Search results for: service%20quality
2335 Time Temperature Dependence of Long Fiber Reinforced Polypropylene Manufactured by Direct Long Fiber Thermoplastic Process
Authors: K. A. Weidenmann, M. Grigo, B. Brylka, P. Elsner, T. Böhlke
Abstract:
In order to reduce fuel consumption, the weight of automobiles has to be reduced. Fiber reinforced polymers offer the potential to reach this aim because of their high stiffness to weight ratio. Additionally, the use of fiber reinforced polymers in automotive applications has to allow for an economic large-scale production. In this regard, long fiber reinforced thermoplastics made by direct processing offer both mechanical performance and processability in injection moulding and compression moulding. The work presented in this contribution deals with long glass fiber reinforced polypropylene directly processed in compression moulding (D-LFT). For the use in automotive applications both the temperature and the time dependency of the materials properties have to be investigated to fulfill performance requirements during crash or the demands of service temperatures ranging from -40 °C to 80 °C. To consider both the influence of temperature and time, quasistatic tensile tests have been carried out at different temperatures. These tests have been complemented by high speed tensile tests at different strain rates. As expected, the increase in strain rate results in an increase of the elastic modulus which correlates to an increase of the stiffness with decreasing service temperature. The results are in good accordance with results determined by dynamic mechanical analysis within the range of 0.1 to 100 Hz. The experimental results from different testing methods were grouped and interpreted by using different time temperature shift approaches. In this regard, Williams-Landel-Ferry and Arrhenius approach based on kinetics have been used. As the theoretical shift factor follows an arctan function, an empirical approach was also taken into consideration. It could be shown that this approach describes best the time and temperature superposition for glass fiber reinforced polypropylene manufactured by D-LFT processing.Keywords: composite, dynamic mechanical analysis, long fibre reinforced thermoplastics, mechanical properties, time temperature superposition
Procedia PDF Downloads 1972334 The Effectiveness of First World Asylum Practices in Deterring Applications, Offering Bureaucratic Deniability, and Violating Human Rights: A Greek Case Study
Authors: Claudia Huerta, Pepijn Doornenbal, Walaa Elsiddig
Abstract:
Rising waves of nationalism around the world have led first-world migration receiving countries to exploit the ambiguity of international refugee law and establish asylum application processes that deter applications, allow for bureaucratic deniability, and violate human rights. This case study of Greek asylum application practices argues that the 'pre-application' asylum process in Greece violates the spirit of international law by making it incredibly difficult for potential asylum seekers to apply for asylum, in essence violating the human rights of thousands of asylum seekers. This study’s focus is on the Greek mainland’s asylum 'pre-application' process, which in 2016 began to require those wishing to apply for asylum to do so during extremely restricted hours via a basic Skype line. The average wait to simply begin the registration process to apply for asylum is 81 days, during which time applicants are forced to live illegally in Greece. This study’s methodology in analyzing the 'pre-application' process consists of hours of interviews with asylum seekers, NGOs, and the Asylum Service office on the ground in Athens, as well as an analysis of the Greek Asylum Service historical asylum registration statistics. This study presents three main findings: the delays associated with the Skype system in Greece are the result of system design, as proven by a statistical analysis of Greek asylum registrations, NGOs have been co-opted by the state to perform state functions during the process, and the government’s use of technology is both purposefully lazy and discriminatory. In conclusion, the study argues that such asylum practices are part of a pattern of first-world migration receiving countries policies’ which discourage asylum seekers from applying and fall short of the standards in international law.Keywords: asylum, European Union, governance, Greece, irregular, migration, policy, refugee, Skype
Procedia PDF Downloads 1262333 An Approach to Autonomous Drones Using Deep Reinforcement Learning and Object Detection
Authors: K. R. Roopesh Bharatwaj, Avinash Maharana, Favour Tobi Aborisade, Roger Young
Abstract:
Presently, there are few cases of complete automation of drones and its allied intelligence capabilities. In essence, the potential of the drone has not yet been fully utilized. This paper presents feasible methods to build an intelligent drone with smart capabilities such as self-driving, and obstacle avoidance. It does this through advanced Reinforcement Learning Techniques and performs object detection using latest advanced algorithms, which are capable of processing light weight models with fast training in real time instances. For the scope of this paper, after researching on the various algorithms and comparing them, we finally implemented the Deep-Q-Networks (DQN) algorithm in the AirSim Simulator. In future works, we plan to implement further advanced self-driving and object detection algorithms, we also plan to implement voice-based speech recognition for the entire drone operation which would provide an option of speech communication between users (People) and the drone in the time of unavoidable circumstances. Thus, making drones an interactive intelligent Robotic Voice Enabled Service Assistant. This proposed drone has a wide scope of usability and is applicable in scenarios such as Disaster management, Air Transport of essentials, Agriculture, Manufacturing, Monitoring people movements in public area, and Defense. Also discussed, is the entire drone communication based on the satellite broadband Internet technology for faster computation and seamless communication service for uninterrupted network during disasters and remote location operations. This paper will explain the feasible algorithms required to go about achieving this goal and is more of a reference paper for future researchers going down this path.Keywords: convolution neural network, natural language processing, obstacle avoidance, satellite broadband technology, self-driving
Procedia PDF Downloads 2492332 Comparison of Storage Facilities on Different Varieties of Orange Fleshed Sweet Potato Grown in Rwanda
Authors: Jean Paul Hategekimana, Dukuzumuremyi Yvonne, Mukeshimana Marthe, Alexandre Niyonshima
Abstract:
