Search results for: event organization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3607

Search results for: event organization

1927 Affect and Helping Behavior as Explanatory Account of the Relationship between Psychological Safety and Supervisor Satisfaction

Authors: Mariam Musaddiq, Muhammad Ali Asadullah

Abstract:

Psychological safety is referred as a 'nonthreatening' and 'predictable' work environment leading employees, particularly interested to contribute positively to the organization, to engage and express their true selves at work without suffering negative results. We posit that the employee who is feeling psychologically safe experiences positive emotions, feels happy and shows helping behavior towards his coworkers and supervisors. Particularly, the supervisor reciprocates this helping behavior in form of greater satisfaction to the employee showing helping behavior. We tested our hypothesis in light of Feedback system theory and functional motive theory. We collected data from 453 employees and their supervisor in Pakistani hotels and restaurants through survey method. Result showed that positive affect and helping behavior mediate the relationship between psychological safety and supervisor satisfaction. Cross sectional design of the study is a major limitation of the study. Moreover, we focused on psychological safety only that is one of three dimensions of psychological conditions.

Keywords: affect, helping behavior, psychological safety, supervisor, supervisor satisfaction

Procedia PDF Downloads 414
1926 Ideology and Lexicogrammar: Discourse Against the Power in Lyrical Texts (XIII, XVII and XX Centuries)

Authors: Ulisses Tadeu Vaz de Oliveira

Abstract:

The development of multifunctional studies in the theoretical-methodological perspective of the Systemic-Functional Grammar (SFG) and the increasing number of critical literary studies have introduced new opportunities for the study of ideologies and societies, but also brought up new challenges across and within many areas. In this regard, the Critical Linguistics researches allow a form of pairing a textual linguistic analysis method (micro level) with a social language theory in political and ideological processes (macro level), presented in the literature. This presentation will report on strategies to criticize power holders in literary productions from three distinct eras, namely: (a) Satirical Galego-Portuguese chants of Gil Pérez Conde (thirteenth century), (b) Poems of Gregorio de Matos Guerra (seventeenth century), and (c) Songs of Chico Buarque de Holanda (twentieth century). The analysis of these productions is based on the SFG proposals, which considers the clause as a social event. Therefore, the structure serves to realize three concurrent meanings (metafunctions): Ideational, Interpersonal and Textual. The presenter aims to shed light on the core issues relevant to the successes of the authors to criticize authorities in repressive times while caring about face-threatening and politeness. The effective and meaningful critical discourse was a way of moving the society`s chains towards new ideologies reflected in the lexicogrammatical choices made and the rhetorical functions of the persuasive structures used by the authors.

Keywords: ideology, literature, persuasion, systemic-functional grammar

Procedia PDF Downloads 419
1925 Automatic Lead Qualification with Opinion Mining in Customer Relationship Management Projects

Authors: Victor Radich, Tania Basso, Regina Moraes

Abstract:

Lead qualification is one of the main procedures in Customer Relationship Management (CRM) projects. Its main goal is to identify potential consumers who have the ideal characteristics to establish a profitable and long-term relationship with a certain organization. Social networks can be an important source of data for identifying and qualifying leads since interest in specific products or services can be identified from the users’ expressed feelings of (dis)satisfaction. In this context, this work proposes the use of machine learning techniques and sentiment analysis as an extra step in the lead qualification process in order to improve it. In addition to machine learning models, sentiment analysis or opinion mining can be used to understand the evaluation that the user makes of a particular service, product, or brand. The results obtained so far have shown that it is possible to extract data from social networks and combine the techniques for a more complete classification.

Keywords: lead qualification, sentiment analysis, opinion mining, machine learning, CRM, lead scoring

Procedia PDF Downloads 89
1924 Role of Agricultural Journalism in Diffusion of Farming Technologies

Authors: Muhammad Luqman, Mujahid Karim

Abstract:

Agricultural journalism considered an effective tool in the diffusion of agricultural technologies among the members of farming communities. Various agricultural journalism forms are used by the different organization in order to address the community problems and provide solutions to them. The present study was conducted for analyzing the role of agricultural journalism in the dissemination of agricultural information. The universe of the study was district Sargodha from which a sample of 100 was collected through a validating and pre-tested questionnaire. Statistical analysis of collected data was done with the help of SPSS. It was concluded that majority (64.6%) of the respondent were middle-aged (31-50) years, also indicates a high (73.23%) literacy rate above middle-level education, most (78.3%) of the respondents were connected with the occupation of farming. In various forms of agricultural journalism “Radio/T.V./F.M) is used by 99.4% of the respondent, Mobile phones (96%), Magazine/ Newspaper/ periodical (66.4%) and social media (60.9%). Regarding majors areas focused on agriculture journalism “Help farmers to enhance their productivity is on the highest level with a mean of ( =3.98/5.00). The regression model of farmer's education and various forms of agricultural journalism facilities used was found to be significant.

