Search results for: build back better (BBB)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3109

Search results for: build back better (BBB)

1489 Gender Differences in Negotiation: Considering the Usual Driving Forces

Authors: Claude Alavoine, Ferkan Kaplanseren

Abstract:

Negotiation is a specific form of interaction based on communication in which the parties enter into deliberately, each with clear but different interests or goals and a mutual dependency towards a decision due to be taken at the end of the confrontation. Consequently, negotiation is a complex activity involving many different disciplines from the strategic aspects and the decision making process to the evaluation of alternatives or outcomes and the exchange of information. While gender differences can be considered as one of the most researched topic within negotiation studies, empirical works and theory present many conflicting evidences and results about the role of gender in the process or the outcome. Furthermore, little interest has been shown over gender differences in the definition of what is negotiation, its essence or fundamental elements. Or, as differences exist in practices, it might be essential to study if the starting point of these discrepancies does not come from different considerations about what is negotiation and what will encourage the participants in their strategic decisions. Some recent and promising experiments made with diverse groups show that male and female participants in a common and shared situation barely consider the same way the concepts of power, trust or stakes which are largely considered as the usual driving forces of any negotiation. Furthermore, results from Human Resource self-assessment tests display and confirm considerable differences between individuals regarding essential behavioral dimensions like capacity to improvise and to achieve, aptitude to conciliate or to compete and orientation towards power and group domination which are also part of negotiation skills. Our intention in this paper is to confront these dimensions with negotiation’s usual driving forces in order to build up new paths for further research.

Keywords: negotiation, gender, trust, power, stakes, strategies

Procedia PDF Downloads 507
1488 Live Concert Performances in Preschool: Requirements of a Successful Concert for Young Children

Authors: Mei-Ying Liao

Abstract:

The main purpose of this study was to examine the requirements of a successful concert for young children in preschool in Taiwan. This study reports a case study of a preschool’s experience which undertook ten concerts for young children. The main audiences were young children who were two to six years of age. The performers, including children’s family, amateurs and professional performers, were invited to perform music instruments or singing twice a week. The performers participated in these concerts separately, as a solo or ensemble performance. There were totally ten concerts. The structure of concert included the performance, musical activities, questions and answers, song requests, and exploration of instruments. Data collection included interviews with children, teachers and performers, concert observations, and footnotes. Results showed that the requirements of a successful and meaningful concert for young children were suggested to include concert preparation, concert, and post activities. The concert organizer, host and classroom teachers played vital roles for a successful concert. The organizer had to organize the programs and prepared for the concerts based on the needs and interests of their audience of young children, engage their attention and offer the potential to expand their musical worlds. The hosts had to build a bridge between performers and young children who had to know how they could delight and educate children. Concerts combined games, storytelling, instrument exploration and great music had great effects. Finally, the classroom teachers had to do the extension activities after the concerts so that the children will involve more and get more enthusiasm in concerts.

Keywords: case study, concert, music education, performance

Procedia PDF Downloads 344
1487 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 80
1486 Concrete Mix Design Using Neural Network

Authors: Rama Shanker, Anil Kumar Sachan

Abstract:

Basic ingredients of concrete are cement, fine aggregate, coarse aggregate and water. To produce a concrete of certain specific properties, optimum proportion of these ingredients are mixed. The important factors which govern the mix design are grade of concrete, type of cement and size, shape and grading of aggregates. Concrete mix design method is based on experimentally evolved empirical relationship between the factors in the choice of mix design. Basic draw backs of this method are that it does not produce desired strength, calculations are cumbersome and a number of tables are to be referred for arriving at trial mix proportion moreover, the variation in attainment of desired strength is uncertain below the target strength and may even fail. To solve this problem, a lot of cubes of standard grades were prepared and attained 28 days strength determined for different combination of cement, fine aggregate, coarse aggregate and water. An artificial neural network (ANN) was prepared using these data. The input of ANN were grade of concrete, type of cement, size, shape and grading of aggregates and output were proportions of various ingredients. With the help of these inputs and outputs, ANN was trained using feed forward back proportion model. Finally trained ANN was validated, it was seen that it gave the result with/ error of maximum 4 to 5%. Hence, specific type of concrete can be prepared from given material properties and proportions of these materials can be quickly evaluated using the proposed ANN.