Sweet potato (Ipomoea batatas) is a very important staple food crop in Rwanda due to its high growth and consumption in all parts of the country. The effect of seven different storage conditions on the quality and nutritional composition of the three most grown and consumed varieties of orange-fleshed sweet potato (OFSP), namely Kabode, Terimbere, and Vita, were studied over a period of six weeks at Postharvest Service and Training Center of University Rwanda, Busogo Campus. The potato stored under the following conditions (zero energy cooling chamber, ground washed sweet potato, ground unwashed sweet potato, perforated washed sweet potato, perforated unwashed sweet potato, non-perforated washed sweet potato, and non-perforated unwashed sweet potato) were assessed in this study. These storage conditions are the modifications of existing methods currently used in Rwanda for suitable local climatic conditions. Hence, 30kgs of freshly harvested OFSP for each variety were bought from farmers of Gakenke and Rulindo districts and then transported to the postharvest training and service center UR-CAVM, Busogo Campus. 2.5kg of each potato sample was selected and stored under the above-mentioned storage conditions after pretreatment. Data were collected for six weeks on percent weight loss, shrinkability and the general appearance at interval of three days. The stored samples were also analyzed for moisture, crude ash, crude fiber, and reduced sugar levels during the entire storage period. Results showed the difference among the various storage conditions. It was shown that ZECC and non-perforated sacs (in the open air) storage techniques had good potential for storage of orange flesh sweet potato for up to six weeks without considerable change in physical and nutritional parameters compared to other considered conditions and, therefore, can be recommended as more useful for OSFP at farm level and during transport and market storage.Keywords: ZECC, orange fleshed sweet potato, perforated sacs, storage conditions
Procedia PDF Downloads 662331 Unraveling the Complexities of Competitive Aggressiveness: A Qualitative Exploration in the Oil and Gas Industry
Authors: Salim Al Harthy, Alexandre A. Bachkirov
Abstract:
This study delves into the complexities of competitive aggressiveness in the oil and gas industry, focusing on the characteristics of the identified competitive actions. The current quantitative research on competitive aggressiveness lacks agreement on the connection between antecedents and outcomes, prompting a qualitative investigation. To address this gap, the research utilizes qualitative interviews with CEOs from Oman's oil and gas service industry to explore the dynamics of competitive aggressiveness. Using Noklenain's typology, the study categorizes and analyzes identified actions, shedding light on the spectrum of competitive behaviors within the industry. Notably, actions predominantly fall under the "Bring about" and "Preserve" elements, with a notable absence in the "Forebear" and "Destroy" categories, possibly linked to the study's focus on service-oriented businesses. The study also explores the detectability of actions, revealing that "Bring about" actions are detectable, while those in "Preserve" and "Suppress" are not. This challenges conventional definitions of competitive aggressiveness, suggesting that not all actions are readily detectable despite being considered competitive. The presence of non-detectable actions introduces complexity to measurement methods reliant on visible empirical data. Moreover, the study contends that companies can adopt an aggressive competitive approach without directly challenging rivals. This challenges traditional views and emphasizes the innovative and entrepreneurial aspects of actions not explicitly aimed at competitors. By not revealing strategic intentions, such actions put rivals at a disadvantage, underscoring the need for a nuanced understanding of competitive aggressiveness. In summary, the lack of consensus in existing literature regarding the relationship between antecedents and outcomes in competitive aggressiveness is addressed. The study reveals a spectrum of detectable and undetectable actions, posing challenges in measurement and emphasizing the need for alternative methods to assess undetectable actions in competitive behavior. This research contributes to a more nuanced understanding of competitive aggressiveness, acknowledging the diverse actions shaping a company's strategic positioning in dynamic business environments.Keywords: competitive aggressiveness, qualitative exploration, noklenain's typology, oil and gas industry
Procedia PDF Downloads 602330 Investigation of Delivery of Triple Play Data in GE-PON Fiber to the Home Network
Authors: Ashima Anurag Sharma
Abstract:
Optical fiber based networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This research paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparison between various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be decreases due to increase in bit error rate.Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT
Procedia PDF Downloads 5272329 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 1682328 Integrated Safety Net Program for High-Risk Families in New Taipei City
Authors: Peifang Hsieh
Abstract:
New Taipei city faces increasing number of migrant families, in which the needs of children are sometimes neglected due to insufficient support from communities. Moreover, the traditional mindset of disengagement discourages citizens from preemptively identifying families in need in their communities, resulting in delay of prompt intervention from authorities concerned. To safeguard these vulnerable families, New Taipei city develops the 'Integrated Safety-Net Program for High-Risk Families' from 2011 by implementing the following measures: (A) New attitude and action: Instead of passively receiving reported case of high-risk families, the program takes proactive and preemptive approach to detect and respond at early stage, so the cases are prevented from worsening. In addition, cross-departmental integration mechanism is established to meet multiple needs of high-risk families. The children number added to the government care network is greatly increased to over 10,000, which is around 4.4 times the original number before the program. (B) New service points: 2000 city-wide convenience stores are added as service stations so that children in less privileged families can go to any of 24-hour convenience stores across the city to pick up free meals. This greatly increases the approachability to high-risk families. Moreover, the social welfare institutes will be notified with information left in convenience stores by children and follow up with further assistance, greatly enhancing chances of less privileged families being identified. (C) New Key Figures: Mobilize community officers and volunteers to detect and offer on-site assistance. Volunteer organizations within communities are connected to report and offer follow-up services in a more active manner. In total, from 2011 to 2015, 54,789 cases are identified through active care, benefiting 82,124 children. In addition, 87.49% family-cases in the program receiving comprehensive social assistance are no longer at high risk.Keywords: cross department, high-risk families, public-private partnership, integrated safety net
Procedia PDF Downloads 2962327 Offshore Facilities Load Out: Case Study of Jacket Superstructure Loadout by Strand Jacking Skidding Method
Authors: A. Rahim Baharudin, Nor Arinee binti Mat Saaud, Muhammad Afiq Azman, Farah Adiba A. Sani
Abstract:
Objectives: This paper shares the case study on the engineering analysis, data analysis, and real-time data comparison for qualifying the stand wires' minimum breaking load and safe working load upon loadout operation for a new project and, at the same time, eliminate the risk due to discrepancies and unalignment of COMPANY Technical Standards to Industry Standards and Practices. This paper demonstrates “Lean Construction” for COMPANY’s Project by sustaining fit-for-purpose Technical Requirements of Loadout Strand Wire Factor of Safety (F.S). The case study utilizes historical engineering data from a few loadout operations by skidding methods from different projects. It is also demonstrating and qualifying the skidding wires' minimum breaking load and safe working load used for loadout operation for substructure and other facilities for the future. Methods: Engineering analysis and comparison of data were taken as referred to the international standard and internal COMPANY standard requirements. Data was taken from nine (9) previous projects for both topsides and jacket facilities executed at the several local fabrication yards where load out was conducted by three (3) different service providers with emphasis on four (4) basic elements: i) Industry Standards for Loadout Engineering and Operation Reference: COMPANY internal standard was referred to superseded documents of DNV-OS-H201 and DNV/GL 0013/ND. DNV/GL 0013/ND and DNVGL-ST-N001 do not mention any requirements of Strand Wire F.S of 4.0 for Skidding / Pulling Operations. ii) Reference to past Loadout Engineering and Execution Package: Reference was made to projects delivered by three (3) major offshore facilities operators. Strand Wire F.S observed ranges from 2.0 MBL (Min) to 2.5 MBL (Max). No Loadout Operation using the requirements of 4.0 MBL was sighted from the reference. iii) Strand Jack Equipment Manufacturer Datasheet Reference: Referring to Strand Jack Equipment Manufactured Datasheet by different loadout service providers, it is shown that the Designed F.S for the equipment is also ranging between 2.0 ~ 2.5. Eight (8) Strand Jack Datasheet Model was referred to, ranging from 15 Mt to 850 Mt Capacity; however, there are NO observations of designed F.S 4.0 sighted. iv) Site Monitoring on Actual Loadout Data and Parameter: Max Load on Strand Wire was captured during 2nd Breakout, which is during Static Condition of 12.9 MT / Strand Wire (67.9% Utilization). Max Load on Strand Wire for Dynamic Conditions during Step 8 and Step 12 is 9.4 Mt / Strand Wire (49.5% Utilization). Conclusion: This analysis and study demonstrated the adequacy of strand wires supplied by the service provider were technically sufficient in terms of strength, and via engineering analysis conducted, the minimum breaking load and safe working load utilized and calculated for the projects were satisfied and operated safely for the projects. It is recommended from this study that COMPANY’s technical requirements are to be revised for future projects’ utilization.Keywords: construction, load out, minimum breaking load, safe working load, strand jacking, skidding
Procedia PDF Downloads 1112326 Distance and Coverage: An Assessment of Location-Allocation Models for Fire Stations in Kuwait City, Kuwait
Authors: Saad M. Algharib
Abstract:
The major concern of planners when placing fire stations is finding their optimal locations such that the fire companies can reach fire locations within reasonable response time or distance. Planners are also concerned with the numbers of fire stations that are needed to cover all service areas and the fires, as demands, with standard response time or distance. One of the tools for such analysis is location-allocation models. Location-allocation models enable planners to determine the optimal locations of facilities in an area in order to serve regional demands in the most efficient way. The purpose of this study is to examine the geographic distribution of the existing fire stations in Kuwait City. This study utilized location-allocation models within the Geographic Information System (GIS) environment and a number of statistical functions to assess the current locations of fire stations in Kuwait City. Further, this study investigated how well all service areas are covered and how many and where additional fire stations are needed. Four different location-allocation models were compared to find which models cover more demands than the others, given the same number of fire stations. This study tests many ways to combine variables instead of using one variable at a time when applying these models in order to create a new measurement that influences the optimal locations for locating fire stations. This study also tests how location-allocation models are sensitive to different levels of spatial dependency. The results indicate that there are some districts in Kuwait City that are not covered by the existing fire stations. These uncovered districts are clustered together. This study also identifies where to locate the new fire stations. This study provides users of these models a new variable that can assist them to select the best locations for fire stations. The results include information about how the location-allocation models behave in response to different levels of spatial dependency of demands. The results show that these models perform better with clustered demands. From the additional analysis carried out in this study, it can be concluded that these models applied differently at different spatial patterns.Keywords: geographic information science, GIS, location-allocation models, geography
Procedia PDF Downloads 1762325 Continuous-Time Convertible Lease Pricing and Firm Value
Authors: Ons Triki, Fathi Abid
Abstract:
Along with the increase in the use of leasing contracts in corporate finance, multiple studies aim to model the credit risk of the lease in order to cover the losses of the lessor of the asset if the lessee goes bankrupt. In the current research paper, a convertible lease contract is elaborated in a continuous time stochastic universe aiming to ensure the financial stability of the firm and quickly recover the losses of the counterparties to the lease in case of default. This work examines the term structure of the lease rates taking into account the credit default risk and the capital structure of the firm. The interaction between the lessee's capital structure and the equilibrium lease rate has been assessed by applying the competitive lease market argument developed by Grenadier (1996) and the endogenous structural default model set forward by Leland and Toft (1996). The cumulative probability of default was calculated by referring to Leland and Toft (1996) and Yildirim and Huan (2006). Additionally, the link between lessee credit risk and lease rate was addressed so as to explore the impact of convertible lease financing on the term structure of the lease rate, the optimal leverage ratio, the cumulative default probability, and the optimal firm value by applying an endogenous conversion threshold. The numerical analysis is suggestive that the duration structure of lease rates increases with the increase in the degree of the market price of risk. The maximal value of the firm decreases with the effect of the optimal leverage ratio. The results are indicative that the cumulative probability of default increases with the maturity of the lease contract if the volatility of the asset service flows is significant. Introducing the convertible lease contract will increase the optimal value of the firm as a function of asset volatility for a high initial service flow level and a conversion ratio close to 1.Keywords: convertible lease contract, lease rate, credit-risk, capital structure, default probability
Procedia PDF Downloads 972324 Development, Evaluation and Scale-Up of a Mental Health Care Plan (MHCP) in Nepal
Authors: Nagendra P. Luitel, Mark J. D. Jordans
Abstract:
Globally, there is a significant gap between the number of individuals in need of mental health care and those who actually receive treatment. The evidence is accumulating that mental health services can be delivered effectively by primary health care workers through community-based programs and task-sharing approaches. Changing the role of specialist mental health workers from service delivery to building clinical capacity of the primary health care (PHC) workers could help in reducing treatment gap in low and middle-income countries (LMICs). We developed a comprehensive mental health care plan in 2012 and evaluated its feasibility and effectiveness over the past three years. Initially, a mixed method formative study was conducted for the development of mental health care plan (MHCP). Routine monitoring and evaluation data, including client flow and reports of satisfaction, were obtained from beneficiaries (n=135) during the pilot-testing phase. Repeated community survey (N=2040); facility detection survey (N=4704) and the cohort study (N=576) were conducted for evaluation of the MHCP. The resulting MHCP consists of twelve packages divided over the community, health facility, and healthcare organization platforms. Detection of mental health problems increased significantly after introducing MHCP. Service implementation data support the real-life applicability of the MHCP, with reasonable treatment uptake. Currently, MHCP has been implemented in the entire Chitwan district where over 1400 people (438 people with depression, 406 people with psychosis, 181 people with epilepsy, 360 people with alcohol use disorder and 51 others) have received mental health services from trained health workers. Key barriers were identified and addressed, namely dissatisfaction with privacy, perceived burden among health workers, high drop-out rates and continue the supply of medicines. The results indicated that involvement of PHC workers in detection and management of mental health problems is an effective strategy to minimize treatment gap on mental health care in Nepal.Keywords: mental health, Nepal, primary care, treatment gap
Procedia PDF Downloads 2932323 Investigation of Delivery of Triple Play Services
Authors: Paramjit Mahey, Monica Sharma, Jasbinder Singh
Abstract:
Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT
Procedia PDF Downloads 5412322 Big Data Analytics and Public Policy: A Study in Rural India
Authors: Vasantha Gouri Prathapagiri
Abstract:
Innovations in ICT sector facilitate qualitative life style for citizens across the globe. Countries that facilitate usage of new techniques in ICT, i.e., big data analytics find it easier to fulfil the needs of their citizens. Big data is characterised by its volume, variety, and speed. Analytics involves its processing in a cost effective way in order to draw conclusion for their useful application. Big data also involves into the field of machine learning, artificial intelligence all leading to accuracy in data presentation useful for public policy making. Hence using data analytics in public policy making is a proper way to march towards all round development of any country. The data driven insights can help the government to take important strategic decisions with regard to socio-economic development of her country. Developed nations like UK and USA are already far ahead on the path of digitization with the support of Big Data analytics. India is a huge country and is currently on the path of massive digitization being realised through Digital India Mission. Internet connection per household is on the rise every year. This transforms into a massive data set that has the potential to improvise the public services delivery system into an effective service mechanism for Indian citizens. In fact, when compared to developed nations, this capacity is being underutilized in India. This is particularly true for administrative system in rural areas. The present paper focuses on the need for big data analytics adaptation in Indian rural administration and its contribution towards development of the country on a faster pace. Results of the research focussed on the need for increasing awareness and serious capacity building of the government personnel working for rural development with regard to big data analytics and its utility for development of the country. Multiple public policies are framed and implemented for rural development yet the results are not as effective as they should be. Big data has a major role to play in this context as can assist in improving both policy making and implementation aiming at all round development of the country.Keywords: Digital India Mission, public service delivery system, public policy, Indian administration
Procedia PDF Downloads 1592321 Hidden Hot Spots: Identifying and Understanding the Spatial Distribution of Crime
Authors: Lauren C. Porter, Andrew Curtis, Eric Jefferis, Susanne Mitchell
Abstract:
A wealth of research has been generated examining the variation in crime across neighborhoods. However, there is also a striking degree of crime concentration within neighborhoods. A number of studies show that a small percentage of street segments, intersections, or addresses account for a large portion of crime. Not surprisingly, a focus on these crime hot spots can be an effective strategy for reducing community level crime and related ills, such as health problems. However, research is also limited in an important respect. Studies tend to use official data to identify hot spots, such as 911 calls or calls for service. While the use of call data may be more representative of the actual level and distribution of crime than some other official measures (e.g. arrest data), call data still suffer from the 'dark figure of crime.' That is, there is most certainly a degree of error between crimes that occur versus crimes that are reported to the police. In this study, we present an alternative method of identifying crime hot spots, that does not rely on official data. In doing so, we highlight the potential utility of neighborhood-insiders to identify and understand crime dynamics within geographic spaces. Specifically, we use spatial video and geo-narratives to record the crime insights of 36 police, ex-offenders, and residents of a high crime neighborhood in northeast Ohio. Spatial mentions of crime are mapped to identify participant-identified hot spots, and these are juxtaposed with calls for service (CFS) data. While there are bound to be differences between these two sources of data, we find that one location, in particular, a corner store, emerges as a hot spot for all three groups of participants. Yet it does not emerge when we examine CFS data. A closer examination of the space around this corner store and a qualitative analysis of narrative data reveal important clues as to why this store may indeed be a hot spot, but not generate disproportionate calls to the police. In short, our results suggest that researchers who rely solely on official data to study crime hot spots may risk missing some of the most dangerous places.Keywords: crime, narrative, video, neighborhood
Procedia PDF Downloads 2362320 Driving Performance Improvement in Mini Markets: The Impact of Talent Management, Business Skills, and Technology Adoption in Johannesburg and Cape Town, South Africa
Authors: Fedil Jemal Ahmed
Abstract:
This conference abstract paper presents a study that aimed to explore the impact of talent management and business skills on performance improvement in mini markets located in Johannesburg and Cape Town, South Africa. Mini markets are small retail stores that play a crucial role in providing essential goods and services to communities. However, due to their small size, they often face significant challenges in terms of resources and management. The study conducted interviews with mini market owners and managers in Johannesburg and Cape Town to understand their approach to talent management, business skills, and their impact on business performance. The results showed that effective talent management practices, including recruitment, training, and retention, along with strong business skills, had a significant positive impact on business performance in mini markets. Furthermore, the study found that the use of technology, such as point of sale systems and inventory management software, can also contribute to business performance improvement in mini markets. The results suggest that mini market owners and managers should prioritize talent management, business skills, and invest in technology to improve their business performance. Comparing the improvements made by mini markets in Johannesburg and Cape Town to those made by others, the study found that the adoption of effective talent management practices and strong business skills were key factors in driving performance improvement. Mini market owners and managers who invested in these areas were better equipped to manage their resources, enhance their customer service, and increase their profitability. When comparing the personal experiences of the fedil jemal who improved their business performance from a small market to a large one, they found that effective talent management practices and strong business skills were crucial in achieving success. Through the adoption of effective talent management practices, the fedil was able to attract and retain top talent, ensuring that the business was managed effectively. Furthermore, the fedil invested in improving their business skills, such as financial management, marketing, and customer service, which helped to increase their revenue and profitability. In terms of technology adoption, the author found that the use of point-of-sale systems and inventory management software were essential in managing their inventory and improving their customer service. By investing in technology, the fedil was able to streamline their operations and enhance their overall business performance. In conclusion, this study provides valuable insights into the importance of talent management, business skills, and technology adoption in improving business performance in mini markets. It highlights the need for mini market owners and managers to prioritize these areas and invest in them to enhance their business performance. The findings of this study have practical implications for mini market owners and managers who are looking to improve their business performance and compete in a highly competitive market. By adopting effective talent management practices, developing strong business skills, and investing in technology, mini market owners and managers can improve their operations and increase their profitability.Keywords: talent management, business skills, technology adoption, mini markets
Procedia PDF Downloads 992319 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 3842318 Some Issues of Measurement of Impairment of Non-Financial Assets in the Public Sector
Authors: Mariam Vardiashvili
Abstract:
The economic value of the asset impairment process is quite large. Impairment reflects the reduction of future economic benefits or service potentials itemized in the asset. The assets owned by public sector entities bring economic benefits or are used for delivery of the free-of-charge services. Consequently, they are classified as cash-generating and non-cash-generating assets. IPSAS 21 - Impairment of non-cash-generating assets, and IPSAS 26 - Impairment of cash-generating assets, have been designed considering this specificity. When measuring impairment of assets, it is important to select the relevant methods. For measurement of the impaired Non-Cash-Generating Assets, IPSAS 21 recommends three methods: Depreciated Replacement Cost Approach, Restoration Cost Approach, and Service Units Approach. Impairment of Value in Use of Cash-Generating Assets (according to IPSAS 26) is measured by discounted value of the money sources to be received in future. Value in use of the cash-generating asserts (as per IPSAS 26) is measured by the discounted value of the money sources to be received in the future. The article provides classification of the assets in the public sector as non-cash-generating assets and cash-generating assets and, deals also with the factors which should be considered when evaluating impairment of assets. An essence of impairment of the non-financial assets and the methods of measurement thereof evaluation are formulated according to IPSAS 21 and IPSAS 26. The main emphasis is put on different methods of measurement of the value in use of the impaired Cash-Generating Assets and Non-Cash-Generation Assets and the methods of their selection. The traditional and the expected cash flow approaches for calculation of the discounted value are reviewed. The article also discusses the issues of recognition of impairment loss and its reflection in the financial reporting. The article concludes that despite a functional purpose of the impaired asset, whichever method is used for measuring the asset, presentation of realistic information regarding the value of the assets should be ensured in the financial reporting. In the theoretical development of the issue, the methods of scientific abstraction, analysis and synthesis were used. The research was carried out with a systemic approach. The research process uses international standards of accounting, theoretical researches and publications of Georgian and foreign scientists.Keywords: cash-generating assets, non-cash-generating assets, recoverable (usable restorative) value, value of use
Procedia PDF Downloads 1432317 Optimization of Territorial Spatial Functional Partitioning in Coal Resource-based Cities Based on Ecosystem Service Clusters - The Case of Gujiao City in Shanxi Province
Authors: Gu Sihao
Abstract:
The coordinated development of "ecology-production-life" in cities has been highly concerned by the country, and the transformation development and sustainable development of resource-based cities have become a hot research topic at present. As an important part of China's resource-based cities, coal resource-based cities have the characteristics of large number and wide distribution. However, due to the adjustment of national energy structure and the gradual exhaustion of urban coal resources, the development vitality of coal resource-based cities is gradually reduced. In many studies, the deterioration of ecological environment in coal resource-based cities has become the main problem restricting their urban transformation and sustainable development due to the "emphasis on economy and neglect of ecology". Since the 18th National Congress of the Communist Party of China (CPC), the Central Government has been deepening territorial space planning and development. On the premise of optimizing territorial space development pattern, it has completed the demarcation of ecological protection red lines, carried out ecological zoning and ecosystem evaluation, which have become an important basis and scientific guarantee for ecological modernization and ecological civilization construction. Grasp the regional multiple ecosystem services is the precondition of the ecosystem management, and the relationship between the multiple ecosystem services study, ecosystem services cluster can identify the interactions between multiple ecosystem services, and on the basis of the characteristics of the clusters on regional ecological function zoning, to better Social-Ecological system management. Based on this cognition, this study optimizes the spatial function zoning of Gujiao, a coal resource-based city, in order to provide a new theoretical basis for its sustainable development. This study is based on the detailed analysis of characteristics and utilization of Gujiao city land space, using SOFM neural networks to identify local ecosystem service clusters, according to the cluster scope and function of ecological function zoning of space partition balance and coordination between different ecosystem services strength, establish a relationship between clusters and land use, and adjust the functions of territorial space within each zone. Then, according to the characteristics of coal resources city and national spatial function zoning characteristics, as the driving factors of land change, by cellular automata simulation program, such as simulation under different restoration strategy situation of urban future development trend, and provides relevant theories and technical methods for the "third-line" demarcations of Gujiao's territorial space planning, optimizes territorial space functions, and puts forward targeted strategies for the promotion of regional ecosystem services, providing theoretical support for the improvement of human well-being and sustainable development of resource-based cities.Keywords: coal resource-based city, territorial spatial planning, ecosystem service cluster, gmop model, geosos-FLUS model, functional zoning optimization and upgrading