Keywords: agricultural information, journalism, farming community, technology diffusion and adoption

Procedia PDF Downloads 198
1923 Queering Alterity: Engaging Pluralism to Move Beyond Gender Binaries in the Classroom

Authors: A. K. O'Loughlin

Abstract:

In Simone de Beauvoir’s climatic 1959 meditation, The Second Sex, she avows that 'On ne naît pas femme; on le devient,' translated most recently in the unabridged text (2010) as 'One is not born, but rather becomes, woman.' The signifier ‘woman’ in this context, signifies Beauvoir’s contemplation of the institution, the concept of woman(ness) defined in relation to the binary and hegemonic man(ness.) She is 'the other.' This paper is a theoretical contemplation of (1) how we actively teach 'othering' in the institution of schooling and (2) new considerations of pluralism for self-reflection and subversion that teachers, in particular, are faced with. How, in schooling, do we learn one’s options for racialized, classed and sexualized gender identification and the hierarchical signification that define these signifiers? Just like the myth of apolitical schooling, we cannot escape teaching social organization in the classroom. Yet, we do have a choice. How do we as educators learn about our own embodied intersectionalities? How do we unlearn our own binaries? How do we teach about intersectional gender? How do we teach 'the other'? We posit the processes of these reflections by educators may move our classrooms beyond binaries, engage pluralism and queer alterity itself.

Keywords: othering, alterity, education, schooling, identity, racialization, gender, intersectionality, pluralism

Procedia PDF Downloads 248
1922 Job Satisfaction Levels of Nurses Working in Public Hospitals

Authors: S. Kurt, B. C. Demirbag

Abstract:

Meeting employees’ expectations from an organization physically and mentally is a result of one’s assessing his or her work and its environment as well as his feeling about them. It was to determine the job satisfaction levels of the nurses in public hospitals. This descriptive study was carried out with 404 nurses (60%) accepting to take part in the study voluntarily and working in the same hospital for at least three months from 673 nurses working in hospitals depending on The Secretaryship of Public Hospital Association in Rize. The study aimed to reach the whole population by not taking samples. The data were collected by the personal information form (16 questions) prepared by the researcher, and the job satisfaction scale (36 articles) between June 1st and August 30th, 2014. According to scale, mean scores of nurses’ job satisfaction were 3.23±0.51. In addition, it was determined that the factors such as nurses’s age, marital status, childbearing, place of duty, position in workplace, being liked of job, education status, work experience, weekly working hours, maturing in professional practice, unit worked, hospital worked and colleagues affected the job satisfaction levels of nurses (p <0.05). In conclusion; the nurses’ general job satisfaction levels were moderate level.

Keywords: hospitals, job satisfaction level, nurses, public hospitals

Procedia PDF Downloads 362
1921 Towards a Measuring Tool to Encourage Knowledge Sharing in Emerging Knowledge Organizations: The Who, the What and the How

Authors: Rachel Barker

Abstract:

The exponential velocity in the truly knowledge-intensive world today has increasingly bombarded organizations with unfathomable challenges. Hence organizations are introduced to strange lexicons of descriptors belonging to a new paradigm of who, what and how knowledge at individual and organizational levels should be managed. Although organizational knowledge has been recognized as a valuable intangible resource that holds the key to competitive advantage, little progress has been made in understanding how knowledge sharing at individual level could benefit knowledge use at collective level to ensure added value. The research problem is that a lack of research exists to measure knowledge sharing through a multi-layered structure of ideas with at its foundation, philosophical assumptions to support presuppositions and commitment which requires actual findings from measured variables to confirm observed and expected events. The purpose of this paper is to address this problem by presenting a theoretical approach to measure knowledge sharing in emerging knowledge organizations. The research question is that despite the competitive necessity of becoming a knowledge-based organization, leaders have found it difficult to transform their organizations due to a lack of knowledge on who, what and how it should be done. The main premise of this research is based on the challenge for knowledge leaders to develop an organizational culture conducive to the sharing of knowledge and where learning becomes the norm. The theoretical constructs were derived and based on the three components of the knowledge management theory, namely technical, communication and human components where it is suggested that this knowledge infrastructure could ensure effective management. While it is realised that it might be a little problematic to implement and measure all relevant concepts, this paper presents effect of eight critical success factors (CSFs) namely: organizational strategy, organizational culture, systems and infrastructure, intellectual capital, knowledge integration, organizational learning, motivation/performance measures and innovation. These CSFs have been identified based on a comprehensive literature review of existing research and tested in a new framework adapted from four perspectives of the balanced score card (BSC). Based on these CSFs and their items, an instrument was designed and tested among managers and employees of a purposefully selected engineering company in South Africa who relies on knowledge sharing to ensure their competitive advantage. Rigorous pretesting through personal interviews with executives and a number of academics took place to validate the instrument and to improve the quality of items and correct wording of issues. Through analysis of surveys collected, this research empirically models and uncovers key aspects of these dimensions based on the CSFs. Reliability of the instrument was calculated by Cronbach’s a for the two sections of the instrument on organizational and individual levels.The construct validity was confirmed by using factor analysis. The impact of the results was tested using structural equation modelling and proved to be a basis for implementing and understanding the competitive predisposition of the organization as it enters the process of knowledge management. In addition, they realised the importance to consolidate their knowledge assets to create value that is sustainable over time.

