Search results for: consumer privacy
313 Using Industrial Service Quality to Assess Service Quality Perception in Television Advertisement: A Case Study
Authors: Ana L. Martins, Rita S. Saraiva, João C. Ferreira
Abstract:
Much effort has been placed on the assessment of perceived service quality. Several models can be found in literature, but these are mainly focused on business-to-consumer (B2C) relationships. Literature on how to assess perceived quality in business-to-business (B2B) contexts is scarce both conceptually and in terms of its application. This research aims at filling this gap in literature by applying INDSERV to a case study situation. Under this scope, this research aims at analyzing the adequacy of the proposed assessment tool to other context besides the one where it was developed and by doing so analyzing the perceive quality of the advertisement service provided by a specific television network to its B2B customers. The INDSERV scale was adopted and applied to a sample of 33 clients, via questionnaires adapted to interviews. Data was collected in person or phone. Both quantitative and qualitative data collection was performed. Qualitative data analysis followed content analysis protocol. Quantitative analysis used hypotheses testing. Findings allowed to conclude that the perceived quality of the television service provided by television network is very positive, being the Soft Process Quality the parameter that reveals the highest perceived quality of the service as opposed to Potential Quality. To this end, some comments and suggestions were made by the clients regarding each one of these service quality parameters. Based on the hypotheses testing, it was noticed that only advertisement clients that maintain a connection to the television network from 5 to 10 years do show a significant different perception of the TV advertisement service provided by the company in what the Hard Process Quality parameter is concerned. Through the collected data content analysis, it was possible to obtain the percentage of clients which share the same opinions and suggestions for improvement. Finally, based on one of the four service quality parameter in a B2B context, managerial suggestions were developed aiming at improving the television network advertisement perceived quality service.Keywords: B2B, case study, INDSERV, perceived service quality
Procedia PDF Downloads 206312 The Advantages of Using DNA-Barcoding for Determining the Fraud in Seafood
Authors: Elif Tugce Aksun Tumerkan
Abstract:
Although seafood is an important part of human diet and categorized highly traded food industry internationally, it is remain overlooked generally in the global food security aspect. Food product authentication is the main interest in the aim of both avoids commercial fraud and to consider the risks that might be harmful to human health safety. In recent years, with increasing consumer demand for regarding food content and it's transparency, there are some instrumental analyses emerging for determining food fraud depend on some analytical methodologies such as proteomic and metabolomics. While, fish and seafood consumed as fresh previously, within advanced technology, processed or packaged seafood consumption have increased. After processing or packaging seafood, morphological identification is impossible when some of the external features have been removed. The main fish and seafood quality-related issues are the authentications of seafood contents such as mislabelling products which may be contaminated and replacement partly or completely, by lower quality or cheaper ones. For all mentioned reasons, truthful consistent and easily applicable analytical methods are needed for assurance the correct labelling and verifying of seafood products. DNA-barcoding methods become popular robust that used in taxonomic research for endangered or cryptic species in recent years; they are used for determining food traceability also. In this review, when comparing the other proteomic and metabolic analysis, DNA-based methods are allowing a chance to identification all type of food even as raw, spiced and processed products. This privilege caused by DNA is a comparatively stable molecule than protein and other molecules. Furthermore showing variations in sequence based on different species and founding in all organisms, make DNA-based analysis more preferable. This review was performed to clarify the main advantages of using DNA-barcoding for determining seafood fraud among other techniques.Keywords: DNA-barcoding, genetic analysis, food fraud, mislabelling, packaged seafood
Procedia PDF Downloads 168311 Towards a Mandatory Frame of ADR in Divorce Cases: Key Elements from a Comparative Perspective for Belgium
Authors: Celine Jaspers
Abstract:
The Belgian legal system is slowly evolving to mandatory mediation to promote ADR. One of the reasons for this evolution is the lack of use of alternative methods in relation to their possible benefits. Especially in divorce cases, ADR can play a beneficial role in resolving disputes, since the emotional component is very much present. When children are involved, a solution provided by the parent may be more adapted to the child’s best interest than a court order. In the first part, the lack of use of voluntary ADR and the evolution toward mandatory ADR in Belgium will be indicated by sources of legislation, jurisprudence and social-scientific sources, with special attention to divorce cases. One of the reasons is lack of knowledge on ADR, despite the continuing efforts of the Belgian legislator to promote ADR. One of the last acts of ADR-promotion, was the implementation of an Act in 2018 which gives the judge the possibility to refer parties to mediation if at least one party wants to during the judicial procedure. This referral is subject to some conditions. The parties will be sent to a private mediator, recognized by the Federal Mediation Commission, to try to resolve their conflict. This means that at least one party can be mandated to try mediation (indicated as “semi-mandatory mediation”). The main goal is to establish the factors and elements that Belgium has to take into account in their further development of mandatory ADR, with consideration of the human rights perspective and the EU perspective. Furthermore it is also essential to detect some dangerous pitfalls other systems have encountered with their process design. Therefore, the second part, the comparative component, will discuss the existing framework in California, USA to establish the necessary elements, possible pitfalls and considerations the Belgian legislator can take into account when further developing the framework of mandatory ADR. The contrasting and functional method will be used to create key elements and possible pitfalls, to help Belgium improve its existing framework. The existing mandatory system in California has been in place since 1981 and is still up and running, and can thus provide valuable lessons and considerations for the Belgian system. Thirdly, the key elements from a human rights perspective and from a European Union perspective (e.g. the right to access to a judge, the right to privacy) will be discussed too, since the basic human rights and European legislation and jurisprudence play a significant part in Belgian legislation as well. The main sources for this part will be the international and European treaties, legislation, jurisprudence and soft law. In the last and concluding part, the paper will list the most important elements of a mandatory ADR-system design with special attention to the dangers of these elements (e.g. to include or exclude domestic violence cases in the mandatory ADR-framework and the consequences thereof), and with special attention for the necessary the international and European rights, prohibitions and guidelines.Keywords: Belgium, divorce, framework, mandatory ADR
