Search results for: recycle service strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7283

Search results for: recycle service strategy

5783 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund

Authors: Chutikarn Sriviboon

Abstract:

The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.

Keywords: effectiveness, quality, labor funds, service

Procedia PDF Downloads 355
5782 Knowledge Management Strategies within a Corporate Environment of Papers

Authors: Daniel J. Glauber

Abstract:

Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.

Keywords: knowledge transfer, management, knowledge management strategies, organizational learning, codification

Procedia PDF Downloads 442
5781 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 121
5780 Research on Models and Selection of Entry Strategies for Catering Industry Based on the Evolutionary Game Theory

Authors: Jianxin Zhu, Na Liu

Abstract:

Entry strategies play a vital role in the development of new enterprises in the catering industry. Different entry strategies will have different effects on the development of new enterprise. Based on the research of scholars at home and abroad, and combining the characteristics of the catering industry, the entry strategies are divided into low-price entry strategies and high-quality entry strategies. Facing the entry of new enterprise, the strategies of incumbent enterprises are divided into response strategies and non-response strategies. This paper uses evolutionary game theory to study the strategic interaction mechanism between incumbent companies and new enterprises. When different initial values and parameter values are set, which strategy will the two-game subjects choose, respectively? Using matlab2016 for numerical simulation, the results show that the choice of strategies for new enterprise and incumbent enterprise is influenced by more than one factor, and the system has different evolution trends under different circumstances. When the parameters were set, the choice of two subjects' strategies mainly depends on the net profit between the strategies.

Keywords: catering industry, entry strategy, evolutionary game, strategic interaction mechanism

Procedia PDF Downloads 132
5779 Library on the Cloud: Universalizing Libraries Based on Virtual Space

Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan

Abstract:

Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.

Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access

Procedia PDF Downloads 661
5778 Comparison of Two Strategies in Thoracoscopic Ablation of Atrial Fibrillation

Authors: Alexander Zotov, Ilkin Osmanov, Emil Sakharov, Oleg Shelest, Aleksander Troitskiy, Robert Khabazov

Abstract:

Objective: Thoracoscopic surgical ablation of atrial fibrillation (AF) includes two technologies in performing of operation. 1st strategy used is the AtriCure device (bipolar, nonirrigated, non clamping), 2nd strategy is- the Medtronic device (bipolar, irrigated, clamping). The study presents a comparative analysis of clinical outcomes of two strategies in thoracoscopic ablation of AF using AtriCure vs. Medtronic devices. Methods: In 2 center study, 123 patients underwent thoracoscopic ablation of AF for the period from 2016 to 2020. Patients were divided into two groups. The first group is represented by patients who applied the AtriCure device (N=63), and the second group is - the Medtronic device (N=60), respectively. Patients were comparable in age, gender, and initial severity of the condition. Among the patients, in group 1 were 65% males with a median age of 57 years, while in group 2 – 75% and 60 years, respectively. Group 1 included patients with paroxysmal form -14,3%, persistent form - 68,3%, long-standing persistent form – 17,5%, group 2 – 13,3%, 13,3% and 73,3% respectively. Median ejection fraction and indexed left atrial volume amounted in group 1 – 63% and 40,6 ml/m2, in group 2 - 56% and 40,5 ml/m2. In addition, group 1 consisted of 39,7% patients with chronic heart failure (NYHA Class II) and 4,8% with chronic heart failure (NYHA Class III), when in group 2 – 45% and 6,7%, respectively. Follow-up consisted of laboratory tests, chest Х-ray, ECG, 24-hour Holter monitor, and cardiopulmonary exercise test. Duration of freedom from AF, distant mortality rate, and prevalence of cerebrovascular events were compared between the two groups. Results: Exit block was achieved in all patients. According to the Clavien-Dindo classification of surgical complications fraction of adverse events was 14,3% and 16,7% (1st group and 2nd group, respectively). Mean follow-up period in the 1st group was 50,4 (31,8; 64,8) months, in 2nd group - 30,5 (14,1; 37,5) months (P=0,0001). In group 1 - total freedom of AF was in 73,3% of patients, among which 25% had additional antiarrhythmic drugs (AADs) therapy or catheter ablation (CA), in group 2 – 90% and 18,3%, respectively (for total freedom of AF P<0,02). At follow-up, the distant mortality rate in the 1st group was – 4,8%, and in the 2nd – no fatal events. Prevalence of cerebrovascular events was higher in the 1st group than in the 2nd (6,7% vs. 1,7% respectively). Conclusions: Despite the relatively shorter follow-up of the 2nd group in the study, applying the strategy using the Medtronic device showed quite encouraging results. Further research is needed to evaluate the effectiveness of this strategy in the long-term period.

