Search results for: North American ice service
4392 Context, Challenges, Constraints and Strategies of Non-Profit Organisations in Responding to the Needs of Asylum Seekers and Refugees in Cape Town, South Africa
Authors: C. O’Brien, Chloe Reiss
Abstract:
While South Africa has been the chosen host country for over 1,2 million asylum seekers/refugees it has at the same time, been struggling to address the needs of its own people who are still trapped in poverty with little prospects of employment. This limited exploratory, qualitative study was undertaken in Cape Town with a purposive sample of 21 key personnel from various NPOs providing a service to asylum seekers/refugees. Individual in-depth face to face interviews were carried out and the main findings were: Some of the officials at the Department of Home Affairs, health personnel, landlords, school principals, employers, bank officials and police officers were prejudicial in their practices towards asylum seekers/ refugees. The major constraints experienced by NPOs in this study were linked to a lack of funding and minimal government support, strained relationship with the Department of Home Affairs and difficulties in accessing refugees. And finally, the strategies adopted by these NPOs included networking with other service providers, engaging in advocacy, raising community awareness and liaising with government. Thus, more focused intervention strategies are needed to build social cohesion, address prejudices which fuels xenophobic attacks and raise awareness/educate various sectors about refugee rights. Given this burgeoning global problem, social work education and training should include curriculum content on migrant issues. Furthermore, larger studies using mixed methodology approaches would yield more nuanced data and provide for more strategic interventions.Keywords: refugees and asylum seekers, constraints of service delivery, non-profit organisations, refugee challenges
Procedia PDF Downloads 2054391 The Relationship between Marketing Mix Strategy and Valuable of Muay Thai Training and Thai Massage in Foreign Tourists' Perception
Authors: Thammamonr Khunrattanaporn
Abstract:
The purpose of the research was to examine the relationship between the marketing mix factors and valuable of Muay Thai Training and Thai massage in foreign tourists’ perception. The research used the 8 P’s of marketing framework presented in the theory of compound marketing services strategy. Data was collect using survey for 400 questionnaires using the Quota sampling from foreign tourists travelling in Thailand. The data was analyzed to determine valuation statistics, the frequency, percent average, means and standard deviation and pearson's correlation coefficients. The result shows the foreign tourists’ perception with the marketing mix strategy in term of Muay Thai training and massage regarding curriculum areas: product, pricing, channel distribution, Promotion, Personnel services, Physical evidence and external partnerships the overall, it significant at a high level. The awareness level of service and value for travelers had two aspects of service quality and value for money it significant at the highest level.Keywords: foreign tourists’ perception, marketing mix strategy, Muay Thai training, the massage
Procedia PDF Downloads 2654390 Effects of the Affordable Care Act On Preventive Care Disparities
Authors: Cagdas Agirdas
Abstract:
Background: The Affordable Care Act (ACA) requires non-grandfathered private insurance plans, starting with plan years on or after September 23rd, 2010, to provide certain preventive care services without any cost sharing in the form of deductibles, copayments or co-insurance. This requirement may affect racial and ethnic disparities in preventive care as it provides the largest copay reduction in preventive care. Objectives: We ask whether the ACA’s free preventive care benefits are associated with a reduction in racial and ethnic disparities in the utilization of four preventive services: cholesterol screenings, colonoscopies, mammograms, and pap smears. Methods: We use a data set of over 6,000 individuals from the 2009, 2010, and 2013 Medical Expenditure Panel Surveys (MEPS). We restrict our data set only to individuals who are old enough to be eligible for each preventive service. Our difference-in-differences logistic regression model classifies privately-insured Hispanics, African Americans, and Asians as the treatment groups and 2013 as the after-policy year. Our control group consists of non-Hispanic whites on Medicaid as this program already covered preventive care services for free or at a low cost before the ACA. Results: After controlling for income, education, marital status, preferred interview language, self-reported health status, employment, having a usual source of care, age and gender, we find that the ACA is associated with increases in the probability of the median, privately-insured Hispanic person to get a colonoscopy by 3.6% and a mammogram by 3.1%, compared to a non-Hispanic white person on Medicaid. Similarly, we find that the median, privately-insured African American person’s probability of receiving these two preventive services improved by 2.3% and 2.4% compared to a non-Hispanic white person on Medicaid. We do not find any significant improvements for any racial or ethnic group for cholesterol screenings or pap smears. Furthermore, our results do not indicate any significant changes for Asians compared to non-Hispanic whites in utilizing the four preventive services. These reductions in racial/ethnic disparities are robust to reconfigurations of time periods, previous diagnosis, and residential status. Conclusions: Early effects of the ACA’s provision of free preventive care are significant for Hispanics and African Americans. Further research is needed for the later years as more individuals became aware of these benefits.Keywords: preventive care, Affordable Care Act, cost sharing, racial disparities