Keywords: aggregate proportions, artificial neural network, concrete grade, concrete mix design

Procedia PDF Downloads 385
1485 Older Adult Grandparents' Voices as a Principle Care Giver in a Skipped-Generation Family

Authors: Kerdsiri Hongthai, Darunee Jongudomkarn, Rutja Phuphaibul

Abstract:

In Thailand, many adults in rural areas migrate to seek employ¬ment resulting in skipped-generation family where grandparents care for grandchildren with no other adults present. This is a preliminary study using qualitative case study methods, aimed to explore the situations of older adult grandparents' experiences in skipped-generation family in North-East of Thailand. Data were collected by in-depth inter¬views with 6 grandparents living in skipped-generation families; 5 females and 1 males grandparents, aged 62-75, some of them have diabetes mellitus, hypertension, during November to December, 2017. The finding themes are: ‘Caught up in the middle’: the older adults were pleased to have grandchildren but, at the same time, acknowledge the burden that this placed on them, especially when the migrant children failed to send enough money back to support the family. ‘Getting bad health’: they reported to be fatigued and stressed due to burden of caring for their grandchildren without support. This situation can aggravate problems of poor health status and be worsening economic status of the grandparents. In some cases of deprivation, the grandparents feel that having to be the sole care providers of their grandchildren can negative adversely affect their mental status. It is important to find out in other sectors similar to Thailand and lead to more in-depth research to answer the research questions about policy and social support in skipped-generation family in the future.

Keywords: older adult grandparents, experiences, principle care giver, skipped-generation family

Procedia PDF Downloads 142
1484 The Higher Education System in Jordan: Philosophy and Premises Preparation

Authors: Ihsan Orsan Oglah Elrabbaei

Abstract:

This research stems from the philosophy of education notion, as it is a fundamental pillar within or component of the philosophy of education. It is the general framework that society takes towards the future in order to build its integrated educational system amid the variables that surround it, in order to prepare its members in all aspects of cognitive, skill, and behavioral life, so that there is a clear concept of the system of productive values, according to the vision of philosophy that defines its future roles, which can be found in the system of productive values. With the resignation, everything changes. As a result, the philosophy of education is anticipated to evolve in response to perceived changes in society in terms of the nature of its human and material resources. The study will answer the following questions: Has the philosophy of education changed to accommodate this change? Alternatively, is the change that occurs because of natural growth without education having a role in directing this change and being aware of it in order to fit with national, regional, and global changes? Were the national educational goals and curricula and their programs viewed through the lenses of interest? On the other hand, do things happen without realizing that the philosophy of education has changed and that it proceeds according to the natural rolling of the invisible impulse? The study concluded that we must reconsider the philosophy of education and redefine who is an educated person. In addition, to recognize all the values of the roles that the individual can play in his society, according to his abilities, and with respect. Moreover, building a new philosophy of education based on what society can look at and what it wants from a flexible future takes the concept of changing life values, their contents, diversity, and the roles of each individual in them.

Keywords: higher education system, jordan, philosophy, premises preparation.

Procedia PDF Downloads 93
1483 Developing a Model for the Relation between Heritage and Place Identity

Authors: A. Arjomand Kermani, N. Charbgoo, M. Alalhesabi

Abstract:

In the situation of great acceleration of changes and the need for new developments in the cities on one hand and conservation and regeneration approaches on the other hand, place identity and its relation with heritage context have taken on new importance. This relation is generally mutual and complex one. The significant point in this relation is that the process of identifying something as heritage rather than just historical  phenomena, brings that which may be inherited into the realm of identity. In planning and urban design as well as environmental psychology and phenomenology domain, place identity and its attributes and components were studied and discussed. However, the relation between physical environment (especially heritage) and identity has been neglected in the planning literature. This article aims to review the knowledge on this field and develop a model on the influence and relation of these two major concepts (heritage and identity). To build this conceptual model, we draw on available literature in environmental psychology as well as planning on place identity and heritage environment using a descriptive-analytical methodology to understand how they can inform the planning strategies and governance policies. A cross-disciplinary analysis is essential to understand the nature of place identity and heritage context and develop a more holistic model of their relationship in order to be employed in planning process and decision making. Moreover, this broader and more holistic perspective would enable both social scientists and planners to learn from one another’s expertise for a fuller understanding of community dynamics. The result indicates that a combination of these perspectives can provide a richer understanding—not only of how planning impacts our experience of place, but also how place identity can impact community planning and development.

Keywords: heritage, inter-disciplinary study, place identity, planning

Procedia PDF Downloads 420
1482 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 252
1481 Evaluation of Nematicidal Action of Some Botanicals on Plant-Parasitic Nematode

Authors: Lakshmi, Yakshita Awasthi, Deepika, Lovleen Jha, Archna Kumar

Abstract:

From the back of centuries, plant-parasitic nematodes (PPN) have been recognized as a major threat to agriculturalists globally. It causes 21.3% global food loss annually. The utilization of harmful chemical pesticides to minimize the nematode population may cause acute and delayed health hazards and harmful impacts on human health. In recent years, a variety of plants have been evaluated for their nematicidal properties and efficacy in the management of plant-parasitic nematodes. Several Phyto-nematicides are available, but most of them are incapable of sustainable management of PPN, especially Meloidogyne spp. Thus, there is a great need for a new eco-friendly, highly efficient, sustainable control measure for this nematode species. Keeping all these facts and after reviewing the literature, aqueous extract of Cymbopogon citratus, Tagetes erecta, and Azadirachta indica were prepared by adding distilled water (1 g sample mixed with 10ml of water). In vitro studies were conducted to evaluate the efficacious nature of targeted botanicals against PPN Meloidogyne spp. The mortality status of PPN was recorded by counting the live and dead individuals after applying 100μl of selected extract. The impact was observed at different time durations, i.e., 24h and 48h. The result showed that the highest 100% mortality was at 48h in all three extracts. Thus, these extracts, with the addition of a suitable shelf-life enhancer, may be exploited in different nematode control programs as an economical, sustainable measure.