Keywords: atrial fibrillation, clamping, ablation, thoracoscopic surgery

Procedia PDF Downloads 110
5777 Helping the Helper: Impact of Teaching Assistantship Program among Psychology Alumni

Authors: Clarissa Delariarte

Abstract:

With the aim of helping the poorest of the poor achieve quality education, Psychology students supported and served as teacher assistants to its Early Childhood Education Center in two barangays since the program began in 1999. Making use of qualitative approach, the impact of the program to 29 alumni who served as teacher assistants between 2000-2014 was assessed. Results show that the impact to the alumni is in cognitive as well as social-emotional in terms of feelings of deep satisfaction and sense of volunteerism which is being carried out in their respective workspaces. They also expressed positive feelings of inspiration, gratefulness and happiness. A wider perspective in life, being confident, creative and resourceful was also articulated as concrete impacts. It is concluded that the program had an impact on helping the helper and is a concrete manifestation of the academe being successful in its commitment of forming individuals into becoming integrated and compassionate in the service of the Church and Society. It implies that more opportunities of helping others be provided to students since, in the final analysis, is actually an opportunity of helping the helper be of better service to others.

Keywords: applied psychology, life skill, qualitative research, quality education

Procedia PDF Downloads 186
5776 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network

Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang

Abstract:

Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.

Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving

Procedia PDF Downloads 330
5775 Application of a Confirmatory Composite Model for Assessing the Extent of Agricultural Digitalization: A Case of Proactive Land Acquisition Strategy (PLAS) Farmers in South Africa

Authors: Mazwane S., Makhura M. N., Ginege A.

Abstract:

Digitalization in South Africa has received considerable attention from policymakers. The support for the development of the digital economy by the South African government has been demonstrated through the enactment of various national policies and strategies. This study sought to develop an index for agricultural digitalization by applying composite confirmatory analysis (CCA). Another aim was to determine the factors that affect the development of digitalization in PLAS farms. Data on the indicators of the three dimensions of digitalization were collected from 300 Proactive Land Acquisition Strategy (PLAS) farms in South Africa using semi-structured questionnaires. Confirmatory composite analysis (CCA) was employed to reduce the items into three digitalization dimensions and ultimately to a digitalization index. Standardized digitalization index scores were extracted and fitted to a linear regression model to determine the factors affecting digitalization development. The results revealed that the model shows practical validity and can be used to measure digitalization development as measures of fit (geodesic distance, standardized root mean square residual, and squared Euclidean distance) were all below their respective 95%quantiles of bootstrap discrepancies (HI95 values). Therefore, digitalization is an emergent variable that can be measured using CCA. The average level of digitalization in PLAS farms was 0.2 and varied significantly across provinces. The factors that significantly influence digitalization development in PLAS land reform farms were age, gender, farm type, network type, and cellular data type. This should enable researchers and policymakers to understand the level of digitalization and patterns of development, as well as correctly attribute digitalization development to the contributing factors.

Keywords: agriculture, digitalization, confirmatory composite model, land reform, proactive land acquisition strategy, South Africa

Procedia PDF Downloads 63
5774 Knowledge Management and Administrative Effectiveness of Non-teaching Staff in Federal Universities in the South-West, Nigeria

Authors: Nathaniel Oladimeji Dixon, Adekemi Dorcas Fadun

Abstract:

Educational managers have observed a downward trend in the administrative effectiveness of non-teaching staff in federal universities in South-west Nigeria. This is evident in the low-quality service delivery of administrators and unaccomplished institutional goals and missions of higher education. Scholars have thus indicated the need for the deployment and adoption of a practice that encourages information collection and sharing among stakeholders with a view to improving service delivery and outcomes. This study examined the extent to which knowledge management correlated with the administrative effectiveness of non-teaching staff in federal universities in South-west Nigeria. The study adopted the survey design. Three federal universities (the University of Ibadan, Federal University of Agriculture, Abeokuta, and Obafemi Awolowo University) were purposively selected because administrative ineffectiveness was more pronounced among non-teaching staff in government-owned universities, and these federal universities were long established. The proportional and stratified random sampling was adopted to select 1156 non-teaching staff across the three universities along the three existing layers of the non-teaching staff: secretarial (senior=311; junior=224), non-secretarial (senior=147; junior=241) and technicians (senior=130; junior=103). Knowledge Management Practices Questionnaire with four sub-scales: knowledge creation (α=0.72), knowledge utilization (α=0.76), knowledge sharing (α=0.79) and knowledge transfer (α=0.83); and Administrative Effectiveness Questionnaire with four sub-scales: communication (α=0.84), decision implementation (α=0.75), service delivery (α=0.81) and interpersonal relationship (α=0.78) were used for data collection. Data were analyzed using descriptive statistics, Pearson product-moment correlation and multiple regression at 0.05 level of significance, while qualitative data were content analyzed. About 59.8% of the non-teaching staff exhibited a low level of knowledge management. The indices of administrative effectiveness of non-teaching staff were rated as follows: service delivery (82.0%), communication (78.0%), decision implementation (71.0%) and interpersonal relationship (68.0%). Knowledge management had significant relationships with the indices of administrative effectiveness: service delivery (r=0.82), communication (r=0.81), decision implementation (r=0.80) and interpersonal relationship (r=0.47). Knowledge management had a significant joint prediction on administrative effectiveness (F (4;1151)= 0.79, R=0.86), accounting for 73.0% of its variance. Knowledge sharing (β=0.38), knowledge transfer (β=0.26), knowledge utilization (β=0.22), and knowledge creation (β=0.06) had relatively significant contributions to administrative effectiveness. Lack of team spirit and withdrawal syndrome is the major perceived constraints to knowledge management practices among the non-teaching staff. Knowledge management positively influenced the administrative effectiveness of the non-teaching staff in federal universities in South-west Nigeria. There is a need to ensure that the non-teaching staff imbibe team spirit and embrace teamwork with a view to eliminating their withdrawal syndromes. Besides, knowledge management practices should be deployed into the administrative procedures of the university system.