Keywords: innovation, intellectual capital, knowledge sharing, performance measures

Procedia PDF Downloads 196
1920 Development of Building Information Modeling in Property Industry: Beginning with Building Information Modeling Construction

Authors: B. Godefroy, D. Beladjine, K. Beddiar

Abstract:

In France, construction BIM actors commonly evoke the BIM gains for exploitation by integrating of the life cycle of a building. The standardization of level 7 of development would achieve this stage of the digital model. The householders include local public authorities, social landlords, public institutions (health and education), enterprises, facilities management companies. They have a dual role: owner and manager of their housing complex. In a context of financial constraint, the BIM of exploitation aims to control costs, make long-term investment choices, renew the portfolio and enable environmental standards to be met. It assumes a knowledge of the existing buildings, marked by its size and complexity. The information sought must be synthetic and structured, it concerns, in general, a real estate complex. We conducted a study with professionals about their concerns and ways to use it to see how householders could benefit from this development. To obtain results, we had in mind the recurring interrogation of the project management, on the needs of the operators, we tested the following stages: 1) Inculcate a minimal culture of BIM with multidisciplinary teams of the operator then by business, 2) Learn by BIM tools, the adaptation of their trade in operations, 3) Understand the place and creation of a graphic and technical database management system, determine the components of its library so their needs, 4) Identify the cross-functional interventions of its managers by business (operations, technical, information system, purchasing and legal aspects), 5) Set an internal protocol and define the BIM impact in their digital strategy. In addition, continuity of management by the integration of construction models in the operation phase raises the question of interoperability in the control of the production of IFC files in the operator’s proprietary format and the export and import processes, a solution rivaled by the traditional method of vectorization of paper plans. Companies that digitize housing complex and those in FM produce a file IFC, directly, according to their needs without recourse to the model of construction, they produce models business for the exploitation. They standardize components, equipment that are useful for coding. We observed the consequences resulting from the use of the BIM in the property industry and, made the following observations: a) The value of data prevail over the graphics, 3D is little used b) The owner must, through his organization, promote the feedback of technical management information during the design phase c) The operator's reflection on outsourcing concerns the acquisition of its information system and these services, observing the risks and costs related to their internal or external developments. This study allows us to highlight: i) The need for an internal organization of operators prior to a response to the construction management ii) The evolution towards automated methods for creating models dedicated to the exploitation, a specialization would be required iii) A review of the communication of the project management, management continuity not articulating around his building model, it must take into account the environment of the operator and reflect on its scope of action.

Keywords: information system, interoperability, models for exploitation, property industry

Procedia PDF Downloads 145
1919 Definition, Structure, and Core Functions of the State Image

Authors: Rosa Nurtazina, Yerkebulan Zhumashov, Maral Tomanova

Abstract:

Humanity is entering an era when 'virtual reality' as the image of the world created by the media with the help of the Internet does not match the reality in many respects, when new communication technologies create a fundamentally different and previously unknown 'global space'. According to these technologies, the state begins to change the basic technology of political communication of the state and society, the state and the state. Nowadays, image of the state becomes the most important tool and technology. Image is a purposefully created image granting political object (person, organization, country, etc.) certain social and political values and promoting more emotional perception. Political image of the state plays an important role in international relations. The success of the country's foreign policy, development of trade and economic relations with other countries depends on whether it is positive or negative. Foreign policy image has an impact on political processes taking place in the state: the negative image of the countries can be used by opposition forces as one of the arguments to criticize the government and its policies.

Keywords: image of the country, country's image classification, function of the country image, country's image components

Procedia PDF Downloads 436
1918 Measuring Flood Risk concerning with the Flood Protection Embankment in Big Flooding Events of Dhaka Metropolitan Zone

Authors: Marju Ben Sayed, Shigeko Haruyama

Abstract:

Among all kinds of natural disaster, the flood is a common feature in rapidly urbanizing Dhaka city. In this research, assessment of flood risk of Dhaka metropolitan area has been investigated by using an integrated approach of GIS, remote sensing and socio-economic data. The purpose of the study is to measure the flooding risk concerning with the flood protection embankment in big flooding events (1988, 1998 and 2004) and urbanization of Dhaka metropolitan zone. In this research, we considered the Dhaka city into two parts; East Dhaka (outside the flood protection embankment) and West Dhaka (inside the flood protection embankment). Using statistical data, we explored the socio-economic status of the study area population by comparing the density of population, land price and income level. We have drawn the cross section profile of the flood protection embankment into three different points for realizing the flooding risk in the study area, especially in the big flooding year (1988, 1998 and 2004). According to the physical condition of the study area, the land use/land cover map has been classified into five classes. Comparing with each land cover unit, historical weather station data and the socio-economic data, the flooding risk has been evaluated. Moreover, we compared between DEM data and each land cover units to find out the relationship with flood. It is expected that, this study could contribute to effective flood forecasting, relief and emergency management for a future flood event in Dhaka city.