Procedia PDF Downloads 155310 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 167309 Determinants of Customer Satisfaction: The case of Abyssinia Bank Customers in Addis Ababa Ethiopia
Authors: Yosef Ferede Bogale
Abstract:
The purpose of this study was to evaluate the degree of customer satisfaction and the variables influencing it in the instance of the Bank of Abyssinia branches in the districts of Arada and Bole in Addis Ababa. The study was carried out utilizing a mixed research approach and a descriptive and explanatory research design in Addis Ababa, the capital city of Ethiopia. Both primary and secondary data were employed in this investigation. The study's target population consisted of 1000 of the bank's most prestigious clients. With a 93% response rate, 265 respondents from both genders in the active age group had higher levels of education and work experience and were in the active age group. Customers of the case bank under consideration comprised the study's target audience. The respondents, who belonged to both gender groups, were in the active age bracket with superior levels of education and work experience. As a result, this investigation discovered that the degree of client satisfaction was assigned a medium rating. Additionally given a middling rating were the company's image practices, employee competency, technology, and service quality. Further, the results also demonstrate that corporate image, employees’ competency, technology, and service quality all positively and significantly affect customer happiness. This study found that, to varying degrees, company image, technology, competence, and high-quality financial services will all improve consumer happiness. According to this report, banks should monitor customer satisfaction and service quality at least twice a year. This is because there is a growing movement among bank service providers for accountability, and measuring these factors is crucial. This study also recommends that banks make every effort to satisfy consumers' expectations to the highest level.Keywords: customer satisfaction, corporate image, quality service risk, banks
Procedia PDF Downloads 123308 Immersive Environment as an Occupant-Centric Tool for Architecture Criticism and Architectural Education
Authors: Golnoush Rostami, Farzam Kharvari
Abstract:
In recent years, developments in the field of architectural education have resulted in a shift from conventional teaching methods to alternative state-of-the-art approaches in teaching methods and strategies. Criticism in architecture has been a key player both in the profession and education, but it has been mostly offered by renowned individuals. Hence, not only students or other professionals but also critics themselves may not have the option to experience buildings and rely on available 2D materials, such as images and plans, that may not result in a holistic understanding and evaluation of buildings. On the other hand, immersive environments provide students and professionals the opportunity to experience buildings virtually and reflect their evaluation by experiencing rather than judging based on 2D materials. Therefore, the aim of this study is to compare the effect of experiencing buildings in immersive environments and 2D drawings, including images and plans, on architecture criticism and architectural education. As a result, three buildings that have parametric brick facades were studied through 2D materials and in Unreal Engine v. 24 as an immersive environment among 22 architecture students that were selected using convenient sampling and were divided into two equal groups using simple random sampling. This study used mixed methods, including quantitative and qualitative methods; the quantitative section was carried out by a questionnaire, and deep interviews were used for the qualitative section. A questionnaire was developed for measuring three constructs, including privacy regulation based on Altman’s theory, the sufficiency of illuminance levels in the building, and the visual status of the view (visually appealing views based on obstructions that may have been caused by facades). Furthermore, participants had the opportunity to reflect their understanding and evaluation of the buildings in individual interviews. Accordingly, the collected data from the questionnaires were analyzed using independent t-test and descriptive analyses in IBM SPSS Statistics v. 26, and interviews were analyzed using the content analysis method. The results of the interviews showed that the participants who experienced the buildings in the immersive environment were able to have a thorough and more precise evaluation of the buildings in comparison to those who studied them through 2D materials. Moreover, the analyses of the respondents’ questionnaires revealed that there were statistically significant differences between measured constructs among the two groups. The outcome of this study suggests that integrating immersive environments into the profession and architectural education as an effective and efficient tool for architecture criticism is vital since these environments allow users to have a holistic evaluation of buildings for vigorous and sound criticism.Keywords: immersive environments, architecture criticism, architectural education, occupant-centric evaluation, pre-occupancy evaluation
Procedia PDF Downloads 134307 Silica Nanoparticles Induced Oxidative Stress and Inflammation in MRC-5 Human Lung Fibroblasts
Authors: Anca Dinischiotu, Sorina Nicoleta Voicu
Abstract:
Silica nanoparticles (SiO2-NPs) are widely used in consumer products such as paints, plastics, insulation materials, tires, concrete production, as well as in gene delivery systems and imaging procedures. Environmental human exposure to them occurs during utilization of these products, in a time-dependent manner, the uptake being by topic and inhalation route especially. SiO2-NPs enter cells and induce membrane damage, oxidative stress and inflammatory reactions in a concentration-dependent manner. In this study, MRC-5 cells (human fetal lung fibroblasts) were exposed to amorphous SiO2-NPs at a dose of 62.5 μg/ml for 24, 48 and 72 hours. The size distribution of NPs was a lognormal function, in the range 3-14 nm. A time-dependent decrease of total reduced glutathione concentration by 36%, 50%, and 78% and an increase of NO level by 62%, 32%, respectively 24% compared to control were noticed. An up-regulation of NF-kB expression by 20%, 50% respectively 10% and of Nrf-2 by 139%, 58%, and 16% compared to control after 24, 48 and 72 hours was noticed also. The expression of IL-1β, IL-6, IL-8, and COX-2 was up-regulated in a time-dependent manner. Also, the expression of MMP-2 and MMP-9 were down-regulated after 48 and 72 hours, whereas their activities raised in a time-dependent manner. Exposure of cells to NPs up-regulated the expression of inducible NO synthase, as previously was shown, and probably this is the reason for the increased level of NO, that can react with the thiol groups of reduced glutathione molecules, diminishing its concentration Nrf2 is a transcription factor translocated in nucleus, under oxidative stress, where downstream gene expression activates in order to modulate the adaptive intracellular response against oxidative stress. The cross-talk between Nrf2 and NF-kB activities regulates the inflammatory processes. The activation of NF-kB could activate up-regulation of IL-1β, IL-6, and IL-8. The increase of COX-2 expression could be correlated with IL-1β one. Also, probably in response to the pro-inflammatory cytokines, MMP-2 and MMP-9 were induced and activated. In conclusion, the exposure of MRC-5 cells to SiO2-NPs generated inflammation in a time-dependent manner.Keywords: inflammation, MRC-5 cells, oxidative stress, silica nanoparticles
Procedia PDF Downloads 146306 Determinants of Customer Satisfaction: The Case of Abyssinia Bank Customers in Addis Ababa Ethiopia
Authors: Yosef Ferede Bogale
Abstract:
The purpose of this study was to evaluate the degree of customer satisfaction and the variables influencing it in the instance of the Bank of Abyssinia branches in the districts of Arada and Bole in Addis Ababa. The study was carried out utilizing a mixed research approach and a descriptive and explanatory research design in Addis Ababa, the capital city of Ethiopia. Both primary and secondary data were employed in this investigation. The study's target population consisted of 1000 of the bank's most prestigious clients. With a 93% response rate, 265 respondents from both genders in the active age group had higher levels of education and work experience and were in the active age group. Customers of the case bank under consideration comprised the study's target audience. The respondents, who belonged to both gender groups, were in the active age bracket with superior levels of education and work experience. As a result, this investigation discovered that the degree of client satisfaction was assigned a medium rating. Additionally given a middling rating were the company's image practices, employee competency, technology, and service quality. Further, the results also demonstrate that corporate image, employees’ competency, technology, and service quality all positively and significantly affect customer happiness. This study found that, to varying degrees, company image, technology, competence, and high-quality financial services will all improve consumer happiness. According to this report, banks should monitor customer satisfaction and service quality at least twice a year. This is because there is a growing movement among bank service providers for accountability, and measuring these factors is crucial. This study also recommends that banks make every effort to satisfy consumers' expectations to the highest level.Keywords: customer satisfaction, corporate image, quality services risk, bank
Procedia PDF Downloads 62305 Evolution of Web Development Progress in Modern Information Technology
Authors: Abdul Basit Kiani
Abstract:
Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design
Procedia PDF Downloads 54304 Understanding Risky Borrowing Behavior among Young Consumers: An Empirical Study
Authors: T. Hansen
Abstract:
Many consumers are uncertain of what financial borrowing behavior may serve their interests in the best way. This is important since consumers’ risky financial decisions may not only negatively affect their short-term liquidity but may haunt them for years after they are made. Obviously, this is especially critical for young adults who often carry large amounts of student loans or credit card debt, which in turn may hinder their future ability to obtain financial healthiness. Even though factors such as financial knowledge, attitudes towards risk, gender, and motivations of borrowing, among others, are known to influence consumer borrowing behavior, no existing model comprehensibly describes the mechanisms behind young adults’ risky borrowing behavior. This is unfortunate since a better understanding of the relationships between such factors and young adults’ risky borrowing behavior may be of value to financial service providers and financial authorities aiming to improve young adults’ borrowing behavior. This research extends prior research by developing a conceptual framework for the purpose of understanding young adults’ risky borrowing behavior. The study is based on two survey samples comprising 488 young adults aged 18-25 who have not obtained a risky loan (sample 1) and 214 young adults aged 18-25 who already have obtained a risky loan (sample 2), respectively. The results suggest several psychological, sociological, and behavioral factors that may influence young adults’ intentional risky borrowing behavior, which in turn is shown to affect actualized risky borrowing behavior. We also found that the relationship between intentional risky borrowing behavior and actualized risky borrowing behavior is negatively moderated by perceived risk – but not by perceived complexity. In particular, the results of this study indicate that public policy makers, banks and financial educators should seek to eliminate less desirable social norms on how to behave financially. In addition, they should seek to enhance young adults’ risky borrowing perceived risk, thereby preventing that intentional risky borrowing behavior translates into actualized risky behavior.Keywords: financial services, risky borrowing behavior, young adults, financial knowledge, social norms, perceived risk, financial trust, public financial policy
Procedia PDF Downloads 265303 Application of Integrated Marketing Communications-Multiple, Case Studies
Authors: Yichen Lin, Hsiao-Han Chen, Chi-Chen Jan
Abstract:
Since 1990, the research area of Integrated Marketing Communications (IMC) has been presented from a different perspective. With advances in information technology and the rise of consumer consciousness, businesses are in a competitive environment. There is an urgent need to adopt more profitable and effective integrated marketing strategies to increase core competitiveness. The goal of the company's sustainable management is to increase consumers' willingness to purchase and to maximize profits. This research uses six aspects of IMC, which includes awareness integration, unified image, database integration, customer-based integration, stakeholders-based integration, and evaluation integration to examine the role of marketing strategies in the strengths and weaknesses of the six components of integrated marketing communications, their effectiveness, the most important components and the most important components that need improvement. At the same time, social media such as FaceBook, Instagram, Youtube, Line, or even TikTok have become marketing tools which firms adopt them more and more frequently in the marketing strategy. In the end of 2019, the outbreak of COVID-19 did really affect the global industries. Lockdown policies also accelerated closure of brick-mentor stores worldwide. Online purchases rose dramatically. Hence, the effectiveness of online marketing will be essential to maintain the business. This study uses multiple-case studies to extend the effects of social media and IMC. Moreover, the study would also explore the differences of social media and IMC during COVID-19. Through literature review and multiple-case studies, it is found that using social media combined with IMC did really help companies expand their business and make good connections with stakeholders. One of previous studies also used system theory to explore the interrelationship among Integrated Marketing Communication, collaborative marketing, and global brand building. Even during pandemic, firms could still maintain the operation and connect with their customers more tightly.Keywords: integration marketing communications, multiple-case studies, social media, system theory
Procedia PDF Downloads 229302 Green Crypto Mining: A Quantitative Analysis of the Profitability of Bitcoin Mining Using Excess Wind Energy
Authors: John Dorrell, Matthew Ambrosia, Abilash
Abstract:
This paper employs econometric analysis to quantify the potential profit wind farms can receive by allocating excess wind energy to power bitcoin mining machines. Cryptocurrency mining consumes a substantial amount of electricity worldwide, and wind energy produces a significant amount of energy that is lost because of the intermittent nature of the resource. Supply does not always match consumer demand. By combining the weaknesses of these two technologies, we can improve efficiency and a sustainable path to mine cryptocurrencies. This paper uses historical wind energy from the ERCOT network in Texas and cryptocurrency data from 2000-2021, to create 4-year return on investment projections. Our research model incorporates the price of bitcoin, the price of the miner, the hash rate of the miner relative to the network hash rate, the block reward, the bitcoin transaction fees awarded to the miners, the mining pool fees, the cost of the electricity and the percentage of time the miner will be running to demonstrate that wind farms generate enough excess energy to mine bitcoin profitably. Excess wind energy can be used as a financial battery, which can utilize wasted electricity by changing it into economic energy. The findings of our research determine that wind energy producers can earn profit while not taking away much if any, electricity from the grid. According to our results, Bitcoin mining could give as much as 1347% and 805% return on investment with the starting dates of November 1, 2021, and November 1, 2022, respectively, using wind farm curtailment. This paper is helpful to policymakers and investors in determining efficient and sustainable ways to power our economic future. This paper proposes a practical solution for the problem of crypto mining energy consumption and creates a more sustainable energy future for Bitcoin.Keywords: bitcoin, mining, economics, energy