Keywords: knowledge management, administrative effectiveness of non-teaching staff, federal universities in the south-west of nigeria., knowledge creation, knowledge utilization, effective communication, decision implementation

Procedia PDF Downloads 102
5773 Research on Strategies of Building a Child Friendly City in Wuhan

Authors: Tianyue Wan

Abstract:

Building a child-friendly city (CFC) contributes to improving the quality of urbanization. It also forms a local system committed to fulfilling children's rights and development. Yet, the work related to CFC is still at the initial stage in China. Therefore, taking Wuhan, the most populous city in central China, as the pilot city would offer some reference for other cities. Based on the analysis of theories and practice examples, this study puts forward the challenges of building a child-friendly city under the particularity of China's national conditions. To handle these challenges, this study uses four methods to collect status data: literature research, site observation, research inquiry, and semantic differential (SD). And it adopts three data analysis methods: case analysis, geographic information system (GIS) analysis, and analytic hierarchy process (AHP) method. Through data analysis, this study identifies the evaluation system and appraises the current situation of Wuhan. According to the status of Wuhan's child-friendly city, this study proposes three strategies: 1) construct the evaluation system; 2) establish a child-friendly space system integrating 'point-line-surface'; 3) build a digitalized service platform. At the same time, this study suggests building a long-term mechanism for children's participation and multi-subject supervision from laws, medical treatment, education, safety protection, social welfare, and other aspects. Finally, some conclusions of strategies about CFC are tried to be drawn to promote the highest quality of life for all citizens in Wuhan.

Keywords: action plan, child friendly city, construction strategy, urban space

Procedia PDF Downloads 90
5772 Evaluation of the Trauma System in a District Hospital Setting in Ireland

Authors: Ahmeda Ali, Mary Codd, Susan Brundage

Abstract:

Importance: This research focuses on devising and improving Health Service Executive (HSE) policy and legislation and therefore improving patient trauma care and outcomes in Ireland. Objectives: The study measures components of the Trauma System in the district hospital setting of the Cavan/Monaghan Hospital Group (CMHG), HSE, Ireland, and uses the collected data to identify the strengths and weaknesses of the CMHG Trauma System organisation, to include governance, injury data, prevention and quality improvement, scene care and facility-based care, and rehabilitation. The information will be made available to local policy makers to provide objective situational analysis to assist in future trauma service planning and service provision. Design, setting and participants: From 28 April to May 28, 2016 a cross-sectional survey using World Health Organisation (WHO) Trauma System Assessment Tool (TSAT) was conducted among healthcare professionals directly involved in the level III trauma system of CMHG. Main outcomes: Identification of the strengths and weaknesses of the Trauma System of CMHG. Results: The participants who reported inadequate funding for pre hospital (62.3%) and facility based trauma care at CMHG (52.5%) were high. Thirty four (55.7%) respondents reported that a national trauma registry (TARN) exists but electronic health records are still not used in trauma care. Twenty one respondents (34.4%) reported that there are system wide protocols for determining patient destination and adequate, comprehensive legislation governing the use of ambulances was enforced, however, there is a lack of a reliable advisory service. Over 40% of the respondents reported uncertainty of the injury prevention programmes available in Ireland; as well as the allocated government funding for injury and violence prevention. Conclusions: The results of this study contributed to a comprehensive assessment of the trauma system organisation. The major findings of the study identified three fundamental areas: the inadequate funding at CMHG, the QI techniques and corrective strategies used, and the unfamiliarity of existing prevention strategies. The findings direct the need for further research to guide future development of the trauma system at CMHG (and in Ireland as a whole) in order to maximise best practice and to improve functional and life outcomes.

Keywords: trauma, education, management, system

Procedia PDF Downloads 243
5771 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 305
5770 A Study on the Small Biped Soft Robot with Two Insect-Like Nails

Authors: Mami Nishida

Abstract:

This paper presented a study on the development and control of a small biped soft robot using shape memory alloys (SMAs). Author proposed a flexible flat plate (FFP) actuators consisting of a thin polyethylene plate and SMAs. This actuator has a nail like an insect. This robot moves from the front to back and from left to right using two nails. The walking robot has two degrees of freedom and is controlled by switching the ON-OFF current signals to the SMA based FFPs. The resulting small biped soft robot weighs a mere 4.7 g (with a height of 67 mm). The small robot realizes biped walking by transferring the elastic potential energy (generated by deflections of the SMA based FFPs) to kinematic energy. Experimental results demonstrated the viability and utility of the small biped soft robot with the proposed SMA-based FFPs and the control strategy to achieve walking behavior.