Procedia PDF Downloads 1534389 Authority and Function of Administrative Organs According to the Constitution: A Construction of Democracy in the Administrative Law of Indonesia
Authors: Andhika Danesjvara, Nur Widyastanti
Abstract:
The constitution regulates the forms, types, and powers of sState organs in a government. The powers of the organs are then regulated in more detail in the legislation. One of these organs is a government organ, headed by a president or by another name that serves as the main organizer of government. The laws and regulations will govern how the organs of government shall exercise their authority and functions. In a modern state, the function of enacting laws or called executive power does not exercise the functions of government alone, but there are other organs that help the government run the country. These organs are often called government agencies, government accelerating bodies, independent regulatory bodies, commissions, councils or other similar names. The legislation also limits the power of officials within the organs to keep from abusing its authority. The main question in this paper is whether organs are the implementation of a democratic country, or as a form of compromise with the power of stakeholders. It becomes important to see how the administrative organs perform their functions. The administrative organs that are bound by government procedures work in the public service; therefore the next question is how far the function of public service is appropriate and not contradictory to the constitution.Keywords: administrative organs, constitution, democracy, government
Procedia PDF Downloads 3034388 Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System
Authors: Vuk M. Popovic, Dunja D. Popovic
Abstract:
Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects.Keywords: laboratory information system, maintenance engineering, neural networks, software maintenance, software maintenance costs
Procedia PDF Downloads 3584387 In the Valley of the Shadow of Death: Gossip, God, and Scapegoating in Susannah, an American Opera by Carlisle Floyd
Authors: Shirl H. Terrell
Abstract:
In the telling of mythologies, stories of cultural and religious histories, the creative arts provide an archetypal lens through which the personal and collective unconscious are viewed, thus revealing mysteries of the unknown psyche. To that end, the author of this paper, using the hermeneutic approach, proves that Carlisle Floyd’s (1955) English language opera Susannah illuminates humanity’s instinctual nature and behaviors through music, libretto, and drama. While impressive musical works such as Wagner’s Ring Cycle and Webber’s Phantom of the Opera have received extensive Jungian analyses, critics and scholars often ignore lesser esteemed works, such as Susannah, notwithstanding the fact that they have been consistently performed on the theater circuit. Such pieces, when given notice, allow viewers to grasp the soul-making depth and timeless quality of productions which may otherwise go unrecognized as culturally or psychologically significant. Although Susannah has sometimes been described as unsophisticated and simple in scope, the author demonstrates why Floyd’s 'little' opera, set in New Hope Valley, Appalachia, a cultural region in the Eastern United States known for its prevailing myths and distortions of isolation, temperament, and the judgmentally conservative behavior of its inhabitants, belongs to opera’s hallmark works. Its approach to powerful underlying archetypal themes, which give rise to the poignant and haunting depictions of the darker and destructive side of the human soul, the Shadow, provides crucial significance to the work. The Shadow’s manifestation in the form of the scapegoating complex is central to the plot of Susannah; the church’s meting out of rules, judgment, and reparation for sins point to the foreboding aspects of human behavior that evoke their intrinsic nature. The scapegoating complex is highlighted in an eight-step process gleaned from the works of Kenneth Burke and Rene Girard. In summary, through depth psychological terms and mythological motifs, the author provides an insightful approach to perceiving instinctual behaviors as they play out in an American opera that has been staged over eight-hundred times, yet, unfortunately, remains in the shadows. Susannah’s timelessness is now.Keywords: archetypes, mythology, opera, scapegoating, Shadow, Susannah
Procedia PDF Downloads 1504386 The Political Economy of the Global Climate Change Adaptation Initiatives: A Case Study on the Global Environmental Facility
Authors: Anar Koli
Abstract:
After the Paris agreement in 2015, a comprehensive initiative both from the developed and developing countries towards the adaptation to climate change is emerging. The Global Environmental Facility (GEF), which is financing a global portfolio of adaptation projects and programs in over 124 countries is playing a significant role to a new financing framework that included the concept of “climate-resilient development”. However, both the adaptation and sustainable development paradigms remain continuously contested, especially the role of the multilateral institutions with their technical and financial assistance to the developing world. Focusing on the adaptation initiatives of the GEF, this study aims to understand to what extent the global multilateral institutions, particularly the GEF is contributing to the climate-resilient development. From the political ecology perspective, the argument of this study is that the global financial framework is highly politicized, and understanding the contribution of the global institutions of the global climate change needs to be related both from the response and causal perspectives. A holistic perspective, which includes the contribution of the GEF as a response to the climate change and as well the cause of global climate change, are needed to understand the broader