Keywords: land use, land cover change, socio-economic, Dhaka city, GIS, flood

Procedia PDF Downloads 298
1917 Application Reliability Method for Concrete Dams

Authors: Mustapha Kamel Mihoubi, Mohamed Essadik Kerkar

Abstract:

Probabilistic risk analysis models are used to provide a better understanding of the reliability and structural failure of works, including when calculating the stability of large structures to a major risk in the event of an accident or breakdown. This work is interested in the study of the probability of failure of concrete dams through the application of reliability analysis methods including the methods used in engineering. It is in our case, the use of level 2 methods via the study limit state. Hence, the probability of product failures is estimated by analytical methods of the type first order risk method (FORM) and the second order risk method (SORM). By way of comparison, a level three method was used which generates a full analysis of the problem and involves an integration of the probability density function of random variables extended to the field of security using the Monte Carlo simulation method. Taking into account the change in stress following load combinations: normal, exceptional and extreme acting on the dam, calculation of the results obtained have provided acceptable failure probability values which largely corroborate the theory, in fact, the probability of failure tends to increase with increasing load intensities, thus causing a significant decrease in strength, shear forces then induce a shift that threatens the reliability of the structure by intolerable values of the probability of product failures. Especially, in case the increase of uplift in a hypothetical default of the drainage system.

Keywords: dam, failure, limit-state, monte-carlo, reliability, probability, simulation, sliding, taylor

Procedia PDF Downloads 326
1916 Quality Management and Service Organization

Authors: Fatemeh Khalili Varnamkhasti

Abstract:

In recent times, there has been a notable shift in the application of Total Quality Management (TQM) from manufacturing to service organizations, prompting numerous studies on the subject. TQM has firmly established itself across various sectors, emerging as an approach to process improvement, waste reduction, business optimization, and quality performance. Many researchers and academics have recognized the relevance of TQM for sustainable competitive advantage, particularly in service organizations. In light of this, the purpose of this research study is to explore the applicability of TQM within the service framework. The study delves into existing literature on TQM in service organizations and examines the reasons for its occasional shortcomings. Ultimately, the paper provides systematic guidelines for the effective implementation of TQM in service organizations. The findings of this study offer a much-improved understanding of TQM and its practices, shedding light on the evolution of service organizations. Additionally, the study highlights key insights from recent research on TQM in service organizations and proposes a ten-step approach for the successful implementation of TQM in the service sector. This framework aims to provide service managers and professionals with a comprehensive understanding of TQM fundamentals and encourages a deeper exploration of TQM theory.

Keywords: quality, control, service, management, teamwork

Procedia PDF Downloads 59
1915 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination

Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini

Abstract:

This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.

Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation

Procedia PDF Downloads 231
1914 Impact of the COVID-19 Pandemic and Social Isolation on the Clients’ Experiences in Counselling and their Access to Services: Perspectives of Violence Against Women Program Staff - A Qualitative Study

Authors: Habiba Nahzat, Karen Crow, Lisa Manuel, Maria Huijbregts

Abstract:

Background and Rationale: The World Health Organization (WHO) declared COVID-19 a pandemic on March 11, 2020. Shortly after, the Ontario provincial and Toronto municipal governments also released multiple directives that led to the mass closure of businesses both in the public and private sectors. Recent research has identified connections between Intimate Partner Violence (IPV) and COVID-19 related stressors - especially because of lockdown and social isolation measures. Psychological impacts of lengthy seclusion coupled with disconnection from extended family and diminished support services can take a toll on families at risk and may increase mental health issues and the prevalence of IPV. Research Question: Thus, the purpose of the study was to understand the perspective of the Violence Against Women (VAW) program staff on the impact of the COVID-19 pandemic; we especially wanted to understand staff views of restrictions on clients’ counseling experiences and the ability to access services in general. The study also aimed to examine VAW program staff experiences regarding remote work and explore how the pandemic restriction measures affected the ability of their program operations to support their clients and each other. Method: A cross-sectional, descriptive qualitative study was conducted with a purposive sample of 9 VAW program staff – eight VAW counselors and one VAW manager. Prior to data collection, program staff collaborated in the development of the study purpose, interview questions and methodology. Ethics approval was obtained from the sponsoring organization’s Research Ethics Board. In-depth individual interviews were conducted with study participants using a semi-structured interview questionnaire. Brief demographic information was also collected prior to the interview. Descriptive statistics were used to analyze quantitative data and qualitative data was analyzed by thematic content analysis. Results: Findings from this study indicate that the COVID-19 pandemic restrictions had an adverse impact on clients seeking VAW services based on VAW staff perspectives. Program staff reported a perceived increase in abuse among women, especially in emotional and financial abuse and experiences of isolation and trauma. Findings further highlight the challenges women experienced when trying to access services in general as well as counseling and legal services. This was perceived to be more prominent among newcomers and marginalized women. The study also revealed client and staff challenges when participating in virtual counseling, their innovations and clients’ creativity in accessing needed counseling and how staff over time adapted to providing virtual support during the pandemic. Conclusion and Next Steps: This study builds upon existing evidence on the impact of COVID-19 restrictions on VAW and may inform future research to better understand the association between the COVID-19 pandemic restrictions and VAW on a broader scale and to inform and support possible short-term and long-term changes in the client experience and counselling practice.