Keywords: biped soft robot with nails, flexible flat plate (FFP) actuators, ON-OFF control strategy, shape memory alloys (SMA)

Procedia PDF Downloads 502
5769 Evaluation of the Role of Advocacy and the Quality of Care in Reducing Health Inequalities for People with Autism, Intellectual and Developmental Disabilities at Sheffield Teaching Hospitals

Authors: Jonathan Sahu, Jill Aylott

Abstract:

Individuals with Autism, Intellectual and Developmental disabilities (AIDD) are one of the most vulnerable groups in society, hampered not only by their own limitations to understand and interact with the wider society, but also societal limitations in perception and understanding. Communication to express their needs and wishes is fundamental to enable such individuals to live and prosper in society. This research project was designed as an organisational case study, in a large secondary health care hospital within the National Health Service (NHS), to assess the quality of care provided to people with AIDD and to review the role of advocacy to reduce health inequalities in these individuals. Methods: The research methodology adopted was as an “insider researcher”. Data collection included both quantitative and qualitative data i.e. a mixed method approach. A semi-structured interview schedule was designed and used to obtain qualitative and quantitative primary data from a wide range of interdisciplinary frontline health care workers to assess their understanding and awareness of systems, processes and evidence based practice to offer a quality service to people with AIDD. Secondary data were obtained from sources within the organisation, in keeping with “Case Study” as a primary method, and organisational performance data were then compared against national benchmarking standards. Further data sources were accessed to help evaluate the effectiveness of different types of advocacy that were present in the organisation. This was gauged by measures of user and carer experience in the form of retrospective survey analysis, incidents and complaints. Results: Secondary data demonstrate near compliance of the Organisation with the current national benchmarking standard (Monitor Compliance Framework). However, primary data demonstrate poor knowledge of the Mental Capacity Act 2005, poor knowledge of organisational systems, processes and evidence based practice applied for people with AIDD. In addition there was poor knowledge and awareness of frontline health care workers of advocacy and advocacy schemes for this group. Conclusions: A significant amount of work needs to be undertaken to improve the quality of care delivered to individuals with AIDD. An operational strategy promoting the widespread dissemination of information may not be the best approach to deliver quality care and optimal patient experience and patient advocacy. In addition, a more robust set of standards, with appropriate metrics, needs to be developed to assess organisational performance which will stand the test of professional and public scrutiny.

Keywords: advocacy, autism, health inequalities, intellectual developmental disabilities, quality of care

Procedia PDF Downloads 217
5768 Improving Efficiency of Organizational Performance: The Role of Human Resources in Supply Chains and Job Rotation Practice

Authors: Moh'd Anwer Al-Shboul

Abstract:

Jordan Customs (JC) has been established to achieve objectives that must be consistent with the guidance of the wise leadership and its aspirations toward tomorrow. Therefore, it has developed several needed tools to provide a distinguished service to simplify work procedures and used modern technologies. A supply chain (SC) consists of all parties that are involved directly or indirectly in order to fulfill a customer request, which includes manufacturers, suppliers, shippers, retailers and even customer brokers. Within each firm, the SC includes all functions involved in receiving a filling a customers’ requests; one of the main functions include customer service. JC and global SCs are evolving into dynamic environment, which requires flexibility, effective communication, and team management. Thus, human resources (HRs) insight in these areas are critical for the effective development of global process network. The importance of HRs has increased significantly due to the role of employees depends on their knowledge, competencies, abilities, skills, and motivations. Strategic planning in JC began at the end of the 1990’s including operational strategy for Human Resource Management and Development (HRM&D). However, a huge transformation in human resources happened at the end of 2006; new employees’ regulation for customs were prepared, approved and applied at the end of 2007. Therefore, many employees lost their positions, while others were selected based on professorial recruitment and selection process (enter new blood). One of several policies that were applied by human resources in JC department is job rotation. From the researcher’s point of view, it was not based on scientific basis to achieve its goals and objectives, which at the end leads to having a significant negative impact on the Organizational Performance (OP) and weak job rotation approach. The purpose of this study is to call attention to re-review the applying process and procedure of job rotation that HRM directorate is currently applied at JC. Furthermore, it presents an overview of managing the HRs in the SC network that affects their success. The research methodology employed in this study was described as qualitative by conducting few interviews with managers, internal employee, external clients and reviewing the related literature to collect some qualitative data from secondary sources. Thus, conducting frequently and unstructured job rotation policy (i.e. monthly) will have a significant negative impact on JC performance as a whole. The results of this study show that the main impacts will affect on three main elements in JC: (1) internal employees' performance; (2) external clients, who are dealing with customs services; and finally, JC performance as a whole. In order to implement a successful and perfect job rotation technique at JC in a scientific way and to achieve its goals and objectives; JCs should be taken into consideration the proposed solutions and recommendations that will be presented in this study.

