Search results for: mere conduit service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3849

Search results for: mere conduit service

2139 Modern Trends in Pest Management Agroindustry

Authors: Amarjit S Tanda

Abstract:

Integrated Pest Management Technology (IPMT) offers a crop protection model with sustainable agriculture production with minimum damage to the environment and human health. A concept of agro-ecological crop protection seems unsuitable under dynamic environmental systems. To remedy this, we are proposing Genetically Engineered Crop Protection System (GECPS), as an alternate concept in IPMT that suggests how GE cultivars can be optimally put to the service of crop protection. Genetically engineered cultivars which are developed by gene editing biotechnology may provide a preventive defense against the insect pests and plant diseases, a suitable alternative crop system for blending in IPMT program, in the future agro-industry.

Keywords: integrated, pest, management, technology

Procedia PDF Downloads 71
2138 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations

Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri

Abstract:

With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.

Keywords: architectural layout, automated teller machine, e-services, postilion

Procedia PDF Downloads 630
2137 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156
2136 Developing a Recommendation Library System based on Android Application

Authors: Kunyanuth Kularbphettong, Kunnika Tenprakhon, Pattarapan Roonrakwit

Abstract:

In this paper, we present a recommendation library application on Android system. The objective of this system is to support and advice user to use library resources based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on under association rules, Apriori algorithm. In this project, it was divided the result by the research purposes into 2 parts: developing the Mobile application for online library service and testing and evaluating the system. Questionnaires were used to measure user satisfaction with system usability by specialists and users. The results were satisfactory both specialists and users.

Keywords: online library, Apriori algorithm, Android application, black box

Procedia PDF Downloads 486
2135 Effect of Cloud Computing on Enterprises

Authors: Amir Rashid

Abstract:

Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.

Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS

Procedia PDF Downloads 339
2134 Evaluation on the Compliance of Essential Intrapartum Newborn Care among Nurses in Selected Government Hospital in Manila

Authors: Eliza Torrigue, Efrelyn Iellamo

Abstract:

Maternal death is one of the rising health issues in the Philippines. It is alarming to know that in every hour of each day, a mother gives birth to a child who may not live to see the next day. Statistics shows that intrapartum period and third stage of labor are the very crucial periods for the expectant mother, as well as the first six hours of life for the newborn. To address the issue, The Essential Intrapartum Newborn Care (EINC) was developed. Through this, Obstetric Delivery Room (OB-DR) Nurses shall be updated with the evidence-based maternal and newborn care to ensure patient safety, thus, reducing maternal and child mortality. This study aims to describe the compliance of hospitals, especially of OB-DR nurses, to the EINC Protocols. The researcher aims to link the profile variables of the respondents in terms of age, length of service and formal training to their compliance on the EINC Protocols. The outcome of the study is geared towards the development of appropriate training program for OB-DR Nurses assigned in the delivery room of the hospitals based on the study’s results to sustain the EINC standards. A descriptive correlational method was used. The sample consists of 75 Obstetric Delivery Room (OB-DR) Nurses from three government hospitals in the City of Manila namely, Ospital ng Maynila Medical Center, Tondo Medical Center, and Gat Andres Bonifacio Memorial Medical Center. Data were collected using an evaluative checklist. Ranking, weighted mean, Chi-square and Pearson’s R were used to analyze data. The level of compliance to the EINC Protocols by the respondents was evaluated with an overall mean score of 4.768 implying that OB-DR Nurses have a high regard in complying with the step by step procedure of the EINC. Furthermore, data shows that formal training on EINC have a significant relationship with OB-DR Nurses’ level of compliance during cord care, AMTSL, and immediate newborn care until the first ninety minutes to six hours of life. However, the respondents’ age and length of service do not have a significant relationship with the compliance of OB-DR Nurses on EINC Protocols. In the pursuit of decreasing the maternal mortality in the Philippines, EINC Protocols have been widely implemented in the country especially in the government hospitals where most of the deliveries happen. In this study, it was found out that OB-DR Nurses adhere and are highly compliant to the standards in order to assure that optimum level of care is delivered to the mother and newborn. Formal training on EINC, on the other hand, create the most impact on the compliance of nurses. It is therefore recommended that there must be a structured enhancement training program to plan, implement and evaluate the EINC protocols in these government hospitals.