environment- political economic relation. The study intends to make a critical analysis of the way in which the political economy structure and the environment are related along with the social and ecological implications. It does not provide a narrow description of institutional responses to climate change, rather it looks at how the global institutions are influencing the relationship of the global ecologies and economies. This study thus developed a framework combining the global governance and the political economy perspective. This framework includes environment-society relation, environment-political economy linkage, global institutions as the orchestra, and division between the North and the South. Through the analysis of the GEF as the orchestra of the global governance, this study helps to understand how GEF is coordinating the interactions between the North and the South and responding the global climate resilient development. Through the other components of the framework, the study explains how the role of the global institutions is related to the cause of the human induced global climate change. The study employs a case study based on both the quantitative and qualitative data. Along with the GEF reports and data sets, this study draws from an eclectic range of literature from a range of disciplines to explain the broader relation of the environment and political economy. Based on a case study on GEF, the study found that the GEF has positive contributions in bringing developing countries’ capacity in terms of sustainable development goal, local institutional development. However, through a critical holistic analysis, this study found that this contribution to the resilient development helps the developing countries to conform the fossil fuel based capitalist political economy. The global governance institution is contributing both to the pro market based environment society relation and, to the consequences of this relation.Keywords: climate change adaptation, global environmental facility (GEF), political economy, the north -south relation
Procedia PDF Downloads 2304385 Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Abstract:
Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.Keywords: SIM card, mobile financial services, cryptography, secure data storage
Procedia PDF Downloads 3124384 Molecular Detection of Tuberculosis in Dogs in the Three North-Eastern States Assam, Mizoram and Nagaland of India
Authors: A. G. Barua, Uttam Rajkhowa, Pranjal Moni Nath, Nur Abdul Kadir
Abstract:
Mycobacterium tuberculosis (MTB) is one of the most closely-related intracellular bacterial pathogens, grouped as the M. tuberculosis complex (MTC). MTB, the primary agent of human tuberculosis (TB), can develop clinical TB in animals as 75 percent of canine mycobacterial infection is caused by close contact with an infected human being. In the present study, molecular detection of TB in dogs in three North-eastern states of India, Assam Mizoram, and Nagaland was carried out. So far, there has been a lack of systematic study in these regions, hampered by slow diagnostic methods and poor infrastructure. In an attempt to rectify this situation, molecular epidemiology was carried out for nine months to detect canine TB in a sample of 340 dogs. Isolation of DNA was done with swabs (throat/nasal), nodules of lungs and fluids from 100 suspected dogs and the molecular study were carried out with the help of conventional and real-time PCR. Post-mortem study was also carried out. Our results showed that the prevalence of clinical TB in dogs from a high-risk setting was 1 percent. However, the prevalence of immunological sensitization to M. tuberculosis antigen in dogs living in contact with sputum smeared positive TB cases was almost 50 percent. The latter setting had the maximum impact in terms of TB transmission. During the study period, a survey with a standard questionnaire was carried out in the TB hospitals to study reverse zoonosis. It was observed that an infected human being was one of the major risk factors for dogs to contract the infection. This observation was drawn by examining the probable airborne transmission from humans to their pets or strays. The present study helped to discover the nuances of TB transmission more clearly and systematically as compared to other sporadic tests to detect MTB in canine.Keywords: Assam and Nagaland, canine TB, India, molecular detection, tuberculosis
Procedia PDF Downloads 1444383 X-Ray Diffraction Technique as a Means for Degradation Assessment of Welded Joints
Authors: Jaroslav Fiala, Jaroslav Kaiser, Pavel Zlabek, Vaclav Mentl
Abstract:
The X-ray diffraction technique was recognized as a useful tool for the assessment of material degradation degree after a long-time service. In many industrial applications materials are subjected to degradation of mechanical properties as a result of real service conditions. The assessment of the remnant lifetime of components and structures is commonly based on correlated procedures including numerous destructive, non-destructive and mathematical techniques that should guarantee reasonable precise assessment of the current damage extent of materials in question and the remnant lifetime assessment. This paper summarizes results of an experimental programme concentrated on mechanical properties degradation of welded components. Steel an Al-alloy test specimens of base metal, containing welds and simple weldments were fatigue loaded at room temperature to obtain Woehler S-N curve. X-ray diffraction technique was applied to assess the degradation degree of material as a result of cyclic loading.Keywords: fatigue loading, material degradation, steels, AL-alloys, X-ray diffraction
Procedia PDF Downloads 4394382 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund
Authors: Chutikarn Sriviboon
Abstract:
The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.Keywords: effectiveness, quality, labor funds, service