Keywords: efficiency, supply chain, human resources, job rotation, organizational performance, Jordan customs

Procedia PDF Downloads 213
5767 The Role of Brand Loyalty in Generating Positive Word of Mouth among Malaysian Hypermarket Customers

Authors: S. R. Nikhashemi, Laily Haj Paim, Ali Khatibi

Abstract:

Structural Equation Modeling (SEM) was used to test a hypothesized model explaining Malaysian hypermarket customers’ perceptions of brand trust (BT), customer perceived value (CPV) and perceived service quality (PSQ) on building their brand loyalty (CBL) and generating positive word-of-mouth communication (WOM). Self-administered questionnaires were used to collect data from 374 Malaysian hypermarket customers from Mydin, Tesco, Aeon Big and Giant in Kuala Lumpur, a metropolitan city of Malaysia. The data strongly supported the model exhibiting that BT, CPV and PSQ are prerequisite factors in building customer brand loyalty, while PSQ has the strongest effect on prediction of customer brand loyalty compared to other factors. Besides, the present study suggests the effect of the aforementioned factors via customer brand loyalty strongly contributes to generate positive word of mouth communication.

Keywords: brand trust, perceived value, Perceived Service Quality, Brand loyalty, positive word of mouth communication

Procedia PDF Downloads 482
5766 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns

Authors: Vitali Kremez

Abstract:

The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.

Keywords: bitcoin, cybercrime, ransomware, Russia

Procedia PDF Downloads 195
5765 The Effect of Bearing Surface Finish on the Engine's Lubrication System Performance

Authors: Kudakwashe Diana Nyamugure

Abstract:

Engine design has evolved to suit new industry standards of smaller compact designs that operate at high temperatures and even higher stress loads. Research has proven that the interaction of the bearing surface and the lubrication film is affected by the bearing's surface texture, geometry, and dimensional tolerances. The challenge now for the automotive manufacturing industry is to understand which processes can be applied on bearing surfaces to reduce the 65% energy loss in engines, 15% of which is caused by friction. This paper will discuss a post grinding process known as microfinishing which optimises the characteristics of a manufactured surface such as roughness, profile, and waviness. Microfinishing is becoming an increasing trend within the automotive industry and has so far been applied on high performance and mass production crank or cam bearing surfaces in bid of friction reduction and extended engine service life. In the near future, microfinishing will be applied to more engine components because of the stringent environmental regulations demands on fuel consumption, reliability, power, and service life of engine components.

Keywords: bearings, tribology, friction reduction, energy efficiency

Procedia PDF Downloads 479
5764 Lived Experiences of Parents in Disciplining Their Children

Authors: Bernardino Vinoya, Cassandra D. Batton, Samantha Gayle M. Bonavente, Johnson O. Canoza, Lhea Flynn B. Capones, Camille S. Dispo, Johanna Neilvin T. Dontogan, Louise Angelica C. Lipana, Charlene Pearl P. Navalta, Rechelle Vhen W. Payo-os, Mary Reyna D. Ridao, Rushnol Jade P. Tupac, Pauline B. Sol

Abstract:

Parenting is preparing children for life as productive adults and discipline strategies are needed to achieve it like non-aggressive, psychologically aggressive and physical discipline. The effects of disciplinary strategies on children are well explored as evidenced by existing studies, local and international laws and active international organizations which are all brimmed towards child protection but status quo shows a profound scarcity of studies engaged in the effects of disciplining the child on the parent. To know the deeper unexplored reasons and untold stories of the parent, mainly the lived experiences of parents in disciplining their children. Design is descriptive phenomelogical. Participants were chosen using snowball purposive sampling. Data were collected through interview with the general question, “Ano ang mga karanasan ninyo sa pagdidisiplina ng inyong anak (What are your experiences when disciplining your child?)”, followed with unstructured questions. Collaizi method was used in analyzing data. Data collected was verified through focused group discussion. Results show three main themes: Reason, Disciplinary Strategy, and Aftermath. The use of disciplinary strategy is influenced by the experiences of the parent, the triggers like the child’s misbehavior and parental desires or wishes for the child. Disciplinary strategy can either be physical punishment or verbal. Parent’s generally used both when children disrespects or disobeys. Parents also experience both positive and negative effects on their physical, social, emotional aspects after disciplining their children. As a result, parents use coping mechanisms to maintain ego stability. Disciplining a child is a cyclical process. Parents, just like the child will also experience both positive and negative outcomes after using different disciplinary strategies. Future researchers can replicate study or use triangulation in multi-site qualitative and quantitative studies, professors can teach findings on parents in the concepts of pediatric nursing and apply the findings in the clinical area particularly when dealing with families.