Keywords: compliance, intrapartum, newborn care, nurses

Procedia PDF Downloads 391
2133 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 47
2132 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 497
2131 An Efficiency Measurement of E-Government Performance for United Nation Ranking Index

Authors: Yassine Jadi, Lin Jie

Abstract:

In order to serve the society in an electronic manner, many developing countries have launched tremendous e-government projects. The strategies of development and implementation e-government system have reached different levels, and to ensure consistency of development, the governments need to evaluate e-government performance. The United nation has design e-government development ranking index (EGDI) that rely on three indexes, Online service index (OSI), Telecommunication Infrastructure index (TII), and human capital index( HCI) which are not reflecting the interaction between a government and their citizens. Based on data envelopment analyses (DEA) technique, we are using E-participating index (EPI) as an output of government effort to evaluate the performance of e-government system. Therefore, the ranking index can be achieved in efficiency manner.

Keywords: e-government, DEA, efficiency measurement, EGDI

Procedia PDF Downloads 374
2130 Challenges of Effective Management in Tetiary Institutions in Nigeria

Authors: Simon Oga Egboja, Agi Sunday

Abstract:

The government of Nigeria have invested so much in our tertiary education but the desire qualitative goals and objectives are yet to be achieved because management at all level are not efficient and effective in implementing the desired educational policies and programmes due to some management challenges. This paper investigates some of the major challenges to effective management of tertiary institution in Nigeria some variable that are important to effective management includes political stability, adequate funding, establishment of information system, recruitment and appointment of qualified teachers and condition of service.

Keywords: effective management includes political stability, adequate funding, establishment of information system, recruitment and appointment of qualified teachers

Procedia PDF Downloads 303
2129 Using Educational Gaming as a Blended Learning Tool in South African Education

Authors: Maroonisha Maharajh

Abstract:

Based on the Black Swan and Disruptive Innovation Theories, this study proposes an educational game based learning model within the context of the traditional classroom learning environment. In the proposed model, the perceived e-learning component is decomposed into accessibility, perceived quality and perceived usability within the traditional rural classroom environment. A sample of 92 respondents took part in this study. The results suggest that users’ continuance intention is determined by both economic and grassroots internet accessibility, which in turn is jointly determined by perceived usefulness, information quality, service quality, system quality, perceived ease of use and cognitive absorption of learning.

Keywords: blended learning, flipped classroom, e-learning, gaming

Procedia PDF Downloads 252
2128 Health Monitoring of Concrete Assets in Refinery

Authors: Girish M. Bhatia

Abstract:

Most of the important structures in refinery complex are RCC Structures for which in-depth structural monitoring and inspection is required for incessant service. Reinforced concrete structures can be under threat from a combination of insidious challenges due to environmental conditions, including temperature and humidity that lead to accelerated deterioration mechanisms like carbonation, as well as marine exposure, above and below ground structures can experience ingress from aggressive ground waters carrying chlorides and sulphates leading to unexpected deterioration that threaten the integrity of a vital structural asset. By application of health monitoring techniques like corrosion monitoring with help of sensor probes, visual inspection of high rise structures with help of drones, it is possible to establish an early warning at the onset of these destructive processes.