Keywords: Meloidogyne, Cymbopogon citratus, Tagetes erecta, Azadirachta indica, nematicidal

Procedia PDF Downloads 159
1480 Challenges for the Implementation of Community Led Total Sanitation in Rural Malawi

Authors: Save Kumwenda, Khumbo Kalulu, Kondwani Chidziwisano, Limbani Kalumbi, Vincent Doyle, Bagrey Ngwira

Abstract:

Introduction: The Malawi Government in partnership with Non-Governmental Organizations adopted Community Led Total Sanitation (CLTS) in 2008 as an approach in sanitation and hygiene promotion with an aim of declaring Malawi Open Defeacation Free (ODF) by 2015. While there is a significant body of research into CLTS available in public domain, there is little research done on challenges faced in implementing CLTS in Malawi. Methods: A cross-sectional qualitative study was carried out in three districts of Ntcheu, Balaka, and Phalombe. Data was collected using Focus Group Discussions (FGDs) and Key informant interviews (KII) and analysed manually. Results: In total, 96 people took part in FGDs and 9 people in KII. It was shown that choice of leaders after triggering was commonly done by chiefs, facilitators, and VHC without following CLTS principles as opposed to identifying individuals who showed leadership skills. Despite capacity building initiatives involving District Coordinating Teams, lack of resources to undertake follow-ups contributed to failure to sustain ODF in the community. It was also found that while most respondents appreciating the need for no subsidies, the elderly and those with disabilities felt the need for external support because do not have money for buying strong logs, slabs for durable toilet floor and also to hire people to build latrines for them. Conclusion: Effective implementation of CLTS requires comprehensive consideration of various issues that may affect its success.

Keywords: open defecation, community-led, sanitation, faecal matter, hygiene, Malawi

Procedia PDF Downloads 375
1479 Mitigation Measures for the Acid Mine Drainage Emanating from the Sabie Goldfield: Case Study of the Nestor Mine

Authors: Rudzani Lusunzi, Frans Waanders, Elvis Fosso-Kankeu, Robert Khashane Netshitungulwana

Abstract:

The Sabie Goldfield has a history of gold mining dating back more than a century. Acid mine drainage (AMD) from the Nestor mine tailings storage facility (MTSF) poses a serious threat to the nearby ecosystem, specifically the Sabie River system. This study aims at developing mitigation measures for the AMD emanating from the Nestor MTSF using materials from the Glynns Lydenburg MTSF. The Nestor MTSF (NM) and the Glynns Lydenburg MTSF (GM) each provided about 20 kg of bulk composite samples. Using samples from the Nestor MTSF and the Glynns Lydenburg MTSF, two mixtures were created. MIX-A is a mixture that contains 25% weight percent (GM) and 75% weight percent (NM). MIX-B is the name given to the second mixture, which contains 50% AN and 50% AG. The same static test, i.e., acid–base accounting (ABA), net acid generation (NAG), and acid buffering characteristics curve (ABCC) was used to estimate the acid-generating probabilities of samples NM and GM for MIX-A and MIX-B. Furthermore, the mineralogy of the Nestor MTSF samples consists of the primary acid-producing mineral pyrite as well as the secondary minerals ferricopiapite and jarosite, which are common in acidic conditions. The Glynns Lydenburg MTSF samples, on the other hand, contain primary acid-neutralizing minerals calcite and dolomite. Based on the assessment conducted, materials from the Glynns Lydenburg are capable of neutralizing AMD from Nestor MTSF. Therefore, the alkaline tailings materials from the Glynns Lydenburg MTSF can be used to rehabilitate the acidic Nestor MTSF.

Keywords: Nestor Mine, acid mine drainage, mitigation, Sabie River system

Procedia PDF Downloads 80
1478 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 293
1477 Feasibility Study of Friction Stir Welding Application for Kevlar Material

Authors: Ahmet Taşan, Süha Tirkeş, Yavuz Öztürk, Zafer Bingül

Abstract:

Friction stir welding (FSW) is a joining process in the solid state, which eliminates problems associated with the material melting and solidification, such as cracks, residual stresses and distortions generated during conventional welding. Among the most important advantages of FSW are; easy automation, less distortion, lower residual stress and good mechanical properties in the joining region. FSW is a recent approach to metal joining and although originally intended for aluminum alloys, it is investigated in a variety of metallic materials. The basic concept of FSW is a rotating tool, made of non-consumable material, specially designed with a geometry consisting of a pin and a recess (shoulder). This tool is inserted as spinning on its axis at the adjoining edges of two sheets or plates to be joined and then it travels along the joining path line. The tool rotation axis defines an angle of inclination with which the components to be welded. This angle is used for receiving the material to be processed at the tool base and to promote the gradual forge effect imposed by the shoulder during the passage of the tool. This prevents the material plastic flow at the tool lateral, ensuring weld closure on the back of the pin. In this study, two 4 mm Kevlar® plates which were produced with the Kevlar® fabrics, are analyzed with COMSOL Multiphysics in order to investigate the weldability via FSW. Thereafter, some experimental investigation is done with an appropriate workbench in order to compare them with the analysis results.

Keywords: analytical modeling, composite materials welding, friction stir welding, heat generation

Procedia PDF Downloads 156
1476 Assessing the Resilience to Economic Shocks of the Households in Bistekville 2, Quezon City, Philippines

Authors: Maria Elisa B. Manuel

Abstract:

The Philippine housing sector is bracing challenges with the massive housing backlog and the adamant cycle of relocation, resettlement and returns to the cities of informal settler families due to the vast inaccessibility of necessities and opportunities in the past off-city housing projects. Bistekville 2 has been established as a model socialized housing project by utilizing government partnerships with private developers and individuals in the first in-city and onsite resettlement effort in the country. The study looked into the resilience of the residents to idiosyncratic economic shocks by analyzing their vulnerabilities, assets and coping strategies. The study formulated an economic resilience framework to identify how these factors that interact to build the household’s capacity to positively adapt to sudden expenses in their households. The framework is supplemented with a scale that presents the proximity of the household to resilience by identifying through its indicators whether the households are in the level of subsistence, coping, adaptive or transformative. Survey interviews were conducted with 91 households from Bistekville 2 on the components that have been identified by the framework that was processed with qualitative and quantitative processes. The study has found that the households are highly vulnerable due to their family composition and other conditions such as unhealthy loans, inconsistent amortization payment. Along with their high vulnerability, the households have inadequate strategies to anticipate shocks and primarily react to the shock. This has led to the conclusion that the households do not reflect resilience to idiosyncratic economic shocks and are still at the level of coping.

Keywords: idiosyncratic economic shocks, socialized housing, economic resilience, economic vulnerability, adaptive capacity

Procedia PDF Downloads 146
1475 Electricity Load Modeling: An Application to Italian Market

Authors: Giovanni Masala, Stefania Marica

Abstract:

Forecasting electricity load plays a crucial role regards decision making and planning for economical purposes. Besides, in the light of the recent privatization and deregulation of the power industry, the forecasting of future electricity load turned out to be a very challenging problem. Empirical data about electricity load highlights a clear seasonal behavior (higher load during the winter season), which is partly due to climatic effects. We also emphasize the presence of load periodicity at a weekly basis (electricity load is usually lower on weekends or holidays) and at daily basis (electricity load is clearly influenced by the hour). Finally, a long-term trend may depend on the general economic situation (for example, industrial production affects electricity load). All these features must be captured by the model. The purpose of this paper is then to build an hourly electricity load model. The deterministic component of the model requires non-linear regression and Fourier series while we will investigate the stochastic component through econometrical tools. The calibration of the parameters’ model will be performed by using data coming from the Italian market in a 6 year period (2007- 2012). Then, we will perform a Monte Carlo simulation in order to compare the simulated data respect to the real data (both in-sample and out-of-sample inspection). The reliability of the model will be deduced thanks to standard tests which highlight a good fitting of the simulated values.

Keywords: ARMA-GARCH process, electricity load, fitting tests, Fourier series, Monte Carlo simulation, non-linear regression

Procedia PDF Downloads 392
1474 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud

Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya

Abstract:

Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.

Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture

Procedia PDF Downloads 150
1473 A Research on the Benefits of Drone Usage in Industry by Determining Companies Using Drone in the World

Authors: Ahmet Akdemir, Güzide Karakuş, Leyla Polat

Abstract:

Aviation that has been arisen in accordance with flying request that is existing inside of people, has not only made life easier by making a great contribution to humanity; it has also accelerated globalization by reducing distances between countries. It is seen that the growth rate of aviation industry has reached the undreamed level when it is looked back on. Today, the last point in aviation is unmanned aerial vehicles that are self-ventilating and move in desired coordinates without any onboard pilot. For those vehicles, there are two different control systems are developed. In the first type of control, an unmanned aerial vehicle (UAV) moves according to instructions of a remote control. UAV that moves with a remote control is named as drone; it can be used personally. In the second one, there is a flight plan that is programmed and placed inside of UAV before flight. Recently, drones have started to be used in unimagined areas and utilize specific, important benefits for any industry. Within this framework, this study answers the question that is drone usage would be beneficial for businesses or not. To answer this question, applied basic methodologies are determining businesses using drone in the world, their purposes to use drone, and then, comparing their economy as before drone and after drone. In the end of this study, it is seen that many companies in different business areas use drone in logistics support, and it makes their work easier than before. This paper has contributed to academic literature about this subject, and it has introduced the benefits of drone usage for businesses. In addition, it has encouraged businesses that they keep pace with this technological age by following the developments about drones.