Keywords: parents, disciplinary strategy, parental effects, pediatric nursing

Procedia PDF Downloads 455
5763 Learners' Attitudes and Expectations towards Digital Learning Paths

Authors: Eirini Busack

Abstract:

Since the outbreak of the Covid-19 pandemic and the sudden transfer to online teaching, teachers have struggled to reconstruct their teaching and learning materials to adapt them to the new reality of online teaching and learning. Consequently, the pupils’ learning was disrupted during this orientation phase. Due to the above situation, teachers from all fields concluded that it is vital that their pupils should be able to continue their learning even without the teacher being physically present. Various websites and applications have been in use since then in hope that pupils will still enjoy a qualitative education; unfortunately, this was often not the case. To address this issue, it was therefore decided to focus the research on the development of digital learning paths. The fundamentals of these learning paths include the implementation of scenario-based learning (digital storytelling), the integration of media-didactic theory to make it pedagogically appropriate for learners, alongside instructional design knowledge and the drive to promote autonomous learners. This particular research is being conducted within the frame of the research project “Sustainable integration of subject didactic digital teaching-learning concepts” (InDiKo, 2020-2023), which is currently conducted at the University of Education Karlsruhe and investigates how pre-service teachers can acquire the necessary interdisciplinary and subject-specific media-didactic competencies to provide their future learners with digitally enhanced learning opportunities, and how these competencies can be developed continuously and sustainably. As English is one of the subjects involved in this project, the English Department prepared a seminar for the pre-service secondary teachers: “Media-didactic competence development: Developing learning paths & Digital Storytelling for English grammar teaching.” During this seminar, the pre-service teachers plan and design a Moodle-based differentiated lesson sequence on an English grammar topic that is to be tested by secondary school pupils. The focus of the present research is to assess the secondary school pupils’ expectations from an English grammar-focused digital learning path created by pre-service English teachers. The nine digital learning paths that are to be distributed to 25 pupils were produced over the winter and the current summer semester as the artifact of the seminar. Finally, the data to be quantitatively analysed and interpreted derive from the online questionnaires that the secondary school pupils fill in so as to reveal their expectations on what they perceive as a stimulating and thus effective grammar-focused digital learning path.

Keywords: digital storytelling, learning paths, media-didactics, autonomous learning

Procedia PDF Downloads 80
5762 Unlocking E-commerce: Analyzing User Behavior and Segmenting Customers for Strategic Insights

Authors: Aditya Patil, Arun Patil, Vaishali Patil, Sudhir Chitnis, Anjum Patel

Abstract:

Rapid growth has given e-commerce platforms a lot of client behavior and spending data. To maximize their strategy, businesses must understand how customers utilize online shopping platforms and what influences their purchases. Our research focuses on e-commerce user behavior and purchasing trends. This extensive study examines spending and user behavior. Regression and grouping disclose relevant data from the dataset. We can understand user spending trends via multilevel regression. We can analyze how pricing, user demographics, and product categories affect customer purchase decisions with this technique. Clustering groups consumers by spending. Important information was found. Purchase habits vary by user group. Our analysis illuminates the complex world of e-commerce consumer behavior and purchase trends. Understanding user behavior helps create effective e-commerce marketing strategies. This market can benefit from K-means clustering. This study focuses on tailoring strategies to user groups and improving product and price effectiveness. Customer buying behaviors across categories were shown via K-means clusters. Average spending is highest in Cluster 4 and lowest in Cluster 3. Clothing is less popular than gadgets and appliances around the holidays. Cluster spending distribution is examined using average variables. Our research enhances e-commerce analytics. Companies can improve customer service and decision-making with this data.

Keywords: e-commerce, regression, clustering, k-means

Procedia PDF Downloads 18
5761 Promoting Personhood and Citizenship Amongst Individuals with Learning Disabilities: An Occupational Therapy Approach

Authors: Rebecca Haythorne

Abstract:

Background: Agendas continuously emphasise the need to increase work based training and opportunities for individuals with learning disabilities. However research and statistics suggest that there is still significant stigma and stereotypes as to what they can contribute, or gain from being part of the working environment. Method: To tackles some of these prejudices an Occupational Therapy based intervention was developed for learning disability service users working at a social enterprise farm. The intervention aimed to increase positive public perception around individual capabilities and encourage individuals with learning disabilities to take ownership and be proud of their individual personhood and citizenship. This was achieved by using components of the Model of Human Occupation to tailor the intervention to individual values, skills and working contributions. The final project involved making creative wall art for public viewing, focusing on 'who works there and what they do'. This was accompanied by a visitor information guide, allowing individuals to tell visitors about themselves, the work they do and why it is meaningful to them. Outcomes: The intervention has helped to increased metal well-being and confidence of learning disability service users “people will know I work here now” and “I now have something to show my family about the work I do at the farm”. The intervention has also increased positive public perception and community awareness “you can really see the effort that’s gone into doing this” and “it’s a really visual experience to see people you don’t expect to see doing this type of work”. Resources left behind have further supported individuals to take ownership in creating more wall art to be sold at the farm shop. Conclusion: the intervention developed has helped to improve mental well-being of both service users and staff and improve community awareness. Due to this, the farm has decided to roll out the intervention to other areas of the social enterprise and is considering having more Occupational Therapy involvement in the future.

