge about Green Building and Green Construction become a vital dimension of urban sustainable development to face the challenges of climate change. There are several levels of green buildings, from energy-efficient lighting to 100% eco-friendly construction; the concept of green buildings in Egypt is still a rare occurrence, with the concept being relatively new to the market. There are several projects on the ground that currently employing sustainable and green solutions to some extent, some of them achieve a limit of success and others fail to employ the new solutions. The market and the cost as well, are great factors. From the last century, green architecture and environmental sustainability become a famous trend that all the researchers like to follow. Nowadays, the trend towards green has shifted to housing and real estate projects. While the environmental aspects are the key to achieve green buildings, the economic benefits, and the market forces are considered as big challenges. The paper assumes that some appropriate environmental treatments could be added to the applied prototype of the governmental social housing projects in Egypt to achieve better environmental solutions. The aim of the research is to get housing projects in Egypt closer to the track of sustainable and green buildings, through making a local future proposal to be integrated into the current policies. The proposed model is based upon adding some appropriate, cheap environmental modifications to the prototype of the Ministry of Housing, Infrastructure, and New Urban Communities. The research is based on an analytical, comparative analytical, and inductive approach to study and analyze the housing projects in Egypt and the possibilities of integrating green techniques into it.Keywords: green buildings, urban sustainability, housing projects, sustainable development goals, Egypt 2030
Procedia PDF Downloads 1373748 Principal Component Regression in Amylose Content on the Malaysian Market Rice Grains Using Near Infrared Reflectance Spectroscopy
Authors: Syahira Ibrahim, Herlina Abdul Rahim
Abstract:
The amylose content is an essential element in determining the texture and taste of rice grains. This paper evaluates the use of VIS-SWNIRS in estimating the amylose content for seven varieties of rice grains available in the Malaysian market. Each type consists of 30 samples and all the samples are scanned using the spectroscopy to obtain a range of values between 680-1000nm. The Savitzky-Golay (SG) smoothing filter is applied to each sample’s data before the Principal Component Regression (PCR) technique is used to examine the data and produce a single value for each sample. This value is then compared with reference values obtained from the standard iodine colorimetric test in terms of its coefficient of determination, R2. Results show that this technique produced low R2 values of less than 0.50. In order to improve the result, the range should include a wavelength range of 1100-2500nm and the number of samples processed should also be increased.Keywords: amylose content, diffuse reflectance, Malaysia rice grain, principal component regression (PCR), Visible and Shortwave near-infrared spectroscopy (VIS-SWNIRS)
Procedia PDF Downloads 3823747 Internet-Delivered Cognitive Behaviour Therapy for Depression Comorbid with Diabetes: Preliminary Findings
Authors: Lisa Robins, Jill Newby, Kay Wilhelm, Therese Fletcher, Jessica Smith, Trevor Ma, Adam Finch, Lesley Campbell, Jerry Greenfield, Gavin Andrews
Abstract:
Background:Depression treatment for people living with depression comorbid with diabetes is of critical importance for improving quality of life and diabetes self-management, however depression remains under-recognised and under-treated in this population. Cost—effective and accessible forms of depression treatment that can enhance the delivery of mental health services in routine diabetes care are needed. Provision of internet-delivered Cognitive Behaviour Therapy (iCBT) provides a promising way to deliver effective depression treatment to people with diabetes. Aims:To explore the outcomes of the clinician assisted iCBT program for people with comorbid Major Depressive Disorder (MDD) and diabetes compared to those who remain under usual care. The main hypotheses are that: (1) Participants in the treatment group would show a significant improvement on disorder specific measures (Patient Health Questionnaire; PHQ-9) relative to those in the control group; (2) Participants in the treatment group will show a decrease in diabetes-related distress relative to those in the control group. This study will also examine: (1) the effect of iCBT for MDD on disability (as measured by the SF-12 and SDS), general distress (as measured by the K10), (2) the feasibility of these treatments in terms of acceptability to diabetes patients and practicality for clinicians (as measured by the Credibility/Expectancy Questionnaire; CEQ). We hypothesise that associated disability, and general distress will reduce, and that patients with comorbid MDD and diabetes will rate the program as acceptable. Method:Recruit 100 people with MDD comorbid with diabetes (either Type 1 or Type 2), and randomly allocate to: iCBT (over 10 weeks) or treatment as usual (TAU) for 10 weeks, then iCBT. Measure pre- and post-intervention MDD severity, anxiety, diabetes-related distress, distress, disability, HbA1c, lifestyle, adherence, satisfaction with clinicians input and the treatment. Results:Preliminary results comparing MDD symptom levels, anxiety, diabetes-specific distress, distress, disability, HbA1c levels, and lifestyle factors from baseline to conclusion of treatment will be presented, as well as data on adherence to the lessons, homework downloads, satisfaction with the clinician's input and satisfaction with the mode of treatment generally.Keywords: cognitive behaviour therapy, depression, diabetes, internet