Keywords: COVID-19, pandemic, virtual, violence against women (VAW)

Procedia PDF Downloads 190
1913 'Typical' Criminals: A Schutzian Influenced Theoretical Framework Exploring Type and Stereotype Formation

Authors: Mariam Shah

Abstract:

The way the human mind interprets and comprehends the world it occupies has long been a topic of discussion amongst philosophers and phenomenologists. This paper will focus predominantly on the ideologies espoused by the phenomenologist Alfred Schutz and will investigate how we attribute meaning to an event through the process of typification, and the production and usage of ‘types' and ‘stereotypes.' This paper will then discuss how subjective ideologies innate within us result in unique and subjective decision outcomes, based on a phenomenologically influenced theoretical framework which will illustrate how we form ‘types’ in order to ‘typecast’ and form judgements of everything and everyone we experience. The framework used will be founded in theory espoused by Alfred Schutz, and will review the different types of knowledge we rely on innately to inform our judgements, the relevance we attribute to the information which we acquire, and how we consciously and unconsciously apply this framework to everyday situations. An assessment will then be made of the potential impact that these subjective meaning structures can present when dispensing justice in criminal courts. This paper will investigate how these subjective meaning structures can influence our consciousness on both a conscious and unconscious level, and how this could potentially result in bias judicial outcomes due to negative ‘types’ or ‘stereotypes.' This paper will ultimately illustrate that we unconsciously and unreflexively use pre-formed types and stereotypes to inform our judgements and give meaning to what we have just experienced.

Keywords: Alfred Schutz, criminal courts, decision making, judicial decision making, phenomenology, Schutzian stereotypes, types, typification

Procedia PDF Downloads 228
1912 Investigating Effective Factors on the Customer Switching Behaviour in the Saipa Emdad Khodro Company of Iran

Authors: Rohollah Asadian Kohestani, Mustafa Hashemzadeh

Abstract:

The present paper is the outcome of a field research that was conducted with the study objective of influencing factor's effect on the behavior of customers switching in the Saipa Emdad Khodro Company. To achieve this goal, six factors of service quality, service cost, waiting time to receive services, reputation of organization, costs of switching and the way to respond the needs of customers as the independent variables of research and their effect on the customer switching was studied as the variable related to the research. The statistical society of this research included all customers of the Saipa Emdad Khodro company that possess the vehicles of automobile manufacturing group of Saipa throughout the country and the statistical sample included 150 persons of such customers. The results of this research indicated that all under study factors excluding the reputation factor effect on the behavior of customer switching.

Keywords: customer services, switching cost, service price, customer switching behavior

Procedia PDF Downloads 302
1911 Investigation of Factors Influencing Perceived Comfort During Take-Over in Automated Driving

Authors: Miriam Schäffer, Vinayak Mudgal, Wolfram Remlinger

Abstract:

The functions of automated driving will initially be limited to certain so-called Operating Driving Domains (ODD). Within the ODDs, the automated vehicle can handle all situations autonomously. In the event of a critical system failure, the vehicle will establish a condition of minimal risk or offer the driver to take over control of the vehicle. When the vehicle leaves the ODD, the driver is also prompted to take over vehicle control. During automated driving, the driver is legally allowed to perform non-driving-related activities (NDRAs) for the first time. When requested to take over, the driver must return from the NDRA state to a driving-ready state. The driver’s NDRA state may imply the use of items that are necessary for the NDRA or interior modifications. Since perceived comfort is an important factor in both manual and automated driving, a study was conducted in a static driving simulator to investigate factors that influence perceived comfort during the take-over process. Based on a literature review of factors influencing perceived comfort in different domains, selected parameters such as the TOR modality or elements to support handing over the item used for the NDRA to the interior were varied. Perceived comfort and discomfort were assessed using an adapted version of a standardized comfort questionnaire, as well as other previously identified aspects of comfort. The NDRA conducted was Using a Smartphone (playing Tetris) because of its high relevance as a future NDRA. The results show the potential to increase perceived comfort through interior adaptations and support elements. Further research should focus on different layouts of the investigated factors, as well as under different conditions, such as time budget, actions required within the intervention in the vehicle control system, and vehicle interior dimensions.