Keywords: citizenship, intervention, occupational therapy, personhood

Procedia PDF Downloads 470
5760 Developing an Intelligent Table Tennis Ball Machine with Human Play Simulation for Technical Training

Authors: Chen-Chi An, Jun-Yi He, Cheng-Han Hsieh, Chen-Ching Ting

Abstract:

This research has successfully developed an intelligent table tennis ball machine with human play simulate all situations of human play to take the service. It is well known; an excellent ball machine can help the table tennis coach to provide more efficient teaching, also give players the good technical training and entertainment. An excellent ball machine should be able to service all balls based on human play simulation due to the conventional competitions are today all taken place for people. In this work, two counter-rotating wheels are used to service the balls, where changing the absolute rotating speeds of the two wheels and the differences of rotating speeds between the two wheels can adjust the struck forces and the rotating speeds of the ball. The relationships between the absolute rotating speed of the two wheels and the struck forces of the ball as well as the differences rotating speeds between the two wheels and the rotating speeds of the ball are experimentally determined for technical development. The outlet speed, the ejected distance, and the rotating speed of the ball were measured by changing the absolute rotating speeds of the two wheels in terms of a series of differences in rotating speed between the two wheels for calibration of the ball machine; where the outlet speed and the ejected distance of the ball were further converted to the struck forces of the ball. In process, the balls serviced by the intelligent ball machine were based on the received calibration curves with help of the computer. Experiments technically used photosensitive devices to detect the outlet and rotating speed of the ball. Finally, this research developed some teaching programs for technical training using three ball machines and received more efficient training.

Keywords: table tennis, ball machine, human play simulation, counter-rotating wheels

Procedia PDF Downloads 429
5759 The Role of Financial Literacy in Driving Consumer Well-Being

Authors: Amin Nazifi, Amir Raki, Doga Istanbulluoglu

Abstract:

The incorporation of technological advancements into financial services, commonly referred to as Fintech, is primarily aimed at promoting services that are accessible, convenient, and inclusive, thereby benefiting both consumers and businesses. Fintech services employ a variety of technologies, including Artificial Intelligence (AI), blockchain, and big data, to enhance the efficiency and productivity of traditional services. Cryptocurrency, a component of Fintech, is projected to be a trillion-dollar industry, with over 320 million consumers globally investing in various forms of cryptocurrencies. However, these potentially transformative services can also lead to adverse outcomes. For instance, recent Fintech innovations have been increasingly linked to misconduct and disservice, resulting in serious implications for consumer well-being. This could be attributed to the ease of access to Fintech, which enables adults to trade cryptocurrencies, shares, and stocks via mobile applications. However, there is little known about the darker aspects of technological advancements, such as Fintech. Hence, this study aims to generate scholarly insights into the design of robust and resilient Fintech services that can add value to businesses and enhance consumer well-being. Using a mixed-method approach, the study will investigate the personal and contextual factors influencing consumers’ adoption and usage of technology innovations and their impacts on consumer well-being. First, semi-structured interviews will be conducted with a sample of Fintech users until theoretical saturation is achieved. Subsequently, based on the findings of the first study, a quantitative study will be conducted to develop and empirically test the impacts of these factors on consumers’ well-being using an online survey with a sample of 300 participants experienced in using Fintech services. This study will contribute to the growing Transformative Service Research (TSR) literature by addressing the latest priorities in service research and shedding light on the impact of fintech services on consumer well-being.

Keywords: consumer well-being, financial literacy, Fintech, service innovation

Procedia PDF Downloads 64
5758 Cloud Computing Impact on e-Government Adoption

Authors: Ali Elshabrawy

Abstract:

Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.

Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges

Procedia PDF Downloads 346
5757 Multi-Agent Searching Adaptation Using Levy Flight and Inferential Reasoning

Authors: Sagir M. Yusuf, Chris Baber

Abstract:

In this paper, we describe how to achieve knowledge understanding and prediction (Situation Awareness (SA)) for multiple-agents conducting searching activity using Bayesian inferential reasoning and learning. Bayesian Belief Network was used to monitor agents' knowledge about their environment, and cases are recorded for the network training using expectation-maximisation or gradient descent algorithm. The well trained network will be used for decision making and environmental situation prediction. Forest fire searching by multiple UAVs was the use case. UAVs are tasked to explore a forest and find a fire for urgent actions by the fire wardens. The paper focused on two problems: (i) effective agents’ path planning strategy and (ii) knowledge understanding and prediction (SA). The path planning problem by inspiring animal mode of foraging using Lévy distribution augmented with Bayesian reasoning was fully described in this paper. Results proof that the Lévy flight strategy performs better than the previous fixed-pattern (e.g., parallel sweeps) approaches in terms of energy and time utilisation. We also introduced a waypoint assessment strategy called k-previous waypoints assessment. It improves the performance of the ordinary levy flight by saving agent’s resources and mission time through redundant search avoidance. The agents (UAVs) are to report their mission knowledge at the central server for interpretation and prediction purposes. Bayesian reasoning and learning were used for the SA and results proof effectiveness in different environments scenario in terms of prediction and effective knowledge representation. The prediction accuracy was measured using learning error rate, logarithm loss, and Brier score and the result proves that little agents mission that can be used for prediction within the same or different environment. Finally, we described a situation-based knowledge visualization and prediction technique for heterogeneous multi-UAV mission. While this paper proves linkage of Bayesian reasoning and learning with SA and effective searching strategy, future works is focusing on simplifying the architecture.