Procedia PDF Downloads 4893746 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach
Authors: Hiroaki Fukuda
Abstract:
This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.Keywords: aspect-oriented programming, concurrent, development process, rich internet application
Procedia PDF Downloads 3013745 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 1623744 Tracing a Timber Breakthrough: A Qualitative Study of the Introduction of Cross-Laminated-Timber to the Student Housing Market in Norway
Authors: Marius Nygaard, Ona Flindall
Abstract:
The Palisaden student housing project was completed in August 2013 and was, with its eight floors, Norway’s tallest timber building at the time of completion. It was the first time cross-laminated-timber (CLT) was utilized at this scale in Norway. The project was the result of a concerted effort by a newly formed management company to establish CLT as a sustainable and financially competitive alternative to conventional steel and concrete systems. The introduction of CLT onto the student housing market proved so successful that by 2017 more than 4000 individual student residences will have been built using the same model of development and construction. The aim of this paper is to identify the key factors that enabled this breakthrough for CLT. It is based on an in-depth study of a series of housing projects and the role of the management company who both instigated and enabled this shift of CLT from the margin to the mainstream. Specifically, it will look at how a new building system was integrated into a marketing strategy that identified a market potential within the existing structure of the construction industry and within the economic restrictions inherent to student housing in Norway. It will show how a key player established a project model that changed both the patterns of cooperation and the information basis for decisions. Based on qualitative semi-structured interviews with managers, contractors and the interdisciplinary teams of consultants (architects, structural engineers, acoustical experts etc.) this paper will trace the introduction, expansion and evolution of CLT-based building systems in the student housing market. It will show how the project management firm’s position in the value chain enabled them to function both as a liaison between contractor and client, and between contractor and producer. A position that allowed them to improve the flow of information. This ensured that CLT was handled on equal terms to other structural solutions in the project specifications, enabling realistic pricing and risk evaluation. Secondly, this paper will describe and discuss how the project management firm established and interacted with a growing network of contractors, architects and engineers to pool expertise and broaden the knowledge base across Norway’s regional markets. Finally, it will examine the role of the client, the building typology, and the industrial and technological factors in achieving this breakthrough for CLT in the construction industry. This paper gives an in-depth view of the progression of a single case rather than a broad description of the state of the art of large-scale timber building in Norway. However, this type of study may offer insights that are important to the understanding not only of specific markets but also of how new technologies should be introduced in big and well-established industries.Keywords: cross-laminated-timber (CLT), industry breakthrough, student housing, timber market
Procedia PDF Downloads 2233743 CRYPTO COPYCAT: A Fashion Centric Blockchain Framework for Eliminating Fashion Infringement
Authors: Magdi Elmessiry, Adel Elmessiry
Abstract:
The fashion industry represents a significant portion of the global gross domestic product, however, it is plagued by cheap imitators that infringe on the trademarks which destroys the fashion industry's hard work and investment. While eventually the copycats would be found and stopped, the damage has already been done, sales are missed and direct and indirect jobs are lost. The infringer thrives on two main facts: the time it takes to discover them and the lack of tracking technologies that can help the consumer distinguish them. Blockchain technology is a new emerging technology that provides a distributed encrypted immutable and fault resistant ledger. Blockchain presents a ripe technology to resolve the infringement epidemic facing the fashion industry. The significance of the study is that a new approach leveraging the state of the art blockchain technology coupled with artificial intelligence is used to create a framework addressing the fashion infringement problem. It transforms the current focus on legal enforcement, which is difficult at best, to consumer awareness that is far more effective. The framework, Crypto CopyCat, creates an immutable digital asset representing the actual product to empower the customer with a near real time query system. This combination emphasizes the consumer's awareness and appreciation of the product's authenticity, while provides real time feedback to the producer regarding the fake replicas. The main findings of this study are that implementing this approach can delay the fake product penetration of the original product market, thus allowing the original product the time to take advantage of the market. The shift in the fake adoption results in reduced returns, which impedes the copycat market and moves the emphasis to the original product innovation.Keywords: fashion, infringement, blockchain, artificial intelligence, textiles supply chain