Procedia PDF Downloads 612316 Implications for Counseling and Service Delivery on the Psychological Trajectories of Women Undergoing in Vitro Fertilization (IVF) Treatment in Hong Kong
Authors: Tong Mei Yan
Abstract:
Introduction: The experience of infertility could be excruciating but has not received much attention in Hong Kong. The strong Confucian culture pressures couples to continue their family lineage resulting in women facing more stress than men in the social-cultural milieu. In Vitro Fertilization (IVF) treatment is one of the common ways to deal with the problem. Abundant literature exists the psychological trajectories of people receiving IVF treatment in Europe, the USA and other east Asian societies but not in Hong Kong. Aim: This study aims to highlight the circumstances and needs of the women before, during and after IVF treatment through examining their lived experiences. It is hoped that the public, once informed of regarding their tribulations and needs , would support the adequate provision of the required psychological support . Methods: Qualitative analysis was adopted in this study. In-depth interviews were conducted with six women who have undergone at least one complete cycle of IVF treatment within the past five years. Data was analyzed through thematic analysis and narrative analysis. Results: 4 broad themes were found, including (i) emotional responses; (ii) experiences in medical consultation; (iii) impacts of the treatment; and (iv) their coping strategies. Additionally, specific events in three cases were chosen for narrative analysis to further examine their unresolved emotional distress and the ethical issues. Conclusion: IVF treatment distressed the interviewees immensely, both physically and psychologically, with the negative emotions outweighing their physical strains, a result unexpected by all of the interviewees. The pressure for lineage continuation, the demanding treatment process and the dearth of support from health professionals all contribute to their emotional pain which could linger for both successful and unsuccessful cases. Although a number of coping strategies were attempted, most of them completely failed to ease their psychological tension. The findings of this study therefore evidence the need for psychological support for this population. A service model to cater their needs of IVF treatment before, during and after treatment is therefore proposed.Keywords: coping strategies, emotional experiences, impacts of IVF, infertility, IVF treatment, medical experiences
Procedia PDF Downloads 852315 Participatory Action Research with Social Workers: The World Café Method to Share Critical Reflections and Possible Solutions on Working Practices in Migration Contexts
Authors: Ilaria Coppola, Davide Lacqua, Nadia Ranìa
Abstract:
Over the past two decades, migration has gained central importance in the global landscape. Europe hosts the largest number of migrants, totaling 92.9 million people, approximately 37.4 million of whom are regular residents within the European Union's borders. Reception services and different modes of management have received increasing attention precisely because of the complexity of the phenomenon, which necessarily impacts the wider community. Indeed, opening a reception center in an area entails major challenges for that context, for the community that inhabits it, and for the people who use that service. Questioning the strategies needed to offer a functional reception service means listening to the different actors involved who daily face the difficulties involved in working in the field. Recognizing the importance of the professional figures who work closely with migrant people, each with their own specific experiences has led researchers to study and analyze the different types of reception centers and their management. This has led to the development of intervention models and best practices in various countries. However, research from this perspective is still limited, especially in Italy. From this theoretical framework, this study aims to bring out an innovative qualitative tool, such as the world café, the work experiences of 29 social workers working in shelters in the Italian context. Most of the participants were female and lived in the Northwest regions of Italy. Through this tool, the aim was to bring out and share reflections on the critical issues encountered in working in reception centers, with a view to identifying possible solutions for better management of services. The World café represents a tool used in participatory action research that promotes dialogue among participants through the sharing of reflections and ideas. In fact, from critical reflections, participants are invited to identify and share possible solutions to provide a more functional service with benefits to the entire community. Therefore, this research, through the innovative technique of the World café, aims to promote critical thinking processes that can help participants find solutions that can be introduced into their work contexts or proposed to decision-makers. Specifically, the findings shed light on several issues, including complex bureaucratic procedures, insufficient project planning, and inefficiencies in the services provided to migrants. These concerns collectively contribute to what participants perceive as a disorganized and uncoordinated system. In addition, the study explores potential solutions that promote more efficient networking practices, coordinated project management, and a more positive approach to cultural diversity. The main results obtained will be discussed with a focus on critical reflections and possible solutions identified.Keywords: participatory action research, world café method, reception services, migration contexts, social workers, Italy
Procedia PDF Downloads 632314 Global Supply Chain Tuning: Role of National Culture
Authors: Aleksandr S. Demin, Anastasiia V. Ivanova
Abstract:
Purpose: The current economy tends to increase the influence of digital technologies and diminish the human role in management. However, it is impossible to deny that a person still leads a business with its own set of values and priorities. The article presented aims to incorporate the peculiarities of the national culture and the characteristics of the supply chain using the quantitative values of the national culture obtained by the scholars of comparative management (Hofstede, House, and others). Design/Methodology/Approach: The conducted research is based on the secondary data in the field of cross-country comparison achieved by Prof. Hofstede and received in the GLOBE project. The data mentioned are used to design different aspects of the supply chain both on the cross-functional and inter-organizational levels. The connection between a range of principles in general (roles assignment, customer service prioritization, coordination of supply chain partners) and in comparative management (acknowledgment of the national peculiarities of the country in which the company operates) is shown over economic and mathematical models, mainly linear programming models. Findings: The combination of the team management wheel concept, the business processes of the global supply chain, and the national culture characteristics let a transnational corporation to form a supply chain crew balanced in costs, functions, and personality. To elaborate on an effective customer service policy and logistics strategy in goods and services distribution in the country under review, two approaches are offered. The first approach relies exceptionally on the customer’s interest in the place of operation, while the second one takes into account the position of the transnational corporation and its previous experience in order to accord both organizational and national cultures. The effect of integration practice on the achievement of a specific supply chain goal in a specific location is advised to assess via types of correlation (positive, negative, non) and the value of national culture indices. Research Limitations: The models developed are intended to be used by transnational companies and business forms located in several nationally different areas. Some of the inputs to illustrate the application of the methods offered are simulated. That is why the numerical measurements should be used with caution. Practical Implications: The research can be of great interest for the supply chain managers who are responsible for the engineering of global supply chains in a transnational corporation and the further activities in doing business on the international area. As well, the methods, tools, and approaches suggested can be used by top managers searching for new ways of competitiveness and can be suitable for all staff members who are keen on the national culture traits topic. Originality/Value: The elaborated methods of decision-making with regard to the national environment suggest the mathematical and economic base to find a comprehensive solution.Keywords: logistics integration, logistics services, multinational corporation, national culture, team management, service policy, supply chain management
Procedia PDF Downloads 1052313 Neighbor Caring Environment System (NCE) Using Parallel Replication Mechanism
Authors: Ahmad Shukri Mohd Noor, Emma Ahmad Sirajudin, Rabiei Mamat
Abstract:
Pertaining to a particular Marine interest, the process of data sampling could take years before a study can be concluded. Therefore, the need for a robust backup system for the data is invariably implicit. In recent advancement of Marine applications, more functionalities and tools are integrated to assist the work of the researchers. It is anticipated that this modality will continue as research scope widens and intensifies and at the same to follow suit with current technologies and lifestyles. The convenience to collect and share information these days also applies to the work in Marine research. Therefore, Marine system designers should be aware that high availability is a necessary attribute in Marine repository applications as well as a robust backup system for the data. In this paper, the approach to high availability is related both to hardware and software but the focus is more on software. We consider a NABTIC repository system that is primitively built on a single server and does not have replicated components. First, the system is decomposed into separate modules. The modules are placed on multiple servers to create a distributed system. Redundancy is added by placing the copies of the modules on different servers using Neighbor Caring Environment System(NCES) technique. NCER is utilizing parallel replication components mechanism. A background monitoring is established to check servers’ heartbeats to confirm their aliveness. At the same time, a critical adaptive threshold is maintained to make sure a failure is timely detected using Adaptive Fault Detection (AFD). A confirmed failure will set the recovery mode where a selection process will be done before a fail-over server is instructed. In effect, the Marine repository service is continued as the fail-over masks a recent failure. The performance of the new prototype is tested and is confirmed to be more highly available. Furthermore, the downtime is not noticeable as service is immediately restored automatically. The Marine repository system is said to have achieved fault tolerance.Keywords: availability, fault detection, replication, fault tolerance, marine application
Procedia PDF Downloads 3212312 Mediating Role of Experiential Value Added by the Sales Force
Authors: Said Echchakoui
Abstract:
This paper aims to investigate how experiential value added by the salesperson mediates the relationship between perceived salesperson source characteristics and his performance. Structural equation modelling was employed to assess the proposed research model empirically. The empirical results revealed that the three dimensions of experiential value economic benefit, service productivity and enjoyable interaction, mediated the relationship between perceived salesperson source characteristics and his performance. Managerial implications are addressed.Keywords: sales force, experiential added value, customer perceived value, performance
Procedia PDF Downloads 4322311 The Effects of a Nursing Dignity Care Program on Patients’ Dignity in Care
Authors: Yea-Pyng Lin
Abstract:
Dignity is a core element of nursing care. Maintaining the dignity of patients is an important issue because the health and recovery of patients can be adversely affected by a lack of dignity in their care. The aim of this study was to explore the effects of a nursing dignity care program upon patients’ dignity in care. A quasi-experimental research design was implemented. Nurses were recruited by purposive sampling, and their patients were recruited by simple random sampling. Nurses in the experimental group received the nursing educational program on dignity care, while nurses in the control group received in-service education as usual. Data were collected via two instruments: the dignity in care scale for nurses and the dignity in care scale to patients, both of which were developed by the researcher. Both questionnaires consisted of three domains: agreement, importance, and frequencies of providing dignity care. A total of 178 nurses in the experimental group and 193 nurses in the control group completed the pretest and the follow-up evaluations at the first month, the third month, and the sixth month. The number of patients who were cared for by the nurses in the experimental group was 94 in the pretest. The number of patients in the post-test at the first, third, and sixth months were 91, 85, and 77, respectively. In the control group, 88 patients completed the II pretest, and 80 filled out the post-test at the first month, 77 at the third, and 74 at the sixth month. The major findings revealed the scores of agreement domain among nurses in the experimental group were found significantly different from those who in the control group at each point of time. The scores of importance domain between these two groups also displayed significant differences at pretest and the first month of post-test. Moreover, the frequencies of proving dignity care to patients were significant at pretest, the third month and sixth month of post-test. However, the experimental group had only significantly different from those who in the control group on the frequencies of receiving dignity care especially in the items of ‘privacy care,’ ‘communication care,’ and ‘emotional care’ for the patients. The results show that the nursing program on dignity care could increase nurses’ dignity care for patients in three domains of agreement, importance, and frequencies of providing dignity care. For patients, only the frequencies of receiving dignity care were significantly increased. Therefore, the nursing program on dignity care could be applicable for nurses’ in-service education and practice to enhance the ability of nurses to care for patient’s dignity.Keywords: nurses, patients, dignity care, quasi-experimental, nursing education