Keywords: concrete structures, corrosion sensors, drones, health monitoring

Procedia PDF Downloads 396
2127 Injunctions, Disjunctions, Remnants: The Reverse of Unity

Authors: Igor Guatelli

Abstract:

The universe of aesthetic perception entails impasses about sensitive divergences that each text or visual object may be subjected to. If approached through intertextuality that is not based on the misleading notion of kinships or similarities a priori admissible, the possibility of anachronistic, heterogeneous - and non-diachronic - assemblies can enhance the emergence of interval movements, intermediate, and conflicting, conducive to a method of reading, interpreting, and assigning meaning that escapes the rigid antinomies of the mere being and non-being of things. In negative, they operate in a relationship built by the lack of an adjusted meaning set by their positive existences, with no remainders; the generated interval becomes the remnant of each of them; it is the opening that obscures the stable positions of each one. Without the negative of absence, of that which is always missing or must be missing in a text, concept, or image made positive by history, nothing is perceived beyond what has been already given. Pairings or binary oppositions cannot lead only to functional syntheses; on the contrary, methodological disturbances accumulated by the approximation of signs and entities can initiate a process of becoming as an opening to an unforeseen other, transformation until a moment when the difficulties of [re]conciliation become the mainstay of a future of that sign/entity, not envisioned a priori. A counter-history can emerge from these unprecedented, misadjusted approaches, beginnings of unassigned injunctions and disjunctions, in short, difficult alliances that open cracks in a supposedly cohesive history, chained in its apparent linearity with no remains, understood as a categorical historical imperative. Interstices are minority fields that, because of their opening, are capable of causing opacity in that which, apparently, presents itself with irreducible clarity. Resulting from an incomplete and maladjusted [at the least dual] marriage between the signs/entities that originate them, this interval may destabilize and cause disorder in these entities and their own meanings. The interstitials offer a hyphenated relationship: a simultaneous union and separation, a spacing between the entity’s identity and its otherness or, alterity. One and the other may no longer be seen without the crack or fissure that now separates them, uniting, by a space-time lapse. Ontological, semantic shifts are caused by this fissure, an absence between one and the other, one with and against the other. Based on an improbable approximation between some conceptual and semantic shifts within the design production of architect Rem Koolhaas and the textual production of the philosopher Jacques Derrida, this article questions the notion of unity, coherence, affinity, and complementarity in the process of construction of thought from these ontological, epistemological, and semiological fissures that rattle the signs/entities and their stable meanings. Fissures in a thought that is considered coherent, cohesive, formatted are the negativity that constitutes the interstices that allow us to move towards what still remains as non-identity, which allows us to begin another story.

Keywords: clearing, interstice, negative, remnant, spectrum

Procedia PDF Downloads 133
2126 Congestion Control in Mobile Network by Prioritizing Handoff Calls

Authors: O. A. Lawal, O. A Ojesanmi

Abstract:

The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.

Keywords: call block, channel, handoff, mobile cellular network

Procedia PDF Downloads 392
2125 Interventions to Improve the Performance of Community Based Health Insurance in Low- and Lower Middle-Income-Countries: a Systematic Review

Authors: Scarlet Tabot Enanga Longsti

Abstract:

Community-Based Health Insurance (CBHI) schemes have been proposed as a possible means to achieve affordable health care in low-and lower-middle-income countries. The existing evidence provides mixed results on the impact of CBHI schemes on healthcare utilisation and out -of-pocket payments (OOPP) for healthcare. Over 900 CBHI schemes have been implemented in underdeveloped countries, and these schemes have undergone different modifications over the years. Prior reviews have suggested that different designs of CBHI schemes may result in different outcomes. Objectives: This review sought to determine the interventions that affect the impact of CBHI schemes on OOPP and health service utilisation. Interventions in this study referred to any action or modification in the design of a CBHI scheme that affected the impact of the scheme on OOPP and/or healthcare utilization. Methods: Any CBHI study that was done in a lower middle-income country, that used an experimental design, that included OOPP or health care utilisation as outcome variables, and that was published in either English or French was included in this study. Studies were searched for in MEDLINE, Embase, CINAHL, EconLit, IBSS, Web of Science, Cochrane Library, and Global Index Medicus from July to August 2023. Bias was assessed using Joanna Brigs Institute tools for quality assessment for randomized control trials and quasi experimental studies. A narrative synthesis was done. Results: 12 studies were included in the review, with a total of 69 villages, 13,653 households, and 62,786 participants. Average premium collection was 4.8 USD/year. Most CBHI schemes had flat rates. The study revealed that a range of interventions impact OOPP and health care utilisation. Five categories of interventions were identified. The intervention with the highest impact on OOPP and utilisation was “Audit visits”. Next in line came external funds, training scheme workers, and engaging community leaders and village heads to advertise the scheme. Free healthcare led to a significant increase in utilisation of health services, a significant reduction in Catastrophic health expenditure, but an insignificant effect on OOPP among insured compared with uninsured. Conclusions: Community-Based Health Insurance could pave the way for Universal Health Care in low and middle-income countries. However, this can only be possible if careful thought is given to how schemes are designed. Due to the heterogeneity of studies and results on CBHI schemes, there is need for further research for more effective designs to be developed.

