Search results for: information management systems
23321 Potential of Comparative Management and Aspects of Its Application in Georgia
Authors: Evgeni Baratashvili, Nino Pailodze, Ana Bolkvadze, Giorgi Sulashvili
Abstract:
At the present stage in our country intensifies cooperation with different business cultures, actively developing the process of implementation of Georgia in the global business system that requires us to develop a specific concept, including in the field of management. With the entry of Georgia into the international community, exchange of experience will only intensify. It is clear that the achievement of goals such as the doubling of the National Product increase the competitiveness of Georgian enterprises can’t be recorded without foreign management experience. On the other hand, knowledge of the areas of comparative management can be used in the process of choosing the path of socio-economic development of Georgia.Keywords: business cultures, comparative management, corporate culture, Georgian business, Anglo-Saxon model, Georgian civilization, anti-capitalist mentality, culture management
Procedia PDF Downloads 47023320 Knowledge Sharing in Virtual Community: Societal Culture Considerations
Authors: Shahnaz Bashir, Abel Usoro, Imran Khan
Abstract:
Hofstede’s culture model is an important model to study culture between different societies. He collected data from world-wide and performed a comprehensive study. Hofstede’s cultural model is widely accepted and has been used to study cross cultural influences in different areas like cross-cultural psychology, cross cultural management, information technology, and intercultural communication. This study investigates the societal cultural aspects of knowledge sharing in virtual communities.Keywords: knowledge management, knowledge sharing, societal culture, virtual communities
Procedia PDF Downloads 40323319 Management Accounting Revolution: Developed and Developing Country
Authors: Puwanenthiren Pratheepkanth
Abstract:
The main aim of this paper is to analyse existing literature (1960 -2016) on management accounting revolution by firms in a comparative perspective to see whether any differences between developed and developing countries context. The significant role that management accounting practices play in corporate finance is well established by reams of research articles. The study reveals that there are clear limitations to the literature review, it suggests that a majority of management accounting practices’ studies are focused on developed markets and that there is a scarcity of serious analyses of the situation in emerging markets.Keywords: developed countries, developing countries, literature review, management accounting practices
Procedia PDF Downloads 27723318 Service Information Integration Platform as Decision Making Tools for the Service Industry Supply Chain-Indonesia Service Integration Project
Authors: Haikal Achmad Thaha, Pujo Laksono, Dhamma Nibbana Putra
Abstract:
Customer service is one of the core interest in a service sector of a company, whether as the core business or as service part of the operation. Most of the time, the people and the previous research in service industry is focused on finding the best business model solution for the service sector, usually to decide between total in house customer service, outsourcing, or something in between. Conventionally, to take this decision is some important part of the management job, and this is a process that usually takes some time and staff effort, meanwhile market condition and overall company needs may change and cause loss of income and temporary disturbance in the companies operation . However, in this paper we have offer a new concept model to assist decision making process in service industry. This model will featured information platform as central tool to integrate service industry operation. The result is service information model which would ideally increase response time and effectivity of the decision making. it will also help service industry in switching the service solution system quickly through machine learning when the companies growth and the service solution needed are changing.Keywords: service industry, customer service, machine learning, decision making, information platform
Procedia PDF Downloads 62023317 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 5923316 Study of Management of Waste Construction Materials in Civil Engineering Projects
Authors: Jalindar R. Patil, Harish P. Gayakwad
Abstract:
The increased economic growth across the globe as well as urbanization in developing countries have led into extensive construction activities that generate large amounts of wastes. Material wastage in construction projects resulted into huge financial setbacks to builders and contractors. In addition to this, it may also cause significant effects over aesthetics, health, and the general environment. However in many cities across the globe where construction wastes material management is still a problem. In this paper, the discussion is all about the method for the management of waste construction materials. The objectives of this seminar are to identify the significant source of construction waste globally, to improve the performance of by extracting the major barriers construction waste management and to determine the cost impact on the construction project. These wastes needs to be managed as well as their impacts needs to be ascertained to pave way for their proper management. The seminar includes the details of construction waste management with the reference to construction project. The application of construction waste management in the civil engineering projects is to describe the reduction in the construction wastes.Keywords: civil engineering, construction materials, waste management, construction activities
Procedia PDF Downloads 52823315 Using Technology to Enhance the Student Assessment Experience
Authors: Asim Qayyum, David Smith
Abstract:
The use of information tools is a common activity for students of any educational stage when they encounter online learning activities. Finding the relevant information for particular learning tasks is the topic of this paper as it investigates the use of information tools for a group of student participants. The paper describes and discusses the results with particular implications for use in higher education, and the findings suggest that improvement in assessment design and subsequent student learning may be achieved by structuring the purposefulness of information tools usage and online reading behaviors of university students.Keywords: information tools, assessment, online learning, student assessment experience
Procedia PDF Downloads 55723314 Closed Greenhouse Production Systems for Smart Plant Production in Urban Areas
Authors: U. Schmidt, D. Dannehl, I. Schuch, J. Suhl, T. Rocksch, R. Salazar-Moreno, E. Fitz-Rodrigues, A. Rojano Aquilar, I. Lopez Cruz, G. Navas Gomez, R. A. Abraham, L. C. Irineo, N. G. Gilberto
Abstract:
The integration of agricultural production systems into urban areas is a challenge for the coming decades. Because of increasing greenhouse gas emission and rising resource consumption as well as costs in animal husbandry, the dietary habits of people in the 21st century have to focus on herbal foods. Intensive plant cultivation systems in large cities and megacities require a smart coupling of information, material and energy flow with the urban infrastructure in terms of Horticulture 4.0. In recent years, many puzzle pieces have been developed for these closed processes at the Humboldt University. To compile these for an urban plant production, it has to be optimized and networked with urban infrastructure systems. In the field of heat energy production, it was shown that with closed greenhouse technology and patented heat exchange and storage technology energy can be provided for heating and domestic hot water supply in the city. Closed water circuits can be drastically reducing the water requirements of plant production in urban areas. Ion sensitive sensors and new disinfection methods can help keep circulating nutrient solutions in the system for a longer time in urban plant production greenhouses.Keywords: semi closed, greenhouses, urban farming, solar heat collector, closed water cycles, aquaponics
Procedia PDF Downloads 33023313 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 13923312 Formal Implementation of Routing Information Protocol Using Event-B
Authors: Jawid Ahmad Baktash, Tadashi Shiroma, Tomokazu Nagata, Yuji Taniguchi, Morikazu Nakamura
Abstract:
The goal of this paper is to explore the use of formal methods for Dynamic Routing, The purpose of network communication with dynamic routing is sending a massage from one node to others by using pacific protocols. In dynamic routing connections are possible based on protocols of Distance vector (Routing Information Protocol, Border Gateway protocol), Link State (Open Shortest Path First, Intermediate system Intermediate System), Hybrid (Enhanced Interior Gateway Routing Protocol). The responsibility for proper verification becomes crucial with Dynamic Routing. Formal methods can play an essential role in the Routing, development of Networks and testing of distributed systems. Event-B is a formal technique consists of describing rigorously the problem; introduce solutions or details in the refinement steps to obtain more concrete specification, and verifying that proposed solutions are correct. The system is modeled in terms of an abstract state space using variables with set theoretic types and the events that modify state variables. Event-B is a variant of B, was designed for developing distributed systems. In Event-B, the events consist of guarded actions occurring spontaneously rather than being invoked. The invariant state properties must be satisfied by the variables and maintained by the activation of the events.Keywords: dynamic rout RIP, formal method, event-B, pro-B