Procedia PDF Downloads 33301 Autonomy in Pregnancy and Childbirth: The Next Frontier of Maternal Health Rights Advocacy
Authors: Alejandra Cardenas, Ona Flores, Fabiola Gretzinger
Abstract:
Since the 1990s, legal strategies for the promotion and protection of maternal health rights have achieved significant gains. Successful litigation in courts around the world have shown that these rights can be judicially enforceable. Governments and international organizations have acknowledged the importance of a human rights-based approach to maternal mortality and morbidity, and obstetric violence has been recognized as a human rights issue. Despite the progress made, maternal mortality has worsened in some regions of the world, while progress has stagnated elsewhere, and mistreatment in maternal care is reported almost universally. In this context, issues of maternal autonomy and decision-making during pregnancy, labor, and delivery as a critical barrier to access quality maternal health have been largely overlooked. Indeed, despite the principles of autonomy and informed consent in medical interventions being well-established in international and regional norms, how they are applied particularly during childbirth and pregnancy remains underdeveloped. National and global legal standards and decisions related to maternal health were reviewed and analyzed to determine how maternal autonomy and decision-making during pregnancy, labor, and delivery have been protected (or not) by international and national courts. The results of this legal research and analysis lead to the conclusion that a few standards have been set by courts regarding pregnant people’s rights to make choices during pregnancy and birth; however, most undermine the agency of pregnant people. These decisions recognize obstetric violence and gender-based discrimination, but fail to protect pregnant people’s autonomy, privacy, and their right to informed consent. As current human rights standards stand today, maternal health is the only field in medicine and law in which informed consent can be overridden, and patients can be forced to submit to treatments against their will. Unconsented treatment and loss of agency during pregnancy and childbirth can have long-term physical and mental impacts, reduce satisfaction and trust in health systems, and may deter future health-seeking behaviors. This research proposes a path forward that focuses on the pregnant person as an independent agent, relying on the doctrine of self-determination during pregnancy and childbirth, which includes access to the necessary conditions to enable autonomy and choice throughout pregnancy and childbirth as a critical step towards our approaches to reduce maternal mortality, morbidity, and mistreatment, and realize the promise of access to quality maternal health as a human right.Keywords: autonomy in childbirth and pregnancy, choice, informed consent, jurisprudential analysis
Procedia PDF Downloads 52300 Generalized Synchronization in Systems with a Complex Topology of Attractor
Authors: Olga I. Moskalenko, Vladislav A. Khanadeev, Anastasya D. Koloskova, Alexey A. Koronovskii, Anatoly A. Pivovarov
Abstract:
Generalized synchronization is one of the most intricate phenomena in nonlinear science. It can be observed both in systems with a unidirectional and mutual type of coupling including the complex networks. Such a phenomenon has a number of practical applications, for example, for the secure information transmission through the communication channel with a high level of noise. Known methods for the secure information transmission needs in the increase of the privacy of data transmission that arises a question about the observation of such phenomenon in systems with a complex topology of chaotic attractor possessing two or more positive Lyapunov exponents. The present report is devoted to the study of such phenomenon in two unidirectionally and mutually coupled dynamical systems being in chaotic (with one positive Lyapunov exponent) and hyperchaotic (with two or more positive Lyapunov exponents) regimes, respectively. As the systems under study, we have used two mutually coupled modified Lorenz oscillators and two unidirectionally coupled time-delayed generators. We have shown that in both cases the generalized synchronization regime can be detected by means of the calculation of Lyapunov exponents and phase tube approach whereas due to the complex topology of attractor the nearest neighbor method is misleading. Moreover, the auxiliary system approaches being the standard method for the synchronous regime observation, for the mutual type of coupling results in incorrect results. To calculate the Lyapunov exponents in time-delayed systems we have proposed an approach based on the modification of Gram-Schmidt orthogonalization procedure in the context of the time-delayed system. We have studied in detail the mechanisms resulting in the generalized synchronization regime onset paying a great attention to the field where one positive Lyapunov exponent has already been become negative whereas the second one is a positive yet. We have found the intermittency here and studied its characteristics. To detect the laminar phase lengths the method based on a calculation of local Lyapunov exponents has been proposed. The efficiency of the method has been verified using the example of two unidirectionally coupled Rössler systems being in the band chaos regime. We have revealed the main characteristics of intermittency, i.e. the distribution of the laminar phase lengths and dependence of the mean length of the laminar phases on the criticality parameter, for all systems studied in the report. This work has been supported by the Russian President's Council grant for the state support of young Russian scientists (project MK-531.2018.2).Keywords: complex topology of attractor, generalized synchronization, hyperchaos, Lyapunov exponents
Procedia PDF Downloads 275299 Variability Parameters for Growth and Yield Characters in Fenugreek, Trigonella spp. Genotypes
Authors: Anita Singh, Richa Naula, Manoj Raghav
Abstract:
India is a leading producer and consumer of fenugreek for its culinary uses and medicinal application. In India, most of the people are of vegetarian class. In such a situation, a leafy vegetable, such as fenugreek is of chief concern due to its high nutritional property, medicinal values and industrial uses. One of the most important factors restricting their large scale production and development of superior varieties is that very scanty knowledge about their genetic diversity, inter and intraspecific variability and genetic relationship among the species. Improvement of the crop depends upon the magnitude of genetic variability for economic characters. Therefore, the present research work was carried out to analyse the variability parameters for growth and yield character in twenty-eight fenugreek genotypes along with two standard checks Pant Ragini and Pusa Early Bunching. The experiment was laid out in Randomized Block Design with three replication during rabi season 2015-2016 at Pantnagar Centre for Plant Genetic Resources, G.B. Pant University of Agriculture and Technology, Pantnagar, Uttarakhand. The analysis of variance revealed highly significant differences among all the genotypes for all traits. High genotypic and phenotypic coefficient variation were observed for characters, namely the number of primary branches per plant, number of leaves at 30, 45 and 60 DAS, green leaf yield per plant, green leaf yield q/ha . The genetic advance recorded highest in green leaf yield q/ha (33.93) followed by green leaf yield per plant (21.20g). Highest percent of heritability were shown by 1000 seed weight (99.12%) followed by the number of primary branches per plant (97.18%). Green leaf yield q/ha showed high heritability and high genetic advance. These superior genotypes can be further used in crop improvement programs of fenugreek.Keywords: genetic advance, genotypic coefficient variation, heritability, phenotypic coefficient variation
Procedia PDF Downloads 321298 Volatile Compounds and Sensory Characteristics of Herbal Teas and Bush Tea Blends with Selected Herbal Teas South Africa
Authors: Florence Malongane, Lyndy J. McGaw, Legesse K. Debusho, Fhatuwani N. Mudau
Abstract:
Rooibos (Aspalathus linearis (Burm.f.) R.Dahlgren), honeybush (Cyclopia Vent. species), bush tea (Athrixia phylicoides DC.) and special tea (Monsonia burkeana) are traditionally consumed herbal teas in South Africa. The volatile and sensory qualities of rooibos and honeybush tea have previously been described although there is a dearth of information regarding the sensory attributes and volatile compounds analysis of special tea and bush tea. The objective of this study was to describe the sensory properties, compare the differences in descriptive sensory analysis (DSA) and volatile compounds of bush tea, special, rooibos, honeybush and the blend of bush tea with special, honeybush and rooibos in a 1:1 ratio and subsequently to determine the influence of blending bush tea with other herbal teas. DSA was used to assess the sensory attributes of the teas while gas chromatography–mass spectrometry (GC-MS) was used to quantitatively determine the volatile components of the teas. Rooibos tea and honeybush tea had an overall sweet-caramel, honey-sweet, perfume floral and woody aroma with slight astringency, consistent with the taste and aftertaste attributes. In contrast, bush tea and special tea depicted green-cut grass, dry green herbal, cooked spinach aroma as well as taste and aftertaste characteristics. GC-MS analyses revealed that the seven tea samples had similar major volatiles, including 2-furanmethanol, 2-methoxy-4-vinylphenol, acetic acid, D-limonene terpene and phytol. Cluster analysis revealed that the sweet and woody flavour of honeybush and rooibos were ascribed to the presence of á-myrcene, phenylethyl alcohol, phytol and vanillin. The bitter, medicinal flavour attributes of special tea were attributed to (-)-carvone. Blending of bush tea with rooibos and honeybush tea toned down its aversive flavour components, typically the bitter, green-cut grass and herbal properties, thus minimising the possibility of consumer aversion.Keywords: bush tea, rooibos tea, honeybush tea, sensory, volatile compounds
Procedia PDF Downloads 181297 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0
Authors: Harris Niavis, Dimitra Politaki
Abstract:
The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.Keywords: blockchain, data quality, industry4.0, product quality
Procedia PDF Downloads 189296 Development of Low Calorie Jelly with Increased Content of Natural Compounds from Superfoods with No Added Sugar
Authors: Liana C. Salanță, Maria Tofană, Carmen R. Pop, Vlad Mureșan
Abstract:
The landscape of functional food is expanding very fast, due to the consumer interest for healthy natural products. Consumers nowadays demand healthy products that impart phytonutrients to encourage good health and well-being, prevent diseases, without sacrificing taste and texture. Candies are foodstuffs appreciated by all category of consumers. They are available in a range variety of forms (jellies, marshmallows, caramels, lollipops, etc.). Jelly is characterized by a gummy and chewy texture typically conferred by a hydrocolloid (gelatin, pectin). The purpose of this research was to obtain hypocaloric jelly (no added sugar) enriched with protein powder from acai, chia seeds and hemp, which are considered superfood. Peach and raspberry juice were used for obtaining functional jelly, due to the specific flavour, natural carbohydrate, natural pigments and vitamins (C, B1, PP, etc). Instead of classic hydrocolloids used in Romania for the industry of jelly, agar-agar was used in this study, due to its properties. Agar-agar is able to form gels in the aqueous medium, stronger than other gel-forming agents. High sugar concentrations or an acid environment (as is necessary with pectins) are not needed. In addition to its gelation properties, Agar-agar is considered to have important nutritional benefits, high content of fibre and has low calories. Six prototypes of jellies were obtained and evaluated by physicochemical, microbiological and sensorial analysis. For the textural profile analysis, the Brookfield CT3 Texture Analyzer, equipped with a 10kg load cell, was used. The results revealed that hypocaloric jelly can serve as a good source of bioactive compounds in the diet. The jelly is a convenient way of delivering potential health benefits of protein powder and agar-agar to a wide range of consumers.Keywords: agar-agar, functional food, hypocaloric jelly, superfoods
Procedia PDF Downloads 126295 The Effect of Technology on International Marketing Trading Researches and Analysis
Authors: Karim Monir Halim Salib
Abstract:
The article discusses the use of modern technology to achieve environmental marketing goals in business and customer relations. The purpose of this article is to show the possibilities of the application of modern technology. In B2C relationships, marketing departments face challenges arising from the need to quickly segment customers and share information across multiple systems, which seriously hinders the achievement of marketing objectives. Therefore, the Article states that modern IT solutions are used in the marketing of business activities, taking into account environmental objectives. For this reason, its importance in the economic and social development of developing countries has increased. While traditional companies emphasize profit as the most important business principle, social enterprises have to address social issues at the expense of profit. This mindset gives social enterprises more than traditional businesses to meet the needs of those at the bottom of the pyramid. This also poses a great challenge for social business, as social business works for the public good on the one hand and financial stability on the other. Otherwise, the company cannot be evacuated. Cultures are involved in business communication and research. Using the example of language in international relations, the article poses the problem of cultural discourse in management and linguistic and cultural studies. After reviewing current research on language in international relations, this article presents communication methods in the international economy from a linguistic perspective and attempts to explain communication problems in business from the perspective of linguistic research. A step towards multidisciplinary research combining research in management and linguistics.Keywords: international marketing, marketing mix, marketing research, small and medium-sized enterprises, strategic marketing, B2B digital marketing strategy, digital marketing, digital marketing maturity model, SWOT analysis consumer behavior, experience, experience marketing, marketing employee organizational performance, internal marketing, internal customer, direct marketing, mobile phones mobile marketing, Sms advertising.