Procedia PDF Downloads 2613742 The Integration of ICT in EFL Classroom and Its Impact on Teacher Development
Authors: Tayaa Karima, Bouaziz Amina
Abstract:
Today's world is knowledge-based; everything we do is somehow connected with technology which it has a remarkable influence on socio-cultural and economic developments, including educational settings. This type of technology is supported in many teaching/learning setting where the medium of instruction is through computer technology, and particularly involving digital technologies. There has been much debate over the use of computers and the internet in foreign language teaching for more than two decades. Various studies highlights that the integration of Information Communications Technology (ICT) in foreign language teaching will have positive effects on both the teachers and students to help them be aware of the modernized world and meet the current demands of the globalised world. Information and communication technology has been gradually integrated in foreign learning environment as a platform for providing learners with learning opportunities. Thus, the impact of ICT on language teaching and learning has been acknowledged globally, this is because of the fundamental role that it plays in the enhancement of teaching and learning quality, modify the pedagogical practice, and motivate learners. Due to ICT related developments, many Maghreb countries regard ICT as a tool for changes and innovations in education. Therefore, the ministry of education attempted to set up computer laboratories and provide internet connection in the schools. Investment in ICT for educational innovations and improvement purposes has been continuing the need of teacher who will employ it in the classroom as vital role of the curriculum. ICT does not have an educational value in itself, but it becomes precious when teachers use it in learning and teaching process. This paper examines the impacts of ICT on teacher development rather than on teaching quality and highlights some challenges facing using ICT in the language learning/teaching.Keywords: information communications technology (ICT), integration, foreign language teaching, teacher development, learning opportunity
Procedia PDF Downloads 3883741 Unveiling the Black Swan of the Inflation-Adjusted Real Excess Returns-Risk Nexus: Evidence From Pakistan Stock Exchange
Authors: Mohammad Azam
Abstract:
The purpose of this study is to investigate risk and real excess portfolio returns using inflation adjusted risk-free rates, a measuring technique that focuses on the momentum augmented Fama-French six-factor model and use monthly data from 1994 to 2022. With the exception of profitability, the data show that market, size, value, momentum, and investment factors are all strongly associated to excess portfolio stock returns using ordinary lease square regression technique. According to the Gibbons, Ross, and Shanken test, the momentum augmented Fama-French six-factor model outperforms the market. This technique discovery may be utilised by academics and professionals to acquire an in-depth knowledge of the Pakistan Stock Exchange across a broad stock pattern for investing decisions and portfolio construction.Keywords: real excess portfolio returns, momentum augmented fama & french five-factor model, GRS-test, pakistan stock exchange
Procedia PDF Downloads 1023740 Comparitive Analysis of Islamic and Conventional Banking Systems in Terms of Profitability: A Study on Emerging Market Economies
Authors: Alimshan Faizulayev, Eralp Bektas, Abdul Ghafar Ismail, Bezhan Rustamov
Abstract:
This paper performs empirical analysis on determinants of profitability in Islamic and Conventional Banks. The main focus of this study is to evaluate and measure of financial performance of Islamic banking firms operating in Egypt, Iran, Malaysia, Pakistan, Turkey, UAE in contrast to Conventional ones in those countries. To evaluate empirically performance of the banks, various financial ratios are employed. We measure performance in terms of liquidity, profitability, solvency, and efficiency. In this work, t-test, F-test, and OLS analysis are used to make hypothesis tests. Our findings reveal that there are similarities and differences in profitability determinants of Islamic and Conventional banking firms. The cost to revenue ratio has inverse relationship with profitability indicators in both banking systems. However, there are differences in financial performances between Conventional Banks and Islamic banks which are found in overall picture of all banks in terms of net income margin.Keywords: Islamic banking, conventional banking, GDP growth, emerging market economies
Procedia PDF Downloads 3983739 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria
Authors: A. Yakub AbdurRaheem
Abstract:
Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the northeastern parts have ignited violence, bloodshed, refugee exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, but it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of this social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for the prompt response, encourage community and neighborhood policing to ameliorate security challenges in Nigeria.Keywords: social crisis, economy, resources, property market
Procedia PDF Downloads 2373738 Self-Marketing on Line Person-to-Person Social Media
Authors: Chih-Ping Chen
Abstract:
Today, technology does not necessitate change; rather, social media has afforded a new arena and digital tools for users/individuals to be symbolized and marketed in meaningful exchanges of digital identities. We argue that these symbolic interactions may afford individuals the ability to create and present less restricted Line person-to-person (P2P) chats than would be possible in face-to-face communications. Individuals can select flexible influence strategies to market themselves, which enables them to create and present their digital identities and impressions in alternative ways within a dynamic sociocultural context. Therefore, this paper aims to explore the novel phenomenon of how individuals market themselves to manage their digital identities and impressions to connect with other users through the symbolic interactions created by new digital tools (e.g., stickers). A netnographic approach was developed by applying a triangulated methodology consisting of user self-diary reports, in-depth interviews, and observations. Totally, 20 participants (10 females and 10 males) were of Taiwanese origin, and their ages ranged from 20–47 years old. The findings of this research showed that individuals on Line P2P social media where traditional cultural gender norms have shifted. Both male and female participants market their modern digital identities by adopting a combination of flexible influence tactics/strategies when using digital stickers. Some findings showed that their influence tactics/strategies often flouted Taiwanese cultural gender norms or skirted traditional rules to fit individual or P2P needs. Finally, these findings potentially contributed to the literature regarding the consumer culture theory and symbolic interaction theory in digital marketing and social media fields.Keywords: Consumer culture theory, Digital sticker, Self-marketing, Impression, Symbolic interaciton
Procedia PDF Downloads 803737 Exploration of Sweet Potato Cultivar Markets Availability in North West Province, South Africa
Authors: V. M. Mmbengwa, J. R. M. Mabuso, C. P. Du Plooy, S. Laurrie, H. D. van Schalkwyk
Abstract:
Sweet potato products are necessary for the provision of essential nutrients in every household, regardless of their poverty status. Their consumption appears to be highly influenced by socio-economic factors, such as malnutrition, food insecurity and unemployment. Therefore, market availability is crucial for these cultivars to resolve some of the socio-economic factors. The aim of the study was to investigate market availability of sweet potato cultivars in the North West Province. In this study, both qualitative and quantitative research methodologies were used. Qualitative methodology was used to explain the quantitative outcomes of the variables. On the other hand, quantitative results were used to test the hypothesis. The study used SPSS software to analyse the data. Cross-tabulation and Chi-square statistics were used to obtain the descriptive and inferential analyses, respectively. The study found that the Blesbok cultivar is dominating the markets of the North West Province, with the Monate cultivar dominating in the Bojanala Platinum (75 %) and Dr Ruth Segomotsi Mompati (25 %) districts. It is also found that a unit increase in the supply of sweet potato cultivars in both local and district municipal markets is accompanied by a reduced demand of 28 % and 33 % at district and local markets, respectively. All these results were found to be significant at p<0.05. The results further revealed that in four out of nine local municipality markets, the Blesbok cultivar seems to be solely available in those four local municipal markets of North West Province. It can be concluded that Blesbok, relative to other cultivars, is the most commercialised sweet potato variety and that consumers across this Province are highly aware of it. For other cultivars to assume market prominence in this Province, a well-designed marketing campaign for creating awareness may be required. This campaign may be based on nutritional advantages of different cultivars, of which Blesbok is relatively inferior, compared to orange-fleshed sweet potato varieties.Keywords: cultivar, malnutrition, markets, sweet potato
Procedia PDF Downloads 2943736 Predictability of Supply Chain in Indian Automobile Division
Authors: Dharamvir Mangal
Abstract:
Supply chain management has increasingly become an inevitable challenge to most companies to continuously survive and prosper in the global chain-based competitive environment. The current challenges of the Indian automotive world, their implications on supply chain are summarized and analyzed in this paper. In this competitive era of ‘LPG’ i.e. Liberalization, Privatization and Globalization, modern marketing systems, introduction of products with short life cycles, and the discriminating expectations of customers have enforced business enterprises to invest in and focus attention on their Supply Chains (SCs) in order to meet out the level of customer’s satisfaction and to survive in the competitive market. In fact, many of trends in the auto industry are reinforcing the need to redefine supply chain strategies layouts, and operations etc. Many manufacturing operations are designed to maximize throughput and lower costs with modest considerations for the crash on inventory levels and distribution capabilities. To improve profitability and efficiency, automotive players are seeking ways to achieve operational excellence, reduce operating cost and enhance customer service through efficient supply chain management.Keywords: automotive industry, supply chain, challenges, market potential
Procedia PDF Downloads 330