Procedia PDF Downloads 40023311 The Effect of an e-Learning Program of Basic Cardiopulmonary Resuscitation for Students of an Emergency Medical Technician Program
Authors: Itsaree Padphai, Jiranan Pakpeian, Suksun Niponchai
Abstract:
This study is a descriptive research which aims to: 1) Compare the difference of knowledge before and after using the e-Learning program entitled “Basic Cardiopulmonary Resuscitation for Students in an Emergency Medical Technician Diploma Program”, and 2) Assess the students’ satisfaction after using the said program. This research is a kind of teaching and learning management supplemented with the e-Learning system; therefore, the purposively selected samples are 44 first-year and class-16 students of an emergency medical technician diploma program who attend the class in a second semester of academic year 2012 in Sirindhorn College of Public Health, Khon Kaen province. The research tools include 1) the questionnaire for general information of the respondents, 2) the knowledge tests before and after using the e-Learning program, and 3) an assessment of satisfaction in using the e-Learning program. The statistics used in data analysis percentage, include mean, standard deviation, and inferential statistics: paired t-test. 1. The general information of the respondents was mostly 37 females representing 84.09 percent. The average age was 19.5 years (standard deviation was 0.81), the maximum age was 21 years, and the minimum age was 19 years respectively. Students (35 subjects) admitted that they preferred the methods of teaching and learning by using the e-Learning systems. This was totally 79.95 percent. 2. A comparison on the difference of knowledge before and after using the e-Learning program showed that the mean before an application was 6.64 (standard deviation was 1.94) and after was 18.84 (standard deviation 1.03), which was higher than the knowledge of students before using the e-Learning program with the statistical significance (P value < 0.001). 3. For the satisfaction after using the e-Learning program, it was found that students’ satisfaction was at a very good level with the mean of 4.93 (standard deviation was 0.11).Keywords: e-Learning, cardiopulmonary resuscitation, diploma program, Khon Kaen Province
Procedia PDF Downloads 39823310 Quality Assurance as an Educational Development Tool: Case from the European Higher Education
Authors: Maha Mourad
Abstract:
Higher education in any competitive European economy should serve the new information society by increasing the supply of good quality education services and by creating good international brands in the international higher education market. Hence, continuous risk management techniques through higher educational reforms programs became one of the top priorities within the European Union to control the quality of higher education. Risk is higher education is studies by several researchers who agreed that the risk in higher education has a direct influence on continuity of quality education and research contribution. The focus of this research is to highlights the Internal Quality Assurance (IQA) activities in the Polish higher education system as a risk management tool used to control the quality of education. This paper presents a qualitative empirical analysis in 5 different universities in Poland. In addition, it aims to help in finding global practical and create benchmark for policy makers concerning the risk management techniques based on the Polish experience.Keywords: education development, quality assurance, sustainability, european higher education
Procedia PDF Downloads 46623309 The Minimum Patch Size Scale for Seagrass Canopy Restoration
Authors: Aina Barcelona, Carolyn Oldham, Jordi Colomer, Teresa Serra
Abstract:
The loss of seagrass meadows worldwide is being tackled by formulating coastal restoration strategies. Seagrass loss results in a network of vegetated patches which are barely interconnected, and consequently, the ecological services they provide may be highly compromised. Hence, there is a need to optimize coastal management efforts in order to implement successful restoration strategies, not only through modifying the architecture of the canopies but also by gathering together information on the hydrodynamic conditions of the seabeds. To obtain information on the hydrodynamics within the patches of vegetation, this study deals with the scale analysis of the minimum lengths of patch management strategies that can be effectively used on. To this aim, a set of laboratory experiments were conducted in a laboratory flume where the plant densities, patch lengths, and hydrodynamic conditions were varied to discern the vegetated patch lengths that can provide optimal ecosystem services for canopy development. Two possible patch behaviours based on the turbulent kinetic energy (TKE) production were determined: one where plants do not interact with the flow and the other where plants interact with waves and produce TKE. Furthermore, this study determines the minimum patch lengths that can provide successful management restoration. A canopy will produce TKE, depending on its density, the length of the vegetated patch, and the wave velocities. Therefore, a vegetated patch will produce plant-wave interaction under high wave velocities when it presents large lengths and high canopy densities.Keywords: seagrass, minimum patch size, turbulent kinetic energy, oscillatory flow