Keywords: aviation, drone, drone in business, unmanned aerial vehicle

Procedia PDF Downloads 250
1472 Identifying Enablers and Barriers of Healthcare Knowledge Transfer: A Systematic Review

Authors: Yousuf Nasser Al Khamisi

Abstract:

Purpose: This paper presents a Knowledge Transfer (KT) Framework in healthcare sectors by applying a systematic literature review process to the healthcare organizations domain to identify enablers and barriers of KT in Healthcare. Methods: The paper conducted a systematic literature search of peer-reviewed papers that described key elements of KT using four databases (Medline, Cinahl, Scopus, and Proquest) for a 10-year period (1/1/2008–16/10/2017). The results of the literature review were used to build a conceptual framework of KT in healthcare organizations. The author used a systematic review of the literature, as described by Barbara Kitchenham in Procedures for Performing Systematic Reviews. Findings: The paper highlighted the impacts of using Knowledge Management (KM) concept at a healthcare organization in controlling infectious diseases in hospitals, improving family medicine performance and enhancing quality improvement practices. Moreover, it found that good-coding performance is analytically linked with a knowledge sharing network structure rich in brokerage and hierarchy rather than in density. The unavailability or ignored of the latest evidence on more cost-effective or more efficient delivery approaches leads to increase the healthcare costs and may lead to unintended results. Originality: Search procedure produced 12,093 results, of which 3523 were general articles about KM and KT. The titles and abstracts of these articles had been screened to segregate what is related and what is not. 94 articles identified by the researchers for full-text assessment. The total number of eligible articles after removing un-related articles was 22 articles.

Keywords: healthcare organisation, knowledge management, knowledge transfer, KT framework

Procedia PDF Downloads 137
1471 Motor Vehicle Accidents During Pregnancy: Analysis of Maternal and Fetal Outcome at a University Hospital

Authors: Manjunath Attibele, Alsawafi Manal, Al Dughaishi Tamima

Abstract:

Introduction: The purpose of this study was to describe the clinical characteristics and types of mechanisms of injuries caused by Motor vehicle accidents (MVA) during pregnancy. To analyze the patterns of accidents during pregnancy and its adverse consequences on both maternal and fetal outcome. Methods: This was a retrospective cohort study on pregnant patients who met with MVAs The study period was from January 1, 2010, to December 31, 2019. All relevant data were retrieved from electronic patients’ records from the hospital information system and from the antenatal ward admission register Results: Out of 168 women who had motor vehicle accidents during the study period, of which, 39 (23.2%) women during pregnancy. Twenty-one (53.8%) women were over 30 years old. Thirty-five (89.7%) women were Omanis, and 27 (69.2%) were in their third trimester. Twenty-three (59%) of accidents happened at night, and 31 (79.5%) of them happened on a weekday. Twenty-two (56.4%) of women were driving themselves, and 24 (61.5%) of them were not using any seatbelt. Accident related abdominal & back pain was seen in 23(59%) women. Regarding the outcome of pregnancy, 23 (74.2%) had a normal vaginal delivery. The mean accident to delivery interval was 7 weeks. Thirty (96.7%) of involved newborns were relatively healthy. One woman (3.2%) had a ruptured uterusleading to fetal death (3.2%). Conclusion: This study showed that the incidence of motor vehicle accidents during pregnancy is around 23.2% . Majority had trauma-associated pain. One serious injury to a woman causing a ruptured uterus which lead to fetal death. Majority of involved newborns were relatively healthy. No reported maternal death.

Keywords: motor vehicle accidents, pregnancy, maternal outcome, fetal outcome

Procedia PDF Downloads 88
1470 Factors of the Community Leaders' and Citizens' Way of Life Based on the Sufficient Economy in Vientiane, Lao People's Democratic Republic

Authors: Phusit Phukamchanoad

Abstract:

This research aims to analyze the fundamental factors of the community leader and citizens behind the self-sufficient living in Vientiane, Lao People's Democratic Republic. The data were collected by asking 400 citizens to fill out the questionnaires and having in-depth interviews with 30 community leaders. It was found that the factors which had influenced the practice of the sufficiency economy philosophy were age, occupation, length of time living in Vientiane, education, monthly income, monthly expense, and the sufficiency economy philosophy training. The people who had been trained could practice the sufficiency economy philosophy better at both individual and household level than the people who had not been trained. The people who were older than 36 years old had practiced the sufficiency economy philosophy more than the people who were younger than 35 years old. The people who worked in state-owned enterprises, private businesses, and government officials: teachers, police officers, soldiers, and ministers applied the sufficiency economy philosophy more than the samples who were students. The people who lived in Vientiane for more than 31 years applied the sufficiency economy philosophy more than the samples who lived in Vientiane for not more than 30 years. The people whose incomes exceeded 20,001 baht applied the sufficiency economy philosophy more than the people whose incomes did not exceed 20,000 baht. Both community leaders and citizens had a good relationship with their families and community. The community members supported each other during tough times. There were regular meetings in the community. There was unity within the families. The time to build a bond in the family was the time when everyone was eating together. Also, most community leaders and citizens had at least two jobs per one person.