Keywords: community based health insurance, developing countries, health service utilisation, out of pocket payment

Procedia PDF Downloads 66
2124 Reliability of Intra-Logistics Systems – Simulating Performance Availability

Authors: Steffen Schieweck, Johannes Dregger, Sascha Kaczmarek, Michael ten Hompel

Abstract:

Logistics distributors face the issue of having to provide increasing service levels while being forced to reduce costs at the same time. Same-day delivery, quick order processing and rapidly growing ranges of articles are only some of the prevailing challenges. One key aspect of the performance of an intra-logistics system is how often and in which amplitude congestions and dysfunctions affect the processing operations. By gaining knowledge of the so called ‘performance availability’ of such a system during the planning stage, oversizing and wasting can be reduced whereas planning transparency is increased. State of the art for the determination of this KPI are simulation studies. However, their structure and therefore their results may vary unforeseeably. This article proposes a concept for the establishment of ‘certified’ and hence reliable and comparable simulation models.

Keywords: intra-logistics, performance availability, simulation, warehousing

Procedia PDF Downloads 453
2123 A Transnational Feminist Analysis of the Experiences of Return Migrant Women to Kosova

Authors: Kaltrina Kusari

Abstract:

Displaced populations have received increasing attention, yet the experiences of return migrants remain largely hidden within social sciences. Existing research, albeit limited, suggests that policies which impact return migrants, especially those forced to return to their home countries, do not reflect their voices. Specifically, the United Nations Hight Commissioner for Refugees has adopted repatriation as a preferred policy solution, despite research which substantiates that returning to one’s home country is neither durable nor the end of the migration cycle; as many of 80% of returnees decide to remigrate. This one-size-fits-all approach to forced displacement does not recognize the impact of intersecting identity categories on return migration, thus failing to consider how ethnicity, gender, and class, among others, shape repatriation. To address this, this qualitative study examined the repatriation experiences of return migrant women from Kosovo and the role of social workers in facilitating return. In 2015, Kosovars constituted the fourth largest group of asylum seekers in the European Union, yet 96% of them were rejected. Additionally, since 1999 Kosovo has ranked among the top 10 countries of origin for return migrants. Considering that return migration trends are impacted by global power dynamics, this study relied on a postcolonial and transnational feminist framework to contextualize the mobility of displaced peoples in terms of globalization and conceptualize migration as a gendered process. Postcolonial and feminist theories suggest that power is partly operationalized through language, thus, Critical Discourse Analysis was used as a research methodology. CDA is concerned with examining how power, language, and discourses shape social processes and relationships of dominance. Data collection included interviews with 15 return migrant women (eight ethnic minorities and seven Albanian) and 18 service providers in Kosovo. The main findings illustrate that both returnee women and service providers rely on discourses which 1) challenge the voluntariness and sustainability of repatriation; 2) construct Kosovo as inferior to EU countries; and 3) highlight the impact of patriarchy and ethnic racism on return migration. A postcolonial transnational feminist analysis demonstrates that despite Kosovars’ challenges with repatriation, European Union countries use their power to impose repatriation as a preferred solution for Kosovo’s government. These findings add to the body of existing repatriation literature and provide important implications for how return migration might be carried out, not only in Kosovo but other countries as well.