Procedia PDF Downloads 19623308 Fault Prognostic and Prediction Based on the Importance Degree of Test Point
Authors: Junfeng Yan, Wenkui Hou
Abstract:
Prognostics and Health Management (PHM) is a technology to monitor the equipment status and predict impending faults. It is used to predict the potential fault and provide fault information and track trends of system degradation by capturing characteristics signals. So how to detect characteristics signals is very important. The select of test point plays a very important role in detecting characteristics signal. Traditionally, we use dependency model to select the test point containing the most detecting information. But, facing the large complicated system, the dependency model is not built so easily sometimes and the greater trouble is how to calculate the matrix. Rely on this premise, the paper provide a highly effective method to select test point without dependency model. Because signal flow model is a diagnosis model based on failure mode, which focuses on system’s failure mode and the dependency relationship between the test points and faults. In the signal flow model, a fault information can flow from the beginning to the end. According to the signal flow model, we can find out location and structure information of every test point and module. We break the signal flow model up into serial and parallel parts to obtain the final relationship function between the system’s testability or prediction metrics and test points. Further, through the partial derivatives operation, we can obtain every test point’s importance degree in determining the testability metrics, such as undetected rate, false alarm rate, untrusted rate. This contributes to installing the test point according to the real requirement and also provides a solid foundation for the Prognostics and Health Management. According to the real effect of the practical engineering application, the method is very efficient.Keywords: false alarm rate, importance degree, signal flow model, undetected rate, untrusted rate
Procedia PDF Downloads 37723307 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 35323306 Evaluation and Assessment of Bioinformatics Methods and Their Applications
Authors: Fatemeh Nokhodchi Bonab
Abstract:
Bioinformatics, in its broad sense, involves application of computer processes to solve biological problems. A wide range of computational tools are needed to effectively and efficiently process large amounts of data being generated as a result of recent technological innovations in biology and medicine. A number of computational tools have been developed or adapted to deal with the experimental riches of complex and multivariate data and transition from data collection to information or knowledge. These bioinformatics tools are being evaluated and applied in various medical areas including early detection, risk assessment, classification, and prognosis of cancer. The goal of these efforts is to develop and identify bioinformatics methods with optimal sensitivity, specificity, and predictive capabilities. The recent flood of data from genome sequences and functional genomics has given rise to new field, bioinformatics, which combines elements of biology and computer science. Bioinformatics is conceptualizing biology in terms of macromolecules (in the sense of physical-chemistry) and then applying "informatics" techniques (derived from disciplines such as applied maths, computer science, and statistics) to understand and organize the information associated with these molecules, on a large-scale. Here we propose a definition for this new field and review some of the research that is being pursued, particularly in relation to transcriptional regulatory systems.Keywords: methods, applications, transcriptional regulatory systems, techniques
Procedia PDF Downloads 12523305 System for Monitoring Marine Turtles Using Unstructured Supplementary Service Data
Authors: Luís Pina
Abstract:
The conservation of marine biodiversity keeps ecosystems in balance and ensures the sustainable use of resources. In this context, technological resources have been used for monitoring marine species to allow biologists to obtain data in real-time. There are different mobile applications developed for data collection for monitoring purposes, but these systems are designed to be utilized only on third-generation (3G) phones or smartphones with Internet access and in rural parts of the developing countries, Internet services and smartphones are scarce. Thus, the objective of this work is to develop a system to monitor marine turtles using Unstructured Supplementary Service Data (USSD), which users can access through basic mobile phones. The system aims to improve the data collection mechanism and enhance the effectiveness of current systems in monitoring sea turtles using any type of mobile device without Internet access. The system will be able to report information related to the biological activities of marine turtles. Also, it will be used as a platform to assist marine conservation entities to receive reports of illegal sales of sea turtles. The system can also be utilized as an educational tool for communities, providing knowledge and allowing the inclusion of communities in the process of monitoring marine turtles. Therefore, this work may contribute with information to decision-making and implementation of contingency plans for marine conservation programs.Keywords: GSM, marine biology, marine turtles, unstructured supplementary service data (USSD)
Procedia PDF Downloads 20523304 Comparative Analysis of Photovoltaic Systems
Authors: Irtaza M. Syed, Kaameran Raahemifar
Abstract:
This paper presents comparative analysis of photovoltaic systems (PVS) and proposes practical techniques to improve operational efficiency of the PVS. The best engineering and construction practices for PVS are identified and field oriented recommendation are made. Comparative analysis of central and string inverter based, as well as 600 and 1000 VDC PVS are performed. In addition, direct current (DC) and alternating current (AC) photovoltaic (PV) module based systems are compared. Comparison shows that 1000 V DC String Inverters based PVS is the best choice.Keywords: photovoltaic module, photovoltaic systems, operational efficiency improvement, comparative analysis
Procedia PDF Downloads 48323303 The Impact of Corporate Finance on Financial Stability in the Western Balkan Countries
Authors: Luan Vardari, Dena Arapi-Vardari
Abstract:
Financial stability is a critical component of economic growth and development, and it has been recognized as a key policy objective in many countries around the world. In the Western Balkans, financial stability has been a key issue in recent years, with a number of challenges facing the region, including high levels of public debt, weak banking systems, and economic volatility. Corporate finance, which refers to the financial management practices of firms, is an important factor that can impact financial stability. This paper aims to investigate corporate finance's impact on financial stability in Western Balkan countries. This study will use a mixed-methods approach to investigate the impact of corporate finance on financial stability in the Western Balkans. The study will begin with a comprehensive review of the existing literature on corporate finance and financial stability, focusing on the Western Balkan region. This will be followed by an empirical analysis of regional corporate finance practices using data from various industries and firms. The analysis will explore the relationship between corporate finance practices and financial stability, taking into account factors such as regulatory frameworks, economic conditions, and firm size. The results of the study are expected to provide insights into the impact of corporate finance on financial stability in the Western Balkans. Specifically, the study will identify the key corporate finance practices that contribute to financial stability in the region, as well as the challenges and obstacles that firms face in implementing effective corporate finance strategies. The study will also provide recommendations for policymakers and firms looking to enhance financial stability and resilience in the region.Keywords: financial regulation, debt management, investment decisions, dividend policies, economic volatility, banking systems, public debt, prudent financial management, firm size, policy recommendations
Procedia PDF Downloads 7423302 Humanitarian Supply Chain Management: Extended Literature Review
Authors: Busra Gulnihan Dascıoglu, Ozalp Vayvay, Zeynep Tugce Kalender
Abstract:
Humanitarian supply chain management has gain popularity in recent years in research fields. The aim of this paper is to review the literature on humanitarian operations and crisis/disaster management from 2010 to latest researches in order to identify the current research and to provide direction for future research in this growing field. Researches are classified considering the research publication year, research fields. Articles from humanitarian supply chain management were reviewed, keywords were identified within a disaster management lifecycle framework. Research gaps are identified for future research areas.Keywords: crisis, disaster, humanitarian supply chain management, relief operations
Procedia PDF Downloads 33823301 Differential Analysis: Crew Resource Management and Profiles on the Balanced Inventory of Desirable Responding
Authors: Charalambos C. Cleanthous, Ryan Sain, Tabitha Black, Stephen Vera, Suzanne Milton
Abstract:
A concern when administering questionnaires is whether the participant is providing information that is accurate. The results may be invalid because the person is trying to present oneself in an unrealistic positive manner referred to as ‘faking good’, or in an unrealistic negative manner known as ‘faking bad’. The Balanced Inventory of Desirable Responding (BIDR) was used to assess commercial pilots’ responses on the two subscales of the BIDR: impression management (IM) and self-deceptive enhancement (SDE) that result in high or low scores. Thus, the BIDR produces four valid profiles: IM low and SDE low, IM high and SDE low, IM low and SDE high, and IM high and SDE high. The various profiles were used to compare the respondents’ answers to crew resource management (CRM) items developed from the USA Federal Aviation Administration’s (FAA) guidelines for CRM composition and training. Of particular interest were the results on the IM subscale. The comparisons between those scoring high (lying or faking) versus those low on the IM suggest that there were significant differences regarding their views of the various dimensions of CRM. One of the more disconcerting conclusions is that the high IM scores suggest that the pilots were trying to impress rather than honestly answer the questions regarding their CRM training and practice.Keywords: USA commercial pilots, crew resource management, faking, social desirability
Procedia PDF Downloads 25523300 Automated Server Configuration Management using Ansible
Authors: Kartik Mahajan
Abstract:
DevOps methodologies streamline software development and operations, promoting collaboration and automation. Traditional server management often relies on manual, repetitive tasks, leading to inefficiencies, potential errors, and increased operational costs. Ansible, as a configuration management tool, presents a compelling solution for automating infrastructure management processes. This review paper explores the implementation and testing of Ansible for server management, specifically focusing on automated user account configuration. By replacing manual procedures with Ansible playbooks, we aim to optimize server management, reduce human error, and potentially mitigate operational expenses. This study offers insights into Ansible’s efficacy within a DevOps context, highlighting its potential to transform server administration practices.Keywords: cloud, Devops, automation, ansible
Procedia PDF Downloads 4223299 How Information Sharing Can Improve Organizational Performance?
Authors: Syed Abdul Rehman Khan
Abstract:
In today’s world, information sharing plays a vital role in successful operations of supply chain; and boost to the profitability of the organizations (end-to-end supply chains). Many researches have been completed over the role of information sharing in supply chain. In this research article, we will investigate the ‘how information sharing can boost profitability & productivity of the organization; for this purpose, we have developed one conceptual model and check to that model through collected data from companies. We sent questionnaire to 369 companies; and will filled form received from 172 firms and the response rate was almost 47%. For the data analysis, we have used Regression in (SPSS software) In the research findings, our all hypothesis has been accepted significantly and due to the information sharing between suppliers and manufacturers ‘quality of material and timely delivery’ increase and also ‘collaboration & trust’ will become more stronger and these all factors will lead to the company’s profitability directly and in-directly. But unfortunately, companies could not avail the all fruitful benefits of information sharing due to the fear of ‘compromise confidentiality or leakage of information’.Keywords: collaboration, information sharing, risk factor, timely delivery
Procedia PDF Downloads 41323298 The Impact of Host Country Effects on Transferring HRM Practices from Western Headquarters to Ukrainian Subsidiaries
Authors: Olga Novitskaya
Abstract:
The emerging markets of post-USSR countries have attracted Western multinational companies; however, weak institutions and unstable host country environments have hindered the implementation of successful management practices. The Ukrainian market, in light of recent events, is particularly interesting to study for its compatibility with Western businesses. This paper focuses on factors that can facilitate or inhibit the transfer of human resource management practices from Western headquarters to Ukrainian subsidiaries. To explain the national context’s effects better, a business systems approach has been applied to a qualitative study of 16 wholly owned Western subsidiaries, dissecting the reasons for a weak integration of Western practices in Ukraine. Results show that underdeveloped institutions have forced companies to develop additional practices that compensate for national weaknesses, as well as to adjust to a constantly changing environment. Flexibility and local responsiveness were observed as vital for success in Ukraine.Keywords: human resource management, Ukraine, business system, multinational companies, HR practices