Keywords: sufficiency economy philosophy, fundamental factors, way of life, Vientiane Lao PDR

Procedia PDF Downloads 141
1469 Public Transportation Demand and Policy in Kabul, Afghanistan

Authors: Ahmad Samim Ranjbar, Shoshi Mizokami

Abstract:

Kabul is the heart of political, commercial, cultural, educational and social life in Afghanistan and the Kabul fifth fastest growing city in the world, since 2001 with the establishment of new government Lack of adequate employment opportunities and basic utility services in remote provinces have prompted people to move to Kabul and other urban areas. From 2001 to the present, a rapid increase in population, and also less income of the people most of residence tend to use public transport, especially buses, however there is no proper bus system exist in Kabul city, because of wars, from 1992 to 2001 Kabul suffered damage and destruction of its transportation facilities including pavements, sidewalks, traffic circles, drainage systems, traffic signs and signals, trolleybuses and almost all of the public transit buses (e.g. Millie bus). This research is a primary and very important phase into Kabul city transportation and especially an initial and important step toward using large bus in Kabul city, which the main purpose of this research is to find the demand of Kabul city residence for public transport (Large Bus) and compare it with the actual supply from government. Finding of this research shows that the demand of Kabul city residence for the public transport (Large Bus) exceed the supply from the government, means that current public transportation (Large Bus) is not sufficient to serve people of Kabul city, it is mentionable that according to this research there is no need to build a new road or exclusive way for bus, this research propose to government for investment on the public transportation and exceed the number of large buses to can handle the current demand for public transport.

Keywords: transportation, planning, public transport, large bus, Kabul, Afghanistan

Procedia PDF Downloads 293
1468 Android-Based Edugame Application for Earthquakes Disaster Mitigation Education

Authors: Endina P. Purwandari, Yolanda Hervianti, Feri Noperman, Endang W. Winarni

Abstract:

The earthquakes disaster is an event that can threaten at any moment and cause damage and loss of life. Game earthquake disaster mitigation is a useful educational game to enhance children insight, knowledge, and understanding in the response to the impact of the earthquake. This study aims to build an educational games application on the Android platform as a learning media for earthquake mitigation education and to determine the effect of the application toward children understanding of the earthquake disaster mitigation. The methods were research and development. The development was to develop edugame application for earthquakes mitigation education. The research involved elementary students as a research sample to test the developed application. The research results were valid android-based edugame application, and its the effect of application toward children understanding. The application contains an earthquake simulation video, an earthquake mitigation video, and a game consisting three stages, namely before the earthquake, when the earthquake occur, and after the earthquake. The results of the feasibility test application showed that this application was included in the category of 'Excellent' which the average percentage of the operation of applications by 76%, view application by 67% and contents of application by 74%. The test results of students' responses were 80% that showed that a positive their responses toward the application. The student understanding test results show that the average score of children understanding pretest was 71,33, and post-test was 97,00. T-test result showed that t value by 8,02 more than table t by 2,001. This indicated that the earthquakes disaster mitigation edugame application based on Android platform affects the children understanding about disaster earthquake mitigation.

Keywords: android, edugame, mitigation, earthquakes

Procedia PDF Downloads 361
1467 Voice Liveness Detection Using Kolmogorov Arnold Networks

Authors: Arth J. Shah, Madhu R. Kamble

Abstract:

Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.

Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection

Procedia PDF Downloads 35
1466 Hacking the Spatial Limitations in Bridging Virtual and Traditional Teaching Methodologies in Sri Lanka

Authors: Manuela Nayantara Jeyaraj

Abstract:

Having moved into the 21st century, it is way past being arguable that innovative technology needs to be incorporated into conventional classroom teaching. Though the Western world has found presumable success in achieving this, it is still a concept under battle in developing countries such as Sri Lanka. Reaching the acme of implementing interactive virtual learning within classrooms is a struggling idealistic fascination within the island. In order to overcome this problem, this study is set to reveal facts that limit the implementation of virtual, interactive learning within the school classrooms and provide hacks that could prove the augmented use of the Virtual World to enhance teaching and learning experiences. As each classroom moves along with the usage of technology to fulfill its functionalities, a few intense hacks provided will build the administrative onuses on a virtual system. These hacks may divulge barriers based on social conventions, financial boundaries, digital literacy, intellectual capacity of the staff, and highlight the impediments in introducing students to an interactive virtual learning environment and thereby provide the necessary actions or changes to be made to succeed and march along in creating an intellectual society built on virtual learning and lifestyle. This digital learning environment will be composed of multimedia presentations, trivia and pop quizzes conducted on a GUI, assessments conducted via a virtual system, records maintained on a database, etc. The ultimate objective of this study could enhance every child's basic learning environment; hence, diminishing the digital divide that exists in certain communities.