Procedia PDF Downloads 4652310 Shopping Cart System: Load Balancing and Fault Tolerance in the OSGi Service Platform
Authors: Irina Astrova, Arne Koschel, Thole Schneider, Johannes Westhuis, Jürgen Westerkamp
Abstract:
The main purpose of this paper was to find a simple solution for load balancing and fault tolerance in OSGi. The challenge was to implement a highly available web application such as a shopping cart system with load balancing and fault tolerance, without having to change the core of OSGi.Keywords: fault tolerance, load balancing, OSGi, shopping cart system
Procedia PDF Downloads 4192309 Day-Case Ketamine Infusions in Patients with Chronic Pancreatitis
Authors: S. M. C. Kelly, M. Goulden
Abstract:
Introduction: Chronic Pancreatitis is an increasing problem worldwide. Pain is the main symptom and the main reason for hospital readmission following diagnosis, despite the use of strong analgesics including opioids. Ketamine infusions reduce pain in complex regional pain syndrome and other neuropathic pain conditions. Our centre has trialed the use of ketamine infusions in patients with chronic pancreatitis. We have evaluated this service to assess whether ketamine reduces emergency department admissions and analgesia requirements. Methods: This study collected retrospective data from 2010 in all patients who received a ketamine infusion for chronic pain secondary to a diagnosis of chronic pancreatitis. The day-case ketamine infusions were initiated in theatre by an anaesthetist, with standard monitoring and the assistance of an anaesthetic practitioner. A bolus dose of 0.5milligrams/kilogram was given in theatre. The infusion of 0.5 milligrams/kilogram per hour was then administered over a 6 hour period in the theatre recovery area. A study proforma detailed the medical history, analgesic use and admissions to hospital. Patients received a telephone follow up consultation. Results: Over the last eight years, a total of 30 patients have received intravenous ketamine infusions, with a total of 92 ketamine infusions being administered. 53% of the patients were male with the average age of 47. A total of 27 patients participated with the telephone consultation. A third of patients reported a reduction in hospital admissions with pain following the ketamine infusion. Analgesia requirements were reduced by an average of 48.3% (range 0-100%) for an average duration of 69.6 days (range 0-180 days.) Discussion: This service evaluation illustrates that ketamine infusions can reduce analgesic requirements and the number of hospital admissions in patients with chronic pancreatitis. In the light of increasing pressures on Emergency departments and the increasing evidence of the dangers of long-term opioid use, this is clearly a useful finding. We are now performing a prospective study to assess the long-term effectiveness of ketamine infusions in reducing analgesia requirements and improving patient’s quality of life.Keywords: acute-on-chronic pain, intravenous analgesia infusion, ketamine, pancreatitis
Procedia PDF Downloads 1352308 Dissociation of CDS from CVA Valuation Under Notation Changes
Authors: R. Henry, J-B. Paulin, St. Fauchille, Ph. Delord, K. Benkirane, A. Brunel
Abstract:
In this paper, the CVA computation of interest rate swap is presented based on its rating. Rating and probability default given by Moody’s Investors Service are used to calculate our CVA for a specific swap with different maturities. With this computation, the influence of rating variation can be shown on CVA. The application is made to the analysis of Greek CDS variation during the period of Greek crisis between 2008 and 2011. The main point is the determination of correlation between the fluctuation of Greek CDS cumulative value and the variation of swap CVA due to change of ratingKeywords: CDS, computation, CVA, Greek crisis, interest rate swap, maturity, rating, swap
Procedia PDF Downloads 3082307 Modeling and Analyzing the WAP Class 2 Wireless Transaction Protocol Using Event-B
Authors: Rajaa Filali, Mohamed Bouhdadi
Abstract:
This paper presents an incremental formal development of the Wireless Transaction Protocol (WTP) in Event-B. WTP is part of the Wireless Application Protocol (WAP) architectures and provides a reliable request-response service. To model and verify the protocol, we use the formal technique Event-B which provides an accessible and rigorous development method. This interaction between modelling and proving reduces the complexity and helps to eliminate misunderstandings, inconsistencies, and specification gaps. As result, verification of WTP allows us to find some deficiencies in the current specification.Keywords: event-B, wireless transaction protocol, proof obligation, refinement, Rodin, ProB
Procedia PDF Downloads 3142306 The Novelty of Mobile Money Solution to Ghana’S Cashless Future: Opportunities, Challenges and Way Forward
Authors: Julius Y Asamoah
Abstract:
Mobile money has seen faster adoption in the decade. Its emergence serves as an essential driver of financial inclusion and an innovative financial service delivery channel, especially to the unbanked population. The rising importance of mobile money services has caught policymakers and regulators' attention, seeking to understand the many issues emerging from this context. At the same time, it is unlocking the potential of knowledge of this new technology. Regulatory responses and support are essential, requiring significant changes to current regulatory practices in Ghana. The article aims to answer the following research questions: "What risk does an unregulated mobile money service pose to consumers and the financial system? "What factors stimulate and hinder the introduction of mobile payments in developing countries? The sample size used was 250 respondents selected from the study area. The study has adopted an analytical approach comprising a combination of qualitative and quantitative data collection methods. Actor-network theory (ANT) is used as an interpretive lens to analyse this process. ANT helps analyse how actors form alliances and enrol other actors, including non-human actors (i.e. technology), to secure their interests. The study revealed that government regulatory policies impact mobile money as critical to mobile money services in developing countries. Regulatory environment should balance the needs of advancing access to finance with the financial system's stability and draw extensively from Kenya's work as the best strategies for the system's players. Thus, regulators need to address issues related to the enhancement of supportive regulatory frameworks. It recommended that the government involve various stakeholders, such as mobile phone operators. Moreover, the national regulatory authority creates a regulatory environment that promotes fair practices and competition to raise revenues to support a business-enabling environment's key pillars as infrastructure.Keywords: actor-network theory (ANT), cashless future, Developing countries, Ghana, Mobile Money
Procedia PDF Downloads 137