Procedia PDF Downloads 39123297 Municipal Solid Waste Management Using Life Cycle Assessment Approach: Case Study of Maku City, Iran
Authors: L. Heidari, M. Jalili Ghazizade
Abstract:
This paper aims to determine the best environmental and economic scenario for Municipal Solid Waste (MSW) management of the Maku city by using Life Cycle Assessment (LCA) approach. The functional elements of this study are collection, transportation, and disposal of MSW in Maku city. Waste composition and density, as two key parameters of MSW, have been determined by field sampling, and then, the other important specifications of MSW like chemical formula, thermal energy and water content were calculated. These data beside other information related to collection and disposal facilities are used as a reliable source of data to assess the environmental impacts of different waste management options, including landfills, composting, recycling and energy recovery. The environmental impact of MSW management options has been investigated in 15 different scenarios by Integrated Waste Management (IWM) software. The photochemical smog, greenhouse gases, acid gases, toxic emissions, and energy consumption of each scenario are measured. Then, the environmental indices of each scenario are specified by weighting these parameters. Economic costs of scenarios have been also compared with each other based on literature. As final result, since the organic materials make more than 80% of the waste, compost can be a suitable method. Although the major part of the remaining 20% of waste can be recycled, due to the high cost of necessary equipment, the landfill option has been suggested. Therefore, the scenario with 80% composting and 20% landfilling is selected as superior environmental and economic scenario. This study shows that, to select a scenario with practical applications, simultaneously environmental and economic aspects of different scenarios must be considered.Keywords: IWM software, life cycle assessment, Maku, municipal solid waste management
Procedia PDF Downloads 23623296 Component Interface Formalization in Robotic Systems
Authors: Anton Hristozov, Eric Matson, Eric Dietz, Marcus Rogers
Abstract:
Components are heavily used in many software systems, including robotics systems. The growth of sophistication and diversity of new capabilities for robotic systems presents new challenges to their architectures. Their complexity is growing exponentially with the advent of AI, smart sensors, and the complex tasks they have to accomplish. Such complexity requires a more rigorous approach to the creation, use, and interoperability of software components. The issue is exacerbated because robotic systems are becoming more and more reliant on third-party components for certain functions. In order to achieve this kind of interoperability, including dynamic component replacement, we need a way to standardize their interfaces. A formal approach is desperately needed to specify what an interface of a robotic software component should contain. This study performs an analysis of the issue and presents a universal and generic approach to standardizing component interfaces for robotic systems. Our approach is inspired by well-established robotic architectures such as ROS, PX4, and Ardupilot. The study is also applicable to other software systems that share similar characteristics with robotic systems. We consider the use of JSON or Domain Specific Languages (DSL) development with tools such as Antlr and automatic code and configuration file generation for frameworks such as ROS and PX4. A case study with ROS2 is presented as a proof of concept for the proposed methodology.Keywords: CPS, robots, software architecture, interface, ROS, autopilot
Procedia PDF Downloads 9023295 Implementation of ISO 26262: Issues and Challenges
Authors: Won Jung, Azianti Ismail
Abstract:
Functional safety is about electrical, electronics, and programmable electronic safety-related system focuses on the potential risk of malfunction which may have a significant impact on the safety of humans and/or the environment based on IEC 61508. In November 2011, the automotive industry has been introduced to automotive functional safety ISO 26262 which addresses the complete safety installation from sensor to actuator with its technical as well as management issues. Nowadays, most of the modern automobiles are equipped with embedded electronic systems which include many Electronic Controller Units (ECUs), electronic sensors, signals, bus systems and coding. Due to upcoming more sophisticated systems installed in automobiles, the need to carry out detailed safety is very crucial. Assimilation of existing practices with this new standard is a major challenge for the automotive industry in reducing redundancy, time and resources. Therefore, this paper will analyze the research trends on pre and post introduction of ISO 26262 through publications as well as to take a glimpse in the activities for implementing this standard by the automotive manufacturers around the world. It is going to highlight issues and challenges which have been discussed among the experts in this field. Even though it will take some time for this standard to be fully implemented, the benefits from this implementation will raise the competitiveness in the global automotive market.Keywords: ISO 26262, automotive, functional safety, implementation, standard, challenges