Procedia PDF Downloads 41294 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)
Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram
Abstract:
The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)
Procedia PDF Downloads 95293 Planning the Journey of Unifying Medical Record Numbers in Five Facilities and the Expected Challenges: Case Study in Saudi Arabia
Authors: N. Al Khashan, H. Al Shammari, W. Al Bahli
Abstract:
Patients who are eligible to receive treatment at the National Guard Health Affairs (NGHA), Saudi Arabia will typically have four medical record numbers (MRN), one in each of the geographical areas. More hospitals and primary healthcare facilities in other geographical areas will launch soon which means more MRNs. When patients own four MRNs, this will cause major drawbacks in patients’ quality of care such as creating new medical files in different regions for relocated patients and using referral system among regions. Consequently, the access to a patient’s medical record from other regions and the interoperability of health information between the four hospitals’ information system would be challenging. Thus, there is a need to unify medical records among these five facilities. As part of the effort to increase the quality of care, a new Hospital Information Systems (HIS) was implemented in all NGHA facilities by the end of 2016. NGHA’s plan is put to be aligned with the Saudi Arabian national transformation program 2020; whereby 70% citizens and residents of Saudi Arabia would have a unified medical record number that enables transactions between multiple Electronic Medical Records (EMRs) vendors. The aim of the study is to explore the plan, the challenges and barriers of unifying the 4 MRNs into one Enterprise Patient Identifier (EPI) in NGHA hospitals by December 2018. A descriptive study methodology was used. A journey map and a project plan are created to be followed by the project team to ensure a smooth implementation of the EPI. It includes the following: 1) Approved project charter, 2) Project management plan, 3) Change management plan, 4) Project milestone dates. Currently, the HIS is using the regional MRN. Therefore, the HIS and all integrated health care systems in all regions will need modification to move from MRN to EPI without interfering with patient care. For now, the NGHA have successfully implemented an EPI connected with the 4 MRNs that work in the back end in the systems’ database.Keywords: consumer health, health informatics, hospital information system, universal medical record number
Procedia PDF Downloads 196292 Satellite Derived Evapotranspiration and Turbulent Heat Fluxes Using Surface Energy Balance System (SEBS)
Authors: Muhammad Tayyab Afzal, Muhammad Arslan, Mirza Muhammad Waqar
Abstract:
One of the key components of the water cycle is evapotranspiration (ET), which represents water consumption by vegetated and non-vegetated surfaces. Conventional techniques for measurements of ET are point based and representative of the local scale only. Satellite remote sensing data with large area coverage and high temporal frequency provide representative measurements of several relevant biophysical parameters required for estimation of ET at regional scales. The objective is of this research is to exploit satellite data in order to estimate evapotranspiration. This study uses Surface Energy Balance System (SEBS) model to calculate daily actual evapotranspiration (ETa) in Larkana District, Sindh Pakistan using Landsat TM data for clouds-free days. As there is no flux tower in the study area for direct measurement of latent heat flux or evapotranspiration and sensible heat flux, therefore, the model estimated values of ET were compared with reference evapotranspiration (ETo) computed by FAO-56 Penman Monteith Method using meteorological data. For a country like Pakistan, agriculture by irrigation in the river basins is the largest user of fresh water. For the better assessment and management of irrigation water requirement, the estimation of consumptive use of water for agriculture is very important because it is the main consumer of water. ET is yet an essential issue of water imbalance due to major loss of irrigation water and precipitation on cropland. As large amount of irrigated water is lost through ET, therefore its accurate estimation can be helpful for efficient management of irrigation water. Results of this study can be used to analyse surface conditions, i.e. temperature, energy budgets and relevant characteristics. Through this information we can monitor vegetation health and suitable agricultural conditions and can take controlling steps to increase agriculture production.Keywords: SEBS, remote sensing, evapotranspiration, ETa
Procedia PDF Downloads 333291 Development and Psychometric Validation of the Hospitalised Older Adults Dignity Scale for Measuring Dignity during Acute Hospital Admissions
Authors: Abdul-Ganiyu Fuseini, Bernice Redley, Helen Rawson, Lenore Lay, Debra Kerr
Abstract:
Aim: The study aimed to develop and validate a culturally appropriate patient-reported outcome measure for measuring dignity for older adults during acute hospital admissions. Design: A three-phased mixed-method sequential exploratory design was used. Methods: Concept elicitation and generation of items for the scale was informed by older adults’ perspectives about dignity during acute hospitalization and a literature review. Content validity evaluation and pre-testing were undertaken using standard instrument development techniques. A cross-sectional survey design was conducted involving 270 hospitalized older adults for evaluation of construct and convergent validity, internal consistency reliability, and test–retest reliability of the scale. Analysis was performed using Statistical Package for the Social Sciences, version 25. Reporting of the study was guided by the Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) checklist. Results: We established the 15-item Hospitalized Older Adults’ Dignity Scale that has a 5-factor structure: Shared Decision-Making (3 items); Healthcare Professional-Patient Communication (3 items); Patient Autonomy (4 items); Patient Privacy (2 items); and Respectful Care (3 items). Excellent content validity, adequate construct and convergent validity, acceptable internal consistency reliability, and good test-retest reliability were demonstrated. Conclusion: We established the Hospitalized Older Adults Dignity Scale as a valid and reliable scale to measure dignity for older adults during acute hospital admissions. Future studies using confirmatory factor analysis are needed to corroborate the dimensionality of the factor structure and external validity of the scale. Routine use of the scale may provide information that informs the development of strategies to improve dignity-related care in the future. Impact: The development and validation of the Hospitalized Older Adults Dignity Scale will provide healthcare professionals with a feasible and reliable scale for measuring older adults’ dignity during acute hospitalization. Routine use of the scale may enable the capturing and incorporation of older patients’ perspectives about their healthcare experience and provide information that informs the development of strategies to improve dignity-related care in the future.Keywords: dignity, older adults, hospitalisation, scale, patients, dignified care, acute care
Procedia PDF Downloads 90290 Corn Flakes Produced from Different Cultivars of Zea Mays as a Functional Product
Authors: Milenko Košutić, Jelena Filipović, Zvonko Nježić
Abstract:
Extrusion technology is thermal processing that is applied to improve the nutritional, hygienic, and physical-chemical characteristics of the raw material. Overall, the extrusion process is an efficient method for the production of a wide range of food products. It combines heat, pressure, and shear to transform raw materials into finished goods with desired textures, shapes, and nutritional profiles. The extruded products’ quality is remarkably dependent upon feed material composition, barrel temperature profile, feed moisture content, screw speed, and other extrusion system parameters. Given consumer expectations for snack foods, a high expansion index and low bulk density, in addition to crunchy texture and uniform microstructure, are desired. This paper investigates the effects of simultaneous different types of corn (white corn, yellow corn, red corn, and black corn) addition and different screw speed (350, 500, 650 rpm) on the physical, technological, and functional properties of flakes products. Black corn flour and screw speed at 350 rpm positively influenced physical, technological characteristics, mineral composition, and antioxidant properties of flake products with the best total score analysis of 0,59. Overall, the combination of Tukey's HSD test and PCA enables a comprehensive analysis of the observed corn products, allowing researchers to identify them. This research aims to analyze the influence of different types of corn flour (white corn, yellow corn, red corn, and black corn) on the nutritive and sensory properties of the product (quality, texture, and color), as well as the acceptance of the new product by consumers on the territory of Novi Sad. The presented data point that investigated corn flakes from black corn flour at 350 rpm is a product with good physical-technological and functional properties due to a higher level of antioxidant activity.Keywords: corn types, flakes product, nutritive quality, acceptability
Procedia PDF Downloads 57289 The Effect of the Combination of Mouthwash and Saliva Substitutes on Tooth Erosion: An in Vitro Study
Authors: Young-Eun Jang, Mi-Hye Ma, Yemi Kim
Abstract:
As the elderly population increases, the number of patients complaining of dry mouth is also increasing. Elderly people often use mouthwash to prevent periodontal disease. Mouthwash and saliva substitutes with low pH were reported to be able to cause enamel erosion. To the best of our knowledge, there have been no studies showing the effect of mouthwash on patients using saliva substitutes. Therefore, the purpose of this study was to evaluate the effect of the use of mouthwash in combination with saliva substitutes on tooth erosion using a quantitative light-induced fluorescence-digital (QLF-D) system. A total of 96 bovine specimens were embedded in putty blocks and randomly allocated to the following groups with n = 12 each: Group 1, application of mouthwash; Group 2, application of saliva substitutes; Group 3, application of saliva substitutes in combination with mouthwash; and control group, application of saline. The bovine samples were eroded using a demineralization solution and then saliva substitutes and mouthwash were applied according to the groups for 2 weeks. For saliva substitutes, three different products were used; Oasis (Oasis Consumer Health, Cleveland, OH, USA), Xeromia solution (Osstem Pharma Co., Seoul, Korea), and Drymund gel (Dong-A Pharma Co., Seoul, Korea). The pH values of the saliva substitutes were determined using a pH meter. Loss of enamel and root dentin was measured using the QLF-D system immediately after demineralization on the 3rd, 7th, and 14th days. The data were analyzed using repeated measures ANOVA followed by Tukey’s post hoc tests (p < 0.05). Mineral loss in enamel and root dentin was detected when mouthwash and saliva substitutes were used alone, respectively (p < 0.05). Also, when mouthwash was used with saliva substitutes, the mineral loss was observed in enamel and root dentin (p < 0.05). The use of Xeromia and Drymund gel increased mineral loss of enamel significantly compared to the use of Oasis (p < 0.05). However, when Drymund gel and Xeromia were used in combination with mouthwash, mineral loss of enamel was significantly reduced compared to when they were used alone (p < 0.05). The pH values of Drymund gel, Xeromia, Oasis, and mouthwash were 5.5, 5.52, 6.2, and 6.37, respectively. Based on these results, it can be concluded that the use of mouthwash with a higher pH value than that of saliva substitutes could help patients suffering from xerostomia avoid the risk of dental erosion.Keywords: saliva substitute, mouthwash, tooth erosion, dry mouth
Procedia PDF Downloads 90288 Assessment of Land Suitability for Tea Cultivation Using Geoinformatics in the Mansehra and Abbottabad District, Pakistan
Authors: Nasir Ashraf, Sajid Rahid Ahmad, Adeel Ahmad
Abstract:
Pakistan is a major tea consumer country and ranked as the third largest importer of tea worldwide. Out of all beverage consumed in Pakistan, tea is the one with most demand for which tea import is inevitable. Being an agrarian country, Pakistan should cultivate its own tea and save the millions of dollars cost from tea import. So the need is to identify the most suitable areas with favorable weather condition and suitable soils where tea can be planted. This research is conducted over District Mansehra and District Abbottabad in Khyber Pakhtoonkhwah Province of Pakistan where the most favorable conditions for tea cultivation already exist and National Tea Research Institute has done successful experiments to cultivate high quality tea. High tech approach is adopted to meet the objectives of this research by using the remotely sensed data i.e. Aster DEM, Landsat8 Imagery. The Remote Sensing data was processed in Erdas Imagine, Envi and further analyzed in ESRI ArcGIS spatial analyst for final results and representation of result data in map layouts. Integration of remote sensing data with GIS provided the perfect suitability analysis. The results showed that out of all study area, 13.4% area is highly suitable while 33.44% area is suitable for tea plantation. The result of this research is an impressive GIS based outcome and structured format of data for the agriculture planners and Tea growers. Identification of suitable tea growing areas by using remotely sensed data and GIS techniques is a pressing need for the country. Analysis of this research lets the planners to address variety of action plans in an economical and scientific manner which can lead tea production in Pakistan to meet demand. This geomatics based model and approach may be used to identify more areas for tea cultivation to meet our demand which we can reduce by planting our own tea, and our country can be independent in tea production.Keywords: agrarian country, GIS, geoinformatics, suitability analysis, remote sensing
Procedia PDF Downloads 388287 Tourist Behavior Towards Blockchain-Based Payments
Authors: A. Šapkauskienė, A. Mačerinskienė, R. Andrulienė, R. Bruzgė, S. Masteika, K. Driaunys
Abstract:
The COVID-19 pandemic has affected not only world markets and economies but also the daily lives of customers and their payment habits. The pandemic has accelerated the digital transformation, so the role of technology will become even more important post-COVID. Although the popularity of cryptocurrencies has reached unprecedented heights, there are still obstacles, such as a lack of consumer experience and distrust of these technologies, so exploring the role of cryptocurrency and blockchain in the context of international travel becomes extremely important. Research on tourists’ intentions to use cryptocurrencies for payment purposes is limited due to the small number of research studies. To fill this research gap, an exploratory study based on the analysis of survey data was conducted. The purpose of the research is to explore how the behavior of tourists has changed making their financial transactions when paying for the tourism services in order to determine the intention to pay in cryptocurrencies. Behavioral intention can be examined as a dependent variable that is useful for the study of the acceptance of blockchain as cutting-edge technology. Therefore, this study examines the intention of travelers to use cryptocurrencies in electronic payments for tourism services. Several studies have shown that the intention to accept payments in a cryptocurrency is affected by the perceived usefulness of these payments and the perceived ease of use. The findings deepen our understanding of the readiness of service users to apply for blockchain-based payment in the tourism sector. The tourism industry has to focus not only on the technology but on consumers who can use cryptocurrencies, creating new possibilities and increasing business competitiveness. Based on research results, suggestions are made to guide future research on the use of cryptocurrencies by tourists in the tourism industry. Therefore, in line with the rapid expansion of virtual currency users, market capitalization, and payment in cryptographic currencies, it is necessary to explore the possibilities of implementing a blockchain-based system aiming to promote the use of services in the tourism sector as the most affected by the pandemic.Keywords: behavioral intention, blockchain-based payment, cryptocurrency, tourism