Procedia PDF Downloads 3554381 Subsurface Structures Delineation and Tectonic History Investigation Using Gravity, Magnetic and Well Data, In the Cyrenaica Platform, NE Libya
Authors: Mohamed Abdalla saleem
Abstract:
Around one hundred wells were drilled in the Cyrenaica platform north-east Libya, and almost all of them were dry. Although the drilled samples reveal good oil shows and good source rock maturity. Most of the upper Cretaceous age and the above deposit successions are outcrops in different places. We have a thorough understanding and mapping of the structures related to the Cretaceous and above Cenozoic Era. But the subsurface beneath these outcrops still needs more investigation and delineation. This study aims to give answers to some questions about the tectonic history and the types of structures that are distributed in the area using gravity, magnetic, and well data. According to the information that has been obtained from groups of wells drilled in concessions 31, 35, and 37, one can note that the depositional sections become ticker and deeper southward. The topography map of the study area shows that the area is highly elevated at the north, about 300 m above the sea level, while the minimum elevation (16–18 m) exists nearly in the middle (lat. 30°). South to this latitude, the area is started elevated again (more than 100 m). The third-order residual gravity map, which was constructed from the Bouguer gravity map, reveals that the area is dominated by a large negative anomaly working as a sub-basin (245 km x 220 km), which means a very thick depositional section, and the basement is very deep. The mentioned depocenter is surrounded by four high gravity anomalies (12-37 mGal), which means a shallow basement and a relative thinner succession of sediments. The highest gravity values are located beside the coast line. The total horizontal gradient (THG) map reveals various systems of structures, the first system where the structures are oriented NE-SW, which is crosscut by the second regime extending NW-SE. This second system is distributed through the whole area, but it is very strong and shallow near the coast line and at the south part, while it is relatively deep at the middle depocenter area.Keywords: cyrenaica platform, gravity, structures, basement, tectonic history
Procedia PDF Downloads 34380 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1214379 Library on the Cloud: Universalizing Libraries Based on Virtual Space
Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan
Abstract:
Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access
Procedia PDF Downloads 6614378 Helping the Helper: Impact of Teaching Assistantship Program among Psychology Alumni
Authors: Clarissa Delariarte
Abstract:
With the aim of helping the poorest of the poor achieve quality education, Psychology students supported and served as teacher assistants to its Early Childhood Education Center in two barangays since the program began in 1999. Making use of qualitative approach, the impact of the program to 29 alumni who served as teacher assistants between 2000-2014 was assessed. Results show that the impact to the alumni is in cognitive as well as social-emotional in terms of feelings of deep satisfaction and sense of volunteerism which is being carried out in their respective workspaces. They also expressed positive feelings of inspiration, gratefulness and happiness. A wider perspective in life, being confident, creative and resourceful was also articulated as concrete impacts. It is concluded that the program had an impact on helping the helper and is a concrete manifestation of the academe being successful in its commitment of forming individuals into becoming integrated and compassionate in the service of the Church and Society. It implies that more opportunities of helping others be provided to students since, in the final analysis, is actually an opportunity of helping the helper be of better service to others.Keywords: applied psychology, life skill, qualitative research, quality education
Procedia PDF Downloads 1864377 Spatio-Temporal Analysis of Rabies Incidence in Herbivores of Economic Interest in Brazil
Authors: Francisco Miroslav Ulloa-Stanojlovic, Gina Polo, Ricardo Augusto Dias
Abstract:
In Brazil, there is a high incidence of rabies in herbivores of economic interest (HEI) transmitted by the common vampire bat Desmodus rotundus, the presence of human rabies cases and the huge economic losses in the world's largest cattle industry, it is important to assist the National Program for Control of Rabies in herbivores in Brazil, that aims to reduce the incidence of rabies in HEI populations, mainly through epidemiological surveillance, vaccination of herbivores and control of vampire-bat roosts. Material and Methods: A spatiotemporal retrospective Kulldorff's spatial scan statistic based on a Poisson model and Monte Carlo simulation and an Anselin's Local Moran's I statistic were used to uncover spatial clustering of HEI rabies from 2000 – 2014. Results: Were identify three important clusters with significant year-to-year variation (Figure 1). In 2000, was identified one area of clustering in the North region, specifically in the State of Tocantins. Between the year 2000 and 2004, a cluster centered in the Midwest and Southeast region including the States of Goiás, Minas Gerais, Rio de Janeiro, Espirito Santo and São Paulo was prominent. And finally between 2000 and 2005 was found an important cluster in the North, Midwest and South region. Conclusions: The HEI rabies is endemic in the country, in addition, appears to be significant differences among the States according to their surveillance services, that may be difficulting the control of the disease, also other factors could be influencing in the maintenance of this problem like the lack of information of vampire-bat roosts identification, and limited human resources for realization of field monitoring. A review of the program control by the authorities it’s necessary.Keywords: Brazil, Desmodus rotundus, herbivores, rabies