Keywords: digital divide, digital learning, digitization, Sri Lanka, teaching methodologies

Procedia PDF Downloads 351
1465 Effects of Using Alternative Energy Sources and Technologies to Reduce Energy Consumption and Expenditure of a Single Detached House

Authors: Gul Nihal Gugul, Merih Aydinalp-Koksal

Abstract:

In this study, hourly energy consumption model of a single detached house in Ankara, Turkey is developed using ESP-r building energy simulation software. Natural gas is used for space heating, cooking, and domestic water heating in this two story 4500 square feet four-bedroom home. Hourly electricity consumption of the home is monitored by an automated meter reading system, and daily natural gas consumption is recorded by the owners during 2013. Climate data of the region and building envelope data are used to develop the model. The heating energy consumption of the house that is estimated by the ESP-r model is then compared with the actual heating demand to determine the performance of the model. Scenarios are applied to the model to determine the amount of reduction in the total energy consumption of the house. The scenarios are using photovoltaic panels to generate electricity, ground source heat pumps for space heating and solar panels for domestic hot water generation. Alternative scenarios such as improving wall and roof insulations and window glazing are also applied. These scenarios are evaluated based on annual energy, associated CO2 emissions, and fuel expenditure savings. The pay-back periods for each scenario are also calculated to determine best alternative energy source or technology option for this home to reduce annual energy use and CO2 emission.

Keywords: ESP-r, building energy simulation, residential energy saving, CO2 reduction

Procedia PDF Downloads 193
1464 The Concepts of Ibn Taymiyyah in Halal and Haram and Their Relevance to Contemporary Issues

Authors: Muhammad Fakhrul Arrazi

Abstract:

Ibn Taymiyyah is a great figure in Islam. His works have become the reference for many Muslims in implementing the fiqh of Ibadah and Muamalat. This article reviews the concepts that Ibn Taymiyyah has initiated in Halal and Haram, long before the books on Halal and Haram are written by contemporary scholars. There are at least four concepts of Halal and Haram ever spawned by Ibn Taymiyyah. First, the belief of a jurist (Faqih) in a matter that is Haram does not necessarily make the matter Haram. Haram arises from the Quran, Sunnah, Ijma’ and Qiyas as the tarjih. Due to the different opinions among the ulama, we should revisit this concept. Second, if a Muslim involves in a transaction (Muamalat), believes it permissible and gets money from such transaction, then it is legal for other Muslims to transact with the property of this Muslim brother, even if he does not believe that the transactions made by his Muslims brother are permissible. Third, Haram is divided into two; first is Haram because of the nature of an object, such as carrion, blood, and pork. If it is mixed with water or food and alters their taste, color, and smell, the food and water become Haram. Second is Haram because of the way it is obtained such as a stolen item and a broken aqad. If it is mixed with the halal property, the property does not automatically become Haram. Fourth, a treasure whose owners cannot be traced back then it is used for the benefit of the ummah. This study used the secondary data from the classics books by Ibn Taymiyyah, particularly those entailing his views on Halal and Haram. The data were then analyzed by using thematic and comparative approach. It is found that most of the concepts proposed by Ibn Taymiyyah in Halal and Haram correspond the majority’s views in the schools. However, some of his concepts are also in contrary to other scholars. His concepts will benefit the ummah, should it be applied to the contemporary issues.

Keywords: fiqh Muamalat, halal, haram, Ibn Taymiyyah

Procedia PDF Downloads 181
1463 Using Cyclic Structure to Improve Inference on Network Community Structure

Authors: Behnaz Moradijamei, Michael Higgins

Abstract:

Identifying community structure is a critical task in analyzing social media data sets often modeled by networks. Statistical models such as the stochastic block model have proven to explain the structure of communities in real-world network data. In this work, we develop a goodness-of-fit test to examine community structure's existence by using a distinguishing property in networks: cyclic structures are more prevalent within communities than across them. To better understand how communities are shaped by the cyclic structure of the network rather than just the number of edges, we introduce a novel method for deciding on the existence of communities. We utilize these structures by using renewal non-backtracking random walk (RNBRW) to the existing goodness-of-fit test. RNBRW is an important variant of random walk in which the walk is prohibited from returning back to a node in exactly two steps and terminates and restarts once it completes a cycle. We investigate the use of RNBRW to improve the performance of existing goodness-of-fit tests for community detection algorithms based on the spectral properties of the adjacency matrix. Our proposed test on community structure is based on the probability distribution of eigenvalues of the normalized retracing probability matrix derived by RNBRW. We attempt to make the best use of asymptotic results on such a distribution when there is no community structure, i.e., asymptotic distribution under the null hypothesis. Moreover, we provide a theoretical foundation for our statistic by obtaining the true mean and a tight lower bound for RNBRW edge weights variance.