Keywords: automated driving, comfort, take-over, vehicle interior

Procedia PDF Downloads 22
1910 The Importance of Affinity Groups for Organizations and Employees

Authors: Helio Arthur Reis Irigaray, Fabricio Stocker

Abstract:

This study aims to discover the extent to which affinity groups effectively act to combat inequalities, promote diversity, and contribute to the inclusion of non-hegemonic groups in the work environment. To this end, we have built empirical research, in which we interviewed 36 leaders and members of the collectives of non-hegemonic groups, namely women, blacks, and LGBTQ. With the proper authorization of the participants, their interviews were transcribed and submitted for critical analysis of the discourse. The field revealed that collectives are the result of the articulation of non-hegemonic groups, which create and participate in legitimate and institutional spaces to promote diversity. We also identified that diversity actions have happened as a market trend and reproduced mimetically. As the largest companies implement these actions, they become benchmarking and thus create a flow that is reproduced by other companies. However, there is no effective change in the structures that could promote inclusion and belonging. We state that a diverse group of employees are not enough to claim that the organization is diverse and inclusive. There remains much more to discuss and delve into deeply, including gender, diversity, and intersectionality.

Keywords: diversity, inclusion, collectives, affinity groups, employee resource groups

Procedia PDF Downloads 90
1909 Assessing the Impacts of Long-Range Forest Fire Emission Transport on Air Quality in Toronto, Ontario, Using MODIS Fire Data and HYSPLIT Trajectories

Authors: Bartosz Osiecki, Jane Liu

Abstract:

Pollutants emitted from forest fires such as PM₂.₅ and carbon monoxide (CO) have been found to impact the air quality of distant regions through long-range transport. PM₂.₅ is of particular concern due to its transport capacity and implications for human respiratory and cardiovascular health. As such, significant increases in PM₂.₅ concentrations have been exhibited in urban areas downwind of fire sources. This study seeks to expand on this literature by evaluating the impacts of long-range forest fire emission transport on air quality in Toronto, Ontario, as a means of evaluating the vulnerability of this major urban center to distant fire events. In order to draw correlations between the fire event and air pollution episode in Toronto, MODIS fire count data and HYPLSIT trajectories are used to assess the date, location, and severity of the fire and track the trajectory of emissions (respectively). Forward and back-trajectories are run, terminating at the West Toronto air monitoring station. PM₂.₅ and CO concentrations in Toronto during September 2017 are found to be significantly elevated, which is likely attributable to the fire activity. Other sites in Ontario including Toronto (East, North, Downtown), Mississauga, Brampton, and Hamilton (Downtown) exhibit similar peaks in PM₂.₅ concentrations. This work sheds light on the non-local, natural factors influencing air quality in urban areas. This is especially important in the context of climate change which is expected to exacerbate intense forest fire events in the future.

Keywords: air quality, forest fires, PM₂.₅, Toronto

Procedia PDF Downloads 130
1908 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 277
1907 Old and New Paradigms for Pre-Earthquake Prevention and Post-Earthquake Regeneration of Territories in Crisis in Italy

Authors: Maria Angela Bedini, Fabio Bronzini

Abstract:

Most of the Italian territory is at seismic risk. Many earthquakes have hit Italy, and devastating effects have been generated. The specific objective of the research is to distinguish the negative approaches that have generated unacceptable social situations of marginalization, abandonment, and economic regression, from positive methodological approaches. On the basis of the different situations examined, the study proposes strategies and guidelines to obtain the best possible results, in Italy or abroad, in the event of new earthquakes. At national and international level, many theoretical studies address the aspects of prevention, while the comparisons, carried out in this study, between the techniques and the operative procedures applied and the results obtained are rare. The adopted methodology compares the different pre-earthquake urban-planning approaches, for the emergency (temporary urban planning), and for the post-earthquake (socio-economic-territorial processes) in Italy. Attention is placed on the current consolidated planning and programming acquisitions, pre and post-earthquake. The main results of the study concern the prospects in Italy of protection from seismic risks in the next decades. An integrated settlement system for a new economic and social model, aimed at the rebirth of territories in crisis, is proposed. Finally, the conclusions describe the disciplinary positions, procedures and the fundamental points generally shared by the scientific community for each approach, in order to identify the strategic choices and the disciplinary and management paths that will be followed in the coming decades.

Keywords: post-earthquake, seismic emergency, seismic prevention, urban planning interventions in Italy

Procedia PDF Downloads 128
1906 Analysis of the Fire Hazard Posed by Petrol Stations in Stellenbosch and the Extent to Which Planning Acknowledges Risk

Authors: Kwanele Qonono

Abstract:

Despite the significance and economic benefits of petrol stations in South Africa, these still pose a huge risk of fire and explosion threatening public safety. This research paper examines the extent to which land-use planning in Stellenbosch, South Africa, considers the fire risk posed by petrol stations and the implications for public safety as well as preparedness for large fires or explosions. To achieve this, the research identified the land-use types around petrol stations in Stellenbosch and determined the extent to which their locations comply with the local, national, and international land-use planning regulations. A mixed research method consisting of the collection and analysis of geospatial data and qualitative data was an applied method, where petrol stations within a six-kilometre radius of Stellenbosch’s town centre were utilised as study sites. The research examined the risk of fires/explosions at these petrol stations. The research investigated Stellenbosch Municipality’s institutional preparedness to respond in the event of a fire/explosion at these petrol stations. The research observed that siting of petrol stations does not comply with local, national, and international good practices, thus exposing the surrounding developments to fires and explosions. Land-use planning practice does not consider hazards created by petrol stations. Despite the potential for major fires at petrol stations, Stellenbosch Municipality’s level of preparedness to respond to petrol station fires appears low due to the prioritisation of more frequent events.