Procedia PDF Downloads 4174376 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network
Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang
Abstract:
Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving
Procedia PDF Downloads 3304375 Knowledge Management and Administrative Effectiveness of Non-teaching Staff in Federal Universities in the South-West, Nigeria
Authors: Nathaniel Oladimeji Dixon, Adekemi Dorcas Fadun
Abstract:
Educational managers have observed a downward trend in the administrative effectiveness of non-teaching staff in federal universities in South-west Nigeria. This is evident in the low-quality service delivery of administrators and unaccomplished institutional goals and missions of higher education. Scholars have thus indicated the need for the deployment and adoption of a practice that encourages information collection and sharing among stakeholders with a view to improving service delivery and outcomes. This study examined the extent to which knowledge management correlated with the administrative effectiveness of non-teaching staff in federal universities in South-west Nigeria. The study adopted the survey design. Three federal universities (the University of Ibadan, Federal University of Agriculture, Abeokuta, and Obafemi Awolowo University) were purposively selected because administrative ineffectiveness was more pronounced among non-teaching staff in government-owned universities, and these federal universities were long established. The proportional and stratified random sampling was adopted to select 1156 non-teaching staff across the three universities along the three existing layers of the non-teaching staff: secretarial (senior=311; junior=224), non-secretarial (senior=147; junior=241) and technicians (senior=130; junior=103). Knowledge Management Practices Questionnaire with four sub-scales: knowledge creation (α=0.72), knowledge utilization (α=0.76), knowledge sharing (α=0.79) and knowledge transfer (α=0.83); and Administrative Effectiveness Questionnaire with four sub-scales: communication (α=0.84), decision implementation (α=0.75), service delivery (α=0.81) and interpersonal relationship (α=0.78) were used for data collection. Data were analyzed using descriptive statistics, Pearson product-moment correlation and multiple regression at 0.05 level of significance, while qualitative data were content analyzed. About 59.8% of the non-teaching staff exhibited a low level of knowledge management. The indices of administrative effectiveness of non-teaching staff were rated as follows: service delivery (82.0%), communication (78.0%), decision implementation (71.0%) and interpersonal relationship (68.0%). Knowledge management had significant relationships with the indices of administrative effectiveness: service delivery (r=0.82), communication (r=0.81), decision implementation (r=0.80) and interpersonal relationship (r=0.47). Knowledge management had a significant joint prediction on administrative effectiveness (F (4;1151)= 0.79, R=0.86), accounting for 73.0% of its variance. Knowledge sharing (β=0.38), knowledge transfer (β=0.26), knowledge utilization (β=0.22), and knowledge creation (β=0.06) had relatively significant contributions to administrative effectiveness. Lack of team spirit and withdrawal syndrome is the major perceived constraints to knowledge management practices among the non-teaching staff. Knowledge management positively influenced the administrative effectiveness of the non-teaching staff in federal universities in South-west Nigeria. There is a need to ensure that the non-teaching staff imbibe team spirit and embrace teamwork with a view to eliminating their withdrawal syndromes. Besides, knowledge management practices should be deployed into the administrative procedures of the university system.Keywords: knowledge management, administrative effectiveness of non-teaching staff, federal universities in the south-west of nigeria., knowledge creation, knowledge utilization, effective communication, decision implementation
Procedia PDF Downloads 1024374 Evaluation of the Trauma System in a District Hospital Setting in Ireland
Authors: Ahmeda Ali, Mary Codd, Susan Brundage
Abstract:
Importance: This research focuses on devising and improving Health Service Executive (HSE) policy and legislation and therefore improving patient trauma care and outcomes in Ireland. Objectives: The study measures components of the Trauma System in the district hospital setting of the Cavan/Monaghan Hospital Group (CMHG), HSE, Ireland, and uses the collected data to identify the strengths and weaknesses of the CMHG Trauma System organisation, to include governance, injury data, prevention and quality improvement, scene care and facility-based care, and rehabilitation. The information will be made available to local policy makers to provide objective situational analysis to assist in future trauma service planning and service provision. Design, setting and participants: From 28 April to May 28, 2016 a cross-sectional survey using World Health Organisation (WHO) Trauma System Assessment Tool (TSAT) was conducted among healthcare professionals directly involved in the level III trauma system of CMHG. Main outcomes: Identification of the strengths and weaknesses of the Trauma System of CMHG. Results: The participants who reported inadequate funding for pre hospital (62.3%) and facility based trauma care at CMHG (52.5%) were high. Thirty four (55.7%) respondents reported that a national trauma registry (TARN) exists but electronic health records are still not used in trauma care. Twenty one respondents (34.4%) reported that there are system wide protocols for determining patient destination and adequate, comprehensive legislation governing the use of ambulances was enforced, however, there is a lack of a reliable advisory service. Over 40% of the respondents reported uncertainty of the injury prevention programmes available in Ireland; as well as the allocated government funding for injury and violence prevention. Conclusions: The results of this study contributed to a comprehensive assessment of the trauma system organisation. The major findings of the study identified three fundamental areas: the inadequate funding at CMHG, the QI techniques and corrective strategies used, and the unfamiliarity of existing prevention strategies. The findings direct the need for further research to guide future development of the trauma system at CMHG (and in Ireland as a whole) in order to maximise best practice and to improve functional and life outcomes.Keywords: trauma, education, management, system