Procedia PDF Downloads 40123294 Career Anchors and Domain Specialization in Management Education: A Deviation Analysis
Authors: Santosh Kumar Sharma
Abstract:
In view of management education with special reference to India, it has been noted that students have deviations between their career anchors and domain of specialization. As a consequence, they face problems in their summer internships and placements in the corporate sector. Eventually, they either change their career track or leave the management profession, which is a serious concern from the perspective of human capital. However, there is no substantial literature in the given context. Therefore, the present study contributes to the global discourse of management education and its spillover effect on human resource management. The objective of the present study is to analyze the deviation between career anchors and domain specialization with reference to management education in India. The present study is exploratory in nature, wherein data has been collected from a significant number of post-graduate students who are pursuing management education from a premium business school in India, followed by descriptive analysis. The present research contributes to the professional development of management students from the perspective of human capital, which is eventually related to various factors of the Indian economy.Keywords: India, management education, domain specialization, placements
Procedia PDF Downloads 8723293 Identification of Nonlinear Systems Using Radial Basis Function Neural Network
Authors: C. Pislaru, A. Shebani
Abstract:
This paper uses the radial basis function neural network (RBFNN) for system identification of nonlinear systems. Five nonlinear systems are used to examine the activity of RBFNN in system modeling of nonlinear systems; the five nonlinear systems are dual tank system, single tank system, DC motor system, and two academic models. The feed forward method is considered in this work for modelling the non-linear dynamic models, where the K-Means clustering algorithm used in this paper to select the centers of radial basis function network, because it is reliable, offers fast convergence and can handle large data sets. The least mean square method is used to adjust the weights to the output layer, and Euclidean distance method used to measure the width of the Gaussian function.Keywords: system identification, nonlinear systems, neural networks, radial basis function, K-means clustering algorithm
Procedia PDF Downloads 46923292 Resistance to the South African Root-Knot Nematode Population Densities in Artemisia annua: An Anti-Malaria Ethnomedicinal Plant
Authors: Kgabo Pofu, Hintsa Araya, Dean Oelofse, Sonja Venter, Christian Du Plooy, Phatu Mashela
Abstract:
Nematode resistance to the tropical root-knot (Meloidogyne species) nematodes is one of the most preferred nematode management strategies in development of smallholder resource-poor farming systems. Due to its pharmacological and ethnomedicinal applications, Artemisia annua is one of the underutilised crops that have attracted attention of policy-makers in rural agrarian development in South Africa. However, the successful introduction of this crop in smallholder resource-poor farming systems could be upset by the widespread aggressive Meloidogyne species, which have limited management options. The objective of this study therefore was to determine the degree of nematode resistance to the South African M. incognita and M. javanica population densities on A. annua seedlings. Uniform three-week-old seedlings in pots containing pasteurised growing medium under greenhouse conditions were inoculated using a series of eggs and second-stage juveniles of two Meloidogyne species in separate trials. At 56 days after inoculation, treatments were highly significant on reproductive factor (RF) for M. incognita and M. javanica on A. annua, contributing 87 and 89% in total treatment variation of the variables, respectively. At all levels of inoculation, RF values for M. incognita (0.17-0.79) and M. javanica (0.02-0.29) were below unity, without any noticeable root galls. Infection of A. annua by both Meloidogyne species had no significant effects on growth variables. In conclusion, A. annua seedlings are resistant to the South African M. incognita and M. javanica population densities and could therefore be explored further for use in smallholder resource-poor farming systems.Keywords: ethnomedicial plants, medicinal plants, underutilised crops, plant parasitic nematodes
Procedia PDF Downloads 299