Keywords: petrol stations, technological hazard, drr, land-use planning, risk analysis

Procedia PDF Downloads 106
1905 Contribution of Foraminifers in Biostratigraphy and Paleoecology Interpretations of the Basal Eocene From the Phosphatic Sra Ouertaine Basin, in the Southern Tethys(Tunisia)

Authors: Oum Elkhir Mahmoudi, Nebiha Ben Haj Ali

Abstract:

Micropaleontological, sedimentological and statistical studies were carried out on the late Paleoceneearly Eocene succession of Sra Ouertaine and Dyr El Kef in Northern open phosphatic Basin of Tunisia. Based on the abundance and stratigraphic distribution of planktic foraminiferal species, five planktic zones have been recognized from the base to the top of the phosphatic layers. The El Acarinina sibaiyaensis Zone, the E2 Pseudohastigerina wilcoxensis Zone, the E3 Morozovella marginodentata Zone, the E4 Morozovella formosa Zones and the E5 Morozovella subbotinae Zone. The placement of Paleocene-Eocene boundary (PETM) is just below the base of the phosphatic interval. The ETM-2 event may be detectable in the analyzed biotic record of Sra Ouertaine. Based on benthic assemblages, abundances, cluster and multivariate statistical analyses, two biofacies were recognized for each section. The recognized ecozones are typical of warm and shallow water inner neritic setting (dominance of epifaunal fauna Anomalinoides, Dentalina and Cibicidoides associated with Frondicularia phosphatica, Trochamminoides globigeriniformis and Eponides elevatus). The paleoenvironment is eutrophic (presence of several bolivinitids and verneuilinids). For the Dyr El Kef section and P5 and E2 of Sra Ouertaine section, our records indicate that paleoenvironment is influenced by coastal upwelling without oxygen-deficiency, the paleodepth is estimated to be around 50 m. The paleoecosystem is diversified and balanced with a general tendency to stressed condition. While the upper part of Sra Ouertaine section is more eutrophic, influenced by coastal upwelling with oxygen-deficiency, the paleodepth is estimated to be less than 50 m and the ecosystem is unsettled.

Keywords: Tunisia, early Eocene, foraminifera, chronostratigraphy

Procedia PDF Downloads 30
1904 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 92
1903 The Appeal of Vocal Islamism in the West: The Case of Hizb ut-Tahrir vis-à-vis Its Competitors

Authors: Elisa Orofino

Abstract:

Islamism is a very debated topic in the West but almost exclusively explored in its violent forms. Nevertheless, a number of “vocal radical Islamist” groups exist in the West and legally operate because of their non-violent nature. Vocal radicals continually inspire individuals and lead them towards specific goals and priorities, sometimes even towards violence. This paper uses the long-living group Hizb ut-Tahrir (HT) to explore the elements that make the organization appealing to segments of Muslim community in the West. This paper uses three agency variables - reflexive monitoring, the rationalization of action and the motivations for actions – to analyze HT’s appeal vis-à-vis two other Islamist groups, Ikhwan al-Muslimun and Jamaat-e-Islami (JeI), having similar goals and the same high international profile. This paper concludes that HT’s uniqueness is given by its method, detailed vision of the caliphate, consistency over time and the emphasis placed on the caliphate as the leading force of HT’s unchanged motivation for action.

Keywords: agency, caliphate, Islamist groups, radicalization, vocal radicals

Procedia PDF Downloads 121
1902 Digital Preservation: Requirement of 21st Century

Authors: Gaurav Kumar, Shilpa

Abstract:

Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper focuses on operational digital preservation systems specifically in educational organizations in India. It considers the broad range of digital objects including e-journals, technical reports, e-records, project documents, scientific data, etc. This paper describes the main objectives, process and technological issues involved in preservation of digital materials. Digital preservation refers to the various methods of keeping digital materials alive for the future. It includes everything from electronic publications on CD-ROM to Online database and collections of experimental data in digital format maintains the ability to display, retrieve and use digital collections in the face of rapidly changing technological and organizational infrastructures elements. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation.