Procedia PDF Downloads 2434373 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates
Procedia PDF Downloads 3054372 Effect of Zidovudine on Hematological and Virologic Parameters among Female Sex Workers Receiving Antiretroviral Therapy (ART) in North-Western Nigeria
Authors: N. M. Sani, E. D. Jatau, O. S. Olonitola, M. Y. Gwarzo, P. Moodley, N. S. Mujahid
Abstract:
Haemoglobin (HB) indicates anaemia level and by extension may reflect the nutritional level and perhaps the immunity of an individual. Some antiretroviral drugs like zidovudine are known to cause anaemia in People living with HIV/AIDS (PLWHA). A cross-sectional study using demographic data and blood specimen from 218 female commercial sex workers attending antiretroviral therapy (ART) clinics was conducted between December 2009 and July 2011 to assess the effect of zidovudine on haematologic and RNA viral load of female sex workers receiving antiretroviral treatment in north-western Nigeria. Anaemia is a common and serious complication of both HIV infection and its treatment. In the setting of HIV infection, anaemia has been associated with decreased quality of life, functional status, and survival. Antiretroviral therapy, particularly the highly active antiretroviral therapy (HAART), has been associated with a decrease in the incidence and severity of anaemia in HIV-infected patients who have received a HAART regimen for at least 1 year. In this study, result has shown that out of 218 patients, 26 with haemoglobin count between 5.1–10 g/dl were observed to have the highest viral load count of 300,000–350,000 copies/ml. It was also observed that most patients (190) with HB of 10.1–15.0 g/dl had viral load count of 200,000–250,000 copies/ml. An inverse relationship therefore exists, i.e. the lower the haemoglobin level, the higher the viral load count, even though the test statistics did not show any significance between the two (P=0.206). This shows that multivariate logistic regression analysis demonstrated that anaemia was associated with a CD4+ cell count below 50/µL in female sex workers with a viral load above 100,000 copies/mL who use zidovudine. Severe anaemia was less prevalent in this study population than in historical comparators; however, mild to moderate anaemia rates remain high. The study, therefore, recommends that hematological and virologic parameters be monitored closely in patients receiving first line ART regimen.Keywords: anaemia, female sex worker, haemoglobin, Zidovudine
Procedia PDF Downloads 3124371 The Role of Brand Loyalty in Generating Positive Word of Mouth among Malaysian Hypermarket Customers
Authors: S. R. Nikhashemi, Laily Haj Paim, Ali Khatibi
Abstract:
Structural Equation Modeling (SEM) was used to test a hypothesized model explaining Malaysian hypermarket customers’ perceptions of brand trust (BT), customer perceived value (CPV) and perceived service quality (PSQ) on building their brand loyalty (CBL) and generating positive word-of-mouth communication (WOM). Self-administered questionnaires were used to collect data from 374 Malaysian hypermarket customers from Mydin, Tesco, Aeon Big and Giant in Kuala Lumpur, a metropolitan city of Malaysia. The data strongly supported the model exhibiting that BT, CPV and PSQ are prerequisite factors in building customer brand loyalty, while PSQ has the strongest effect on prediction of customer brand loyalty compared to other factors. Besides, the present study suggests the effect of the aforementioned factors via customer brand loyalty strongly contributes to generate positive word of mouth communication.Keywords: brand trust, perceived value, Perceived Service Quality, Brand loyalty, positive word of mouth communication
Procedia PDF Downloads 4824370 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns
Authors: Vitali Kremez
Abstract:
The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.Keywords: bitcoin, cybercrime, ransomware, Russia
Procedia PDF Downloads 1954369 The Effect of Bearing Surface Finish on the Engine's Lubrication System Performance
Authors: Kudakwashe Diana Nyamugure
Abstract:
Engine design has evolved to suit new industry standards of smaller compact designs that operate at high temperatures and even higher stress loads. Research has proven that the interaction of the bearing surface and the lubrication film is affected by the bearing's surface texture, geometry, and dimensional tolerances. The challenge now for the automotive manufacturing industry is to understand which processes can be applied on bearing surfaces to reduce the 65% energy loss in engines, 15% of which is caused by friction. This paper will discuss a post grinding process known as microfinishing which optimises the characteristics of a manufactured surface such as roughness, profile, and waviness. Microfinishing is becoming an increasing trend within the automotive industry and has so far been applied on high performance and mass production crank or cam bearing surfaces in bid of friction reduction and extended engine service life. In the near future, microfinishing will be applied to more engine components because of the stringent environmental regulations demands on fuel consumption, reliability, power, and service life of engine components.Keywords: bearings, tribology, friction reduction, energy efficiency