Procedia PDF Downloads 105286 Improving the Logistic System to Secure Effective Food Fish Supply Chain in Indonesia
Authors: Atikah Nurhayati, Asep A. Handaka
Abstract:
Indonesia is a world’s major fish producer which can feed not only its citizens but also the people of the world. Currently, the total annual production is 11 tons and expected to double by the year of 2050. Given the potential, fishery has been an important part of the national food security system in Indonesia. Despite such a potential, a big challenge is facing the Indonesians in making fish the reliable source for their food, more specifically source of protein intake. The long geographic distance between the fish production centers and the consumer concentrations has prevented effective supply chain from producers to consumers and therefore demands a good logistic system. This paper is based on our research, which aimed at analyzing the fish supply chain and is to suggest relevant improvement to the chain. The research was conducted in the Year of 2016 in selected locations of Java Island, where intensive transaction on fishery commodities occur. Data used in this research comprises secondary data of time series reports on production and distribution and primary data regarding distribution aspects which were collected through interviews with purposively selected 100 respondents representing fishers, traders and processors. The data were analyzed following the supply chain management framework and processed following logistic regression and validity tests. The main findings of the research are as follows. Firstly, it was found that improperly managed connectivity and logistic chain is the main cause for insecurity of availability and affordability for the consumers. Secondly, lack of quality of most local processed products is a major obstacle for improving affordability and connectivity. The paper concluded with a number of recommended strategies to tackle the problem. These include rationalization of the length of the existing supply chain, intensification of processing activities, and improvement of distribution infrastructure and facilities.Keywords: fishery, food security, logistic, supply chain
Procedia PDF Downloads 241285 From Battles to Balance and Back: Document Analysis of EU Copyright in the Digital Era
Authors: Anette Alén
Abstract:
Intellectual property (IP) regimes have traditionally been designed to integrate various conflicting elements stemming from private entitlement and the public good. In IP laws and regulations, this design takes the form of specific uses of protected subject-matter without the right-holder’s consent, or exhaustion of exclusive rights upon market release, and the like. More recently, the pursuit of ‘balance’ has gained ground in the conceptualization of these conflicting elements both in terms of IP law and related policy. This can be seen, for example, in European Union (EU) copyright regime, where ‘balance’ has become a key element in argumentation, backed up by fundamental rights reasoning. This development also entails an ever-expanding dialogue between the IP regime and the constitutional safeguards for property, free speech, and privacy, among others. This study analyses the concept of ‘balance’ in EU copyright law: the research task is to examine the contents of the concept of ‘balance’ and the way it is operationalized and pursued, thereby producing new knowledge on the role and manifestations of ‘balance’ in recent copyright case law and regulatory instruments in the EU. The study discusses two particular pieces of legislation, the EU Digital Single Market (DSM) Copyright Directive (EU) 2019/790 and the finalized EU Artificial Intelligence (AI) Act, including some of the key preparatory materials, as well as EU Court of Justice (CJEU) case law pertaining to copyright in the digital era. The material is examined by means of document analysis, mapping the ways ‘balance’ is approached and conceptualized in the documents. Similarly, the interaction of fundamental rights as part of the balancing act is also analyzed. Doctrinal study of law is also employed in the analysis of legal sources. This study suggests that the pursuit of balance is, for its part, conducive to new battles, largely due to the advancement of digitalization and more recent developments in artificial intelligence. Indeed, the ‘balancing act’ rather presents itself as a way to bypass or even solidify some of the conflicting interests in a complex global digital economy. Indeed, such a conceptualization, especially when accompanied by non-critical or strategically driven fundamental rights argumentation, runs counter to the genuine acknowledgment of new types of conflicting interests in the copyright regime. Therefore, a more radical approach, including critical analysis of the normative basis and fundamental rights implications of the concept of ‘balance’, is required to readjust copyright law and regulations for the digital era. Notwithstanding the focus on executing the study in the context of the EU copyright regime, the results bear wider significance for the digital economy, especially due to the platform liability regime in the DSM Directive and with the AI Act including objectives of a ‘level playing field’ whereby compliance with EU copyright rules seems to be expected among system providers.Keywords: balance, copyright, fundamental rights, platform liability, artificial intelligence
Procedia PDF Downloads 31284 Effect of Phthalates on Male Infertility: Myth or Truth?
Authors: Rashmi Tomar, A. Srinivasan, Nayan K. Mohanty, Arun K. Jain
Abstract:
Phthalates have been used as additives in industrial products since the 1930s, and are universally considered to be ubiquitous environmental contaminants. The general population is exposed to phthalates through consumer products, as well as diet and medical treatments. Animal studies showing the existence of an association between some phthalates and testicular toxicity have generated public and scientific concern about the potential adverse effects of environmental changes on male reproductive health. Unprecedented declines in fertility rates and semen quality have been reported during the last half of the 20th century in developed countries and increasing interest exists on the potential relationship between exposure to environmental contaminants, including phthalates, and human male reproductive health Studies. Phthalates may be associated with altered endocrine function and adverse effects on male reproductive development and function, but human studies are limited. The aim of the present study was detection of phthalate compounds, estimation of their metabolites in infertile & fertile male. Blood and urine samples were collected from 150 infertile patients & 75 fertile volunteers recruited through Department of Urology, Safdarjung Hospital, New Delhi. Blood have been collected in separate glass tubes from the antecubital vein of the patients, serum have been separate and estimate the phthalate level in serum samples by Gas Chromatography / Mass Spectrometry using NIOSH / OSHA detailed protocol. Urine of Infertile & Fertile Subjects was collected & extracted using solid phase extraction method, analysis by HPLC. In conclusion, to the best of our knowledge the present study based on human is first to show the presence of phthalate in human serum samples and their metabolites in urine samples. Significant differences were observed between several phthalates in infertile and fertile healthy individuals.Keywords: Gas Chromatography, HPLC, male infertility, phthalates, serum, toxicity, urine
Procedia PDF Downloads 363