Keywords: preservation, digital preservation, digital dark age, conservation, archive, repository, document, information technology, hardware, software, organization, machine readable format

Procedia PDF Downloads 458
1901 The DAQ Debugger for iFDAQ of the COMPASS Experiment

Authors: Y. Bai, M. Bodlak, V. Frolov, S. Huber, V. Jary, I. Konorov, D. Levit, J. Novy, D. Steffen, O. Subrt, M. Virius

Abstract:

In general, state-of-the-art Data Acquisition Systems (DAQ) in high energy physics experiments must satisfy high requirements in terms of reliability, efficiency and data rate capability. This paper presents the development and deployment of a debugging tool named DAQ Debugger for the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN. Utilizing a hardware event builder, the iFDAQ is designed to be able to readout data at the average maximum rate of 1.5 GB/s of the experiment. In complex softwares, such as the iFDAQ, having thousands of lines of code, the debugging process is absolutely essential to reveal all software issues. Unfortunately, conventional debugging of the iFDAQ is not possible during the real data taking. The DAQ Debugger is a tool for identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it. It provides the layer for an easy integration to any process and has no impact on the process performance. Based on handling of system signals, the DAQ Debugger represents an alternative to conventional debuggers provided by most integrated development environments. Whenever problem occurs, it generates reports containing all necessary information important for a deeper investigation and analysis. The DAQ Debugger was fully incorporated to all processes in the iFDAQ during the run 2016. It helped to reveal remaining software issues and improved significantly the stability of the system in comparison with the previous run. In the paper, we present the DAQ Debugger from several insights and discuss it in a detailed way.

Keywords: DAQ Debugger, data acquisition system, FPGA, system signals, Qt framework

Procedia PDF Downloads 284
1900 Assessment of Physical, Chemical and Radionuclides Concentrations in Pharamasucal Industrial Wastewater Effluents in Amman, Jordan

Authors: Mohammad Salem Abdullah Alhwaiti

Abstract:

This study was conducted to assess the physical, chemical, and radionuclide concentrations of pharmaceutical industrial wastewater effluents. Fourteen wastewater samples were collected from pharmaceutical industries. The results showed a marked reduction in the levels of TH, Mg, and Ca concentration in wastewater limit for properties and criteria for discharge of wastewater to streams or wadies or water bodies in the effluent, whereas TSS and TDS showed higher concentration allowable for discharge of wastewater to streams or wadies or water bodies. The gross α activity in all the wastewater samples ranged between (0.086-0.234 Bq/L) lowered the 0.1 Bq/L limit set by World Health Organization (WHO), whereas gross β activity in few samples ranged between (2.565-4.800 Bq/L), indicating the higher limit set by WHO. Gamma spectroscopy revealed that K-40, Cr-51, Co-60, I-131, Cs-137, and U-238 activity are ≤0.114 Bq/L, ≤0.062 Bq/L, ≤0.00815Bq/L, ≤0.00792Bq/L, ≤0.00956 Bq/L, and ≤0.151 Bq/L, respectively, indicating lowest concentrations of these radionuclides in the pharmaceutical industrial wastewater effluents.

Keywords: pharmaceutical wastewater, gross α/β activity, radionuclides, Jordan

Procedia PDF Downloads 96
1899 Modification of Electrical and Switching Characteristics of a Non Punch-Through Insulated Gate Bipolar Transistor by Gamma Irradiation

Authors: Hani Baek, Gwang Min Sun, Chansun Shin, Sung Ho Ahn

Abstract:

Fast neutron irradiation using nuclear reactors is an effective method to improve switching loss and short circuit durability of power semiconductor (insulated gate bipolar transistors (IGBT) and insulated gate transistors (IGT), etc.). However, not only fast neutrons but also thermal neutrons, epithermal neutrons and gamma exist in the nuclear reactor. And the electrical properties of the IGBT may be deteriorated by the irradiation of gamma. Gamma irradiation damages are known to be caused by Total Ionizing Dose (TID) effect and Single Event Effect (SEE), Displacement Damage. Especially, the TID effect deteriorated the electrical properties such as leakage current and threshold voltage of a power semiconductor. This work can confirm the effect of the gamma irradiation on the electrical properties of 600 V NPT-IGBT. Irradiation of gamma forms lattice defects in the gate oxide and Si-SiO2 interface of the IGBT. It was confirmed that this lattice defect acts on the center of the trap and affects the threshold voltage, thereby negatively shifted the threshold voltage according to TID. In addition to the change in the carrier mobility, the conductivity modulation decreases in the n-drift region, indicating a negative influence that the forward voltage drop decreases. The turn-off delay time of the device before irradiation was 212 ns. Those of 2.5, 10, 30, 70 and 100 kRad(Si) were 225, 258, 311, 328, and 350 ns, respectively. The gamma irradiation increased the turn-off delay time of the IGBT by approximately 65%, and the switching characteristics deteriorated.

Keywords: NPT-IGBT, gamma irradiation, switching, turn-off delay time, recombination, trap center

Procedia PDF Downloads 157
1898 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach

Authors: Hiroaki Fukuda

Abstract:

This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.

Keywords: aspect-oriented programming, concurrent, development process, rich internet application

Procedia PDF Downloads 301