Keywords: migration, gender, repatriation, transnational feminism

Procedia PDF Downloads 81
2122 Quality Assessment of the Given First Aid on the Spot Events in the Opinion of Members of the Teams of the Medical Rescue in Warsaw in Poland

Authors: Aneta Binkowska, Artur Kamecki

Abstract:

The ability to provide first aid should be one of the basic skills of each of us. First aid by the Law on National Medical Emergency dated 8 September 2006 as amended, is a set of actions undertaken to save a person at the scene of an accident. In Poland, on the basis of Article 162 of the Criminal Code, we are obliged to provide first aid to the victim. In addition, according to a large part of society, unselfishness towards others in need of help is our moral obligation. The aim of the study was to learn the opinion of the members of Medical Rescue Teams (MRT) of the ‘Meditrans’ Provincial Ambulance and Sanitary Transport Service (PA and STS ‘Meditrans’) in Warsaw on how people react in real situations threatening life or health of the injured person. The study was conducted in the third quarter of 2015 on 335 members of medical rescue teams, including 77 W and 258 M, who provided medical services in the ‘Meditrans’ Provincial Ambulance and Sanitary Transport Service MRT in Warsaw. The research tool was an anonymous questionnaire survey of own design, which consisted of 12 questions: closed, half open and one open question. Respondents were divided into 3 age groups and by individual medical professions (doctor, paramedic, nurse). The straight majority of respondents encountered granting the first aid the event on the spot. However, the frequency of appearing in such proceedings isn’t too high. The first aid has most often been given in the street and in houses. The final audited fairly important element is the reason not to provide first aid by bystanders in the opinion of members of the medical teams. Respondents to this question, which was an open question were asked to name the reason for not taking any action while waiting for an ambulance. Over 50% of respondents could not answer. The most common answers were: fear, lack of knowledge and skills, reluctance, indifference, lack of training, lack of experience and fear that harm. Conclusion: The majority of respondents have encountered instances of first aid provision, but respondents assessed the frequency of such situations as low. Placing the victim in the recovery position is the simplest and most common form of first aid. Therefore, training should be introduced not only on CPR but also in the scope of helping persons in sudden health emergency, who do not have a sudden cardiac arrest. A statement can be formulated, as a main conclusion of the analysis, that only continuous education and in particular practical training will help people to overcome the barrier of their limitations in order to help others. Among the largest group of witnesses providing first aid are the elderly and youth, who are subjected to various forms of education related to first aid provision.

Keywords: BLS, first aid, medical rescue, resuscitation

Procedia PDF Downloads 151
2121 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 57
2120 Economic Analysis of Policy Instruments for Energy Efficiency

Authors: Etidel Labidi

Abstract:

Energy efficiency improvement is one of the means to reduce energy consumption and carbon emissions. Recently, some developed countries have implemented the tradable white certificate scheme (TWC) as a new policy instrument based on market approach to support energy efficiency improvements. The major focus of this paper is to compare the White Certificates (TWC) scheme as an innovative policy instrument for energy efficiency improvement to other policy instruments: energy taxes and regulations setting a minimum level of energy efficiency. On the basis of our theoretical discussion and numerical simulation, we show that the white certificates system is the most interesting policy instrument for saving energy because it generates the most important level of energy savings and the least increase in energy service price.

Keywords: energy savings, energy efficiency, energy policy, white certificates

Procedia PDF Downloads 333
2119 Mathematical Modeling of Switching Processes in Magnetically Controlled MEMS Switches

Authors: Sergey M. Karabanov, Dmitry V. Suvorov, Dmitry Yu. Tarabrin

Abstract:

The operating principle of magnetically controlled microelectromechanical system (MEMS) switches is based on controlling the beam movement under the influence of a magnetic field. Currently, there is a MEMS switch design with a flexible ferromagnetic electrode in the form of a fixed-terminal beam, with an electrode fastened on a straight or cranked anchor. The basic performance characteristics of magnetically controlled MEMS switches (service life, sensitivity, contact resistance, fast response) are largely determined by the flexible electrode design. To ensure the stable and controlled motion of the flexible electrode, it is necessary to provide the optimal design of a flexible electrode.