Procedia PDF Downloads 4794368 Learners' Attitudes and Expectations towards Digital Learning Paths
Authors: Eirini Busack
Abstract:
Since the outbreak of the Covid-19 pandemic and the sudden transfer to online teaching, teachers have struggled to reconstruct their teaching and learning materials to adapt them to the new reality of online teaching and learning. Consequently, the pupils’ learning was disrupted during this orientation phase. Due to the above situation, teachers from all fields concluded that it is vital that their pupils should be able to continue their learning even without the teacher being physically present. Various websites and applications have been in use since then in hope that pupils will still enjoy a qualitative education; unfortunately, this was often not the case. To address this issue, it was therefore decided to focus the research on the development of digital learning paths. The fundamentals of these learning paths include the implementation of scenario-based learning (digital storytelling), the integration of media-didactic theory to make it pedagogically appropriate for learners, alongside instructional design knowledge and the drive to promote autonomous learners. This particular research is being conducted within the frame of the research project “Sustainable integration of subject didactic digital teaching-learning concepts” (InDiKo, 2020-2023), which is currently conducted at the University of Education Karlsruhe and investigates how pre-service teachers can acquire the necessary interdisciplinary and subject-specific media-didactic competencies to provide their future learners with digitally enhanced learning opportunities, and how these competencies can be developed continuously and sustainably. As English is one of the subjects involved in this project, the English Department prepared a seminar for the pre-service secondary teachers: “Media-didactic competence development: Developing learning paths & Digital Storytelling for English grammar teaching.” During this seminar, the pre-service teachers plan and design a Moodle-based differentiated lesson sequence on an English grammar topic that is to be tested by secondary school pupils. The focus of the present research is to assess the secondary school pupils’ expectations from an English grammar-focused digital learning path created by pre-service English teachers. The nine digital learning paths that are to be distributed to 25 pupils were produced over the winter and the current summer semester as the artifact of the seminar. Finally, the data to be quantitatively analysed and interpreted derive from the online questionnaires that the secondary school pupils fill in so as to reveal their expectations on what they perceive as a stimulating and thus effective grammar-focused digital learning path.Keywords: digital storytelling, learning paths, media-didactics, autonomous learning
Procedia PDF Downloads 804367 Implementation of Gender Policy in the Georgian National Defence: Key Issues and Challenges
Authors: Vephkhvia Grigalashvili
Abstract:
The defense of Georgia is every citizen’s duty. The present article reviews the principles and standards of gender policy in the Georgian national defense sector. In addition, it looks at mechanisms for ensuring gender equality, going through the relevant Georgian legislation. Furthermore, this work aims to conduct a comparative analysis of defense models of Georgia, Finland, and the Baltic States in order to identify core institutional challenges. The study produced the following findings:(a) The national defense planning is based on the Total Defense approach, which implies a wide involvement of the country`s population in state defense. (b) This political act does not specify gender equality aspects of the Total Defense strategy; (c) According to the Constitution of Georgia, irrespective of gender factors, every citizen of Georgia is legally obliged to participate in state security activities. However, the state has an authority (power of choice) to decide which gender group (male or/and female citizen) must fulfill above mentioned their constitutional commitment. For instance, completion of compulsory military and reserve military services is a male citizen’s duty, whereas professional military service is equally accessible to both genders. The study concludes that effective implementation of the Total Defense concept largely depends on how Georgia uses its capabilities and human resources. Based on the statistical fact that more than 50% of the country’s population are women, Georgia has to elaborate on relevant institutional mechanisms for implementation of gender equality in the national defense organization. In this regard, it would be advisable: (i) to give the legal opportunity to women to serve in compulsory military service, and (ii) to develop labor reserve service as a part of the anti-crisis management system of Georgia.Keywords: gender in defense organisation, gender mechanisms, gender in defense policy, gender policy
Procedia PDF Downloads 1614366 Promoting Personhood and Citizenship Amongst Individuals with Learning Disabilities: An Occupational Therapy Approach
Authors: Rebecca Haythorne
Abstract:
Background: Agendas continuously emphasise the need to increase work based training and opportunities for individuals with learning disabilities. However research and statistics suggest that there is still significant stigma and stereotypes as to what they can contribute, or gain from being part of the working environment. Method: To tackles some of these prejudices an Occupational Therapy based intervention was developed for learning disability service users working at a social enterprise farm. The intervention aimed to increase positive public perception around individual capabilities and encourage individuals with learning disabilities to take ownership and be proud of their individual personhood and citizenship. This was achieved by using components of the Model of Human Occupation to tailor the intervention to individual values, skills and working contributions. The final project involved making creative wall art for public viewing, focusing on 'who works there and what they do'. This was accompanied by a visitor information guide, allowing individuals to tell visitors about themselves, the work they do and why it is meaningful to them. Outcomes: The intervention has helped to increased metal well-being and confidence of learning disability service users “people will know I work here now” and “I now have something to show my family about the work I do at the farm”. The intervention has also increased positive public perception and community awareness “you can really see the effort that’s gone into doing this” and “it’s a really visual experience to see people you don’t expect to see doing this type of work”. Resources left behind have further supported individuals to take ownership in creating more wall art to be sold at the farm shop. Conclusion: the intervention developed has helped to improve mental well-being of both service users and staff and improve community awareness. Due to this, the farm has decided to roll out the intervention to other areas of the social enterprise and is considering having more Occupational Therapy involvement in the future.Keywords: citizenship, intervention, occupational therapy, personhood
Procedia PDF Downloads 4704365 Developing an Intelligent Table Tennis Ball Machine with Human Play Simulation for Technical Training
Authors: Chen-Chi An, Jun-Yi He, Cheng-Han Hsieh, Chen-Ching Ting
Abstract:
This research has successfully developed an intelligent table tennis ball machine with human play simulate all situations of human play to take the service. It is well known; an excellent ball machine can help the table tennis coach to provide more efficient teaching, also give players the good technical training and entertainment. An excellent ball machine should be able to service all balls based on human play simulation due to the conventional competitions are today all taken place for people. In this work, two counter-rotating wheels are used to service the balls, where changing the absolute rotating speeds of the two wheels and the differences of rotating speeds between the two wheels can adjust the struck forces and the rotating speeds of the ball. The relationships between the absolute rotating speed of the two wheels and the struck forces of the ball as well as the differences rotating speeds between the two wheels and the rotating speeds of the ball are experimentally determined for technical development. The outlet speed, the ejected distance, and the rotating speed of the ball were measured by changing the absolute rotating speeds of the two wheels in terms of a series of differences in rotating speed between the two wheels for calibration of the ball machine; where the outlet speed and the ejected distance of the ball were further converted to the struck forces of the ball. In process, the balls serviced by the intelligent ball machine were based on the received calibration curves with help of the computer. Experiments technically used photosensitive devices to detect the outlet and rotating speed of the ball. Finally, this research developed some teaching programs for technical training using three ball machines and received more efficient training.Keywords: table tennis, ball machine, human play simulation, counter-rotating wheels
Procedia PDF Downloads 4294364 The Role of Financial Literacy in Driving Consumer Well-Being
Authors: Amin Nazifi, Amir Raki, Doga Istanbulluoglu
Abstract:
The incorporation of technological advancements into financial services, commonly referred to as Fintech, is primarily aimed at promoting services that are accessible, convenient, and inclusive, thereby benefiting both consumers and businesses. Fintech services employ a variety of technologies, including Artificial Intelligence (AI), blockchain, and big data, to enhance the efficiency and productivity of traditional services. Cryptocurrency, a component of Fintech, is projected to be a trillion-dollar industry, with over 320 million consumers globally investing in various forms of cryptocurrencies. However, these potentially transformative services can also lead to adverse outcomes. For instance, recent Fintech innovations have been increasingly linked to misconduct and disservice, resulting in serious implications for consumer well-being. This could be attributed to the ease of access to Fintech, which enables adults to trade cryptocurrencies, shares, and stocks via mobile applications. However, there is little known about the darker aspects of technological advancements, such as Fintech. Hence, this study aims to generate scholarly insights into the design of robust and resilient Fintech services that can add value to businesses and enhance consumer well-being. Using a mixed-method approach, the study will investigate the personal and contextual factors influencing consumers’ adoption and usage of technology innovations and their impacts on consumer well-being. First, semi-structured interviews will be conducted with a sample of Fintech users until theoretical saturation is achieved. Subsequently, based on the findings of the first study, a quantitative study will be conducted to develop and empirically test the impacts of these factors on consumers’ well-being using an online survey with a sample of 300 participants experienced in using Fintech services. This study will contribute to the growing Transformative Service Research (TSR) literature by addressing the latest priorities in service research and shedding light on the impact of fintech services on consumer well-being.Keywords: consumer well-being, financial literacy, Fintech, service innovation
Procedia PDF Downloads 644363 Cloud Computing Impact on e-Government Adoption
Authors: Ali Elshabrawy
Abstract:
Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges
Procedia PDF Downloads 346