Keywords: hypothesis testing, RNBRW, network inference, community structure

Procedia PDF Downloads 148
1462 Partnership Oriented Innovation Alliance Strategy Based on Market Feedback

Authors: Victor Romanov, Daria Efimenko

Abstract:

The focus on innovation in modern economy is the main factor in surviving business in a competitive environment. The innovations are based on the search and use of knowledge in a global context. Nowadays consumers and market demand are the main innovation drivers. This leads to build a business as a system with feedback, promptly restructuring production and innovation implementation in response to market demands. In modern knowledge economy, because of speed of technical progress, the product's lifecycle became much shorter, what makes more stringent requirements for innovation implementation on the enterprises of and therefore the possibility for enterprise for receiving extra income is decreasing. This circumstance imposes additional requirements for the replacement of obsolete products and the prompt release of innovative products to the market. The development of information technologies has led to the fact that only in the conditions of partnership and knowledge sharing with partners it is possible to update products quickly for innovative products. Many companies pay attention to updating innovations through the search for new partners, but the task of finding new partners presents some difficulties. The search for a suitable one includes several stages such as: determining the moment of innovation-critical, introducing a search, identifying search criteria, justifying and deciding on the choice of a partner. No less important is the question of how to manage an innovative product in response to a changing market. The article considers the problems of information support for the search for the source of innovation and partnership to decrease the time for implementation of novelty products.

Keywords: partnership, novelty, market feedback, alliance

Procedia PDF Downloads 193
1461 The Role of Development in Settling Migration Crisis: The Preventive Approach of the European Union in Relations with Sub-Saharan African States

Authors: Artsiom Zinchanka

Abstract:

The world faces now one of the largest migration crisis and the European Union meets challenges in accepting the flow of migrants that could not be handled finally at this step. This crisis is complicated with many factors, such as military conflict in the Middle East; absence of the appropriate conditions in the refugees’ camps; but also with the complicity of the migration flow consisting of the Sub-Saharan migrants. This type of migrants leave their homelands for many reasons including poverty, not appropriate level of social and economic conditions, absence of infrastructure and access to the education and medical care. In practice, when the restrictive approach directed to limit the flow of illicit migration and to send illicit migrants back to their homelands is not always working, the approach directed to the root causes of the migration crisis can be more effective in settling the crisis. The Cotonou Agreement and the following treaties concluded between the European Union, and Sub-Saharan states show that the European Union considers the development of human rights and appropriate social and economic conditions in the Sub-Saharan states as one of the most important factors addressing the migration crisis. The preventive approach as the efforts of the European Union to develop appropriate social and economic conditions in Sub-Saharan states is considered in this article, as well as its evolution and current condition. This article also considers pros and cons of this approach and the obstacles that this approach faces. The research methods include review of literature and documents, analytical and descriptive methods.

Keywords: migration crisis, preventive approach, Sub-Saharan States, the European Union

Procedia PDF Downloads 128
1460 Injury Prevention among Construction Workers: A Case Study on Iranian Steel Bar Bending Workers

Authors: S. Behnam Asl, H. Sadeghi Naeini, L. Sadat Ensaniat, R. Khorshidian, S. Alipour, S. Behnam Asl

Abstract:

Nowadays, the construction industry is growing, especially among developing countries. Iran also has a critical role in these industries in terms of workers disorders. Work-related musculoskeletal disorders (WMSDs) account for 7% of the whole diseases in the society, which makes some limitations. One of the main factors which causes WMSDs is awkward posture. Steel bar bending is considered as one of the prominent performance among construction workers. In this case study, we aimed to find the major tasks of bar benders and the most important risk factors related to it. This study was carried out among twenty workers (18-45 years) as our volunteer samples in some construction sites with less than 6 floors in two regions of Tehran municipality. The data was gathered through in depth observation, interview and questionnaire. Also postural analysis was done by OWAS method. In another part of study we used NMQ for gathering some data about psychosocial effects of work related disorders. Our findings show that 64% of workers were not aware of work risks, about 59% of workers had troubles in their wrists, hands, especially workers who worked in steel bar bending. In 46% cases lower back pain was in prevalence. Considering gathered data and results, awkward postures and long term tasks and their duration are known as the main risk factors of WMSDs among construction workers, meaning that work-rest schedule and tools design should be reconsidered to make an ergonomic condition for the mentioned workers.

Keywords: bar benders, construction workers, musculoskeletal disorders (WMSDs), OWAS method

Procedia PDF Downloads 305