Keywords: flexible electrode, magnetically controlled MEMS, mathematical modeling, mechanical stress

Procedia PDF Downloads 178
2118 Choice of Sleeper and Rail Fastening Using Linear Programming Technique

Authors: Luciano Oliveira, Elsa Vásquez-Alvarez

Abstract:

The increase in rail freight transport in Brazil in recent years requires new railway lines and the maintenance of existing ones, which generates high costs for concessionaires. It is in this context that this work is inserted, whose objective is to propose a method that uses Binary Linear Programming for the choice of sleeper and rail fastening, from various options, including the way to apply these materials, with focus to minimize costs. Unit value information, the life cycle each of material type, and service expenses are considered. The model was implemented in commercial software using real data for its validation. The formulated model can be replicated to support decision-making for other railway projects in the choice of sleepers and rail fastening with lowest cost.

Keywords: linear programming, rail fastening, rail sleeper, railway

Procedia PDF Downloads 197
2117 Testing the Impact of the Nature of Services Offered on Travel Sites and Links on Traffic Generated: A Longitudinal Survey

Authors: Rania S. Hussein

Abstract:

Background: This study aims to determine the evolution of service provision by Egyptian travel sites and how these services change in terms of their level of sophistication over the period of the study which is ten years. To the author’s best knowledge, this is the first longitudinal study that focuses on an extended time frame of ten years. Additionally, the study attempts to determine the popularity of these websites through the number of links to these sites. Links maybe viewed as the equivalent of a referral or word of mouth but in an online context. Both popularity and the nature of the services provided by these websites are used to determine the traffic on these sites. In examining the nature of services provided, the website itself is viewed as an overall service offering that is composed of different travel products and services. Method: This study uses content analysis in the form of a small scale survey done on 30 Egyptian travel agents’ websites to examine whether Egyptian travel websites are static or dynamic in terms of the services that they provide and whether they provide simple or sophisticated travel services. To determine the level of sophistication of these travel sites, the nature and composition of products and services offered by these sites were first examined. A framework adapted from Kotler (1997) 'Five levels of a product' was used. The target group for this study consists of companies that do inbound tourism. Four rounds of data collection were conducted over a period of 10 years. Two rounds of data collection were made in 2004 and two rounds were made in 2014. Data from the travel agents’ sites were collected over a two weeks period in each of the four rounds. Besides collecting data on features of websites, data was also collected on the popularity of these websites through a software program called Alexa that showed the traffic rank and number of links of each site. Regression analysis was used to test the effect of links and services on websites as independent variables on traffic as the dependent variable of this study. Findings: Results indicate that as companies moved from having simple websites with basic travel information to being more interactive, the number of visitors illustrated by traffic and the popularity of those sites increase as shown by the number of links. Results also show that travel companies use the web much more for promotion rather than for distribution since most travel agents are using it basically for information provision. The results of this content analysis study taps on an unexplored area and provide useful insights for marketers on how they can generate more traffic to their websites by focusing on developing a distinctive content on these sites and also by focusing on the visibility of their sites thus enhancing the popularity or links to their sites.

Keywords: levels of a product, popularity, travel, website evolution

Procedia PDF Downloads 320
2116 Beyond Rhetoric and Buzzword, Policies and Politics: Towards Practical Institutional Involvement in Science and Technology Teacher Education Programmes for Sustainable Development

Authors: Alvin Uchenna Ugwu

Abstract:

The United Nation’s 2030 agenda and Global Action Programme (GAP) for implementation of the Sustainable Development Goals (SDGs), has mandated all sectors in the societies, including education, to develop strategies towards actualizing sustainability