Keywords: Levy flight, distributed constraint optimization problem, multi-agent system, multi-robot coordination, autonomous system, swarm intelligence

Procedia PDF Downloads 144
5756 Quality Assessment and Classification of Recycled Aggregates from CandDW According to the European Standards

Authors: M. Eckert, D. Mendes, J P. Gonçalves, C. Moço, M. Oliveira

Abstract:

The intensive extraction of natural aggregates leads to both depletion of natural resources and unwanted environmental impacts. On the other hand, uncontrolled disposal of Construction and Demolition Wastes (C&DW) causes the lifetime reduction of landfills. It is known that the European Union produces, each year, about 850 million tons of C&DW. For all the member States of the European Union, one of the milestones to be reached by 2020, according to the Resource Efficiency Roadmap (COM (2011) 571) of the European Commission, is to recycle 70% of the C&DW. In this work, properties of different types of recycled C&DW aggregates and natural aggregates were compared. Assays were performed according to European Standards (EN 13285; EN 13242+A1; EN 12457-4; EN 12620; EN 13139) for the characterization of there: physical, mechanical and chemical properties. Not standardized tests such as water absorption over time, mass stability and post compaction sieve analysis were also carried out. The tested recycled C&DW aggregates were classified according to the requirements of the European Standards regarding there potential use in concrete, mortar, unbound layers of road pavements and embankments. The results of the physical and mechanical properties of recycled C&DW aggregates indicated, in general, lower quality properties when compared to natural aggregates, particularly, for concrete preparation and unbound layers of road pavements. The results of the chemical properties attested that the C&DW aggregates constitute no environmental risk. It was concluded that recycled aggregates produced from C&DW have the potential to be used in many applications.

Keywords: recycled aggregate, sustainability, aggregate properties, European Standard Classification

Procedia PDF Downloads 675
5755 Preventing the Drought of Lakes by Using Deep Reinforcement Learning in France

Authors: Farzaneh Sarbandi Farahani

Abstract:

Drought and decrease in the level of lakes in recent years due to global warming and excessive use of water resources feeding lakes are of great importance, and this research has provided a structure to investigate this issue. First, the information required for simulating lake drought is provided with strong references and necessary assumptions. Entity-Component-System (ECS) structure has been used for simulation, which can consider assumptions flexibly in simulation. Three major users (i.e., Industry, agriculture, and Domestic users) consume water from groundwater and surface water (i.e., streams, rivers and lakes). Lake Mead has been considered for simulation, and the information necessary to investigate its drought has also been provided. The results are presented in the form of a scenario-based design and optimal strategy selection. For optimal strategy selection, a deep reinforcement algorithm is developed to select the best set of strategies among all possible projects. These results can provide a better view of how to plan to prevent lake drought.

Keywords: drought simulation, Mead lake, entity component system programming, deep reinforcement learning

Procedia PDF Downloads 90
5754 Coumestrol Induced Apoptosis in Breast Cancer MCF-7 Cells via Redox Cycling of Copper and ROS Generation: Implications of Copper Chelation Strategy in Cancer Treatment

Authors: Atif Zafar Khan, Swarnendra Singh, Imrana Naseem

Abstract:

Breast cancer is one of the most frequent malignancies in women worldwide and a leading cause of cancer-related deaths among women. Therefore, there is a need to identify new chemotherapeutic strategies for cancer treatment. Unlike normal cells, cancer cells contain elevated copper levels which play an integral role in angiogenesis. Copper is an important metal ion associated with the chromatin DNA, particularly with guanine. Thus, targeting copper via copper-specific chelators in cancer cells can serve as effective anticancer strategy. Keeping in view these facts, we evaluated the anticancer activity and copper-dependent cytotoxic effect of coumestrol (phytoestrogen in soybean products) in breast cancer MCF-7 cells. Coumestrol inhibited proliferation and induced apoptosis in MCF-7 cells, which was prevented by copper chelator neocuproine and ROS scavengers. Coumestrol treatment induced ROS generation coupled to DNA fragmentation, up-regulation of p53/p21, cell cycle arrest at G1/S phase, mitochondrial membrane depolarization and caspases 9/3 activation. All these effects were suppressed by ROS scavengers and neocuproine. These results suggest that coumestrol targets elevated copper for redox cycling to generate ROS leading to DNA fragmentation. DNA damage leads to p53 up-regulation which directs the cell cycle arrest at G1/S phase and promotes caspase-dependent apoptosis of MCF-7 cells. In conclusion, coumestrol induces pro-oxidant cell death by chelating cellular copper to produce copper-coumestrol complexes that engages in redox cycling in breast cancer cells. Thus, targeting elevated copper levels might be a potential therapeutic strategy for selective cytotoxic action against malignant cells.

Keywords: apoptosis, breast cancer, copper chelation, coumestrol, reactive oxygens species, redox cycling

Procedia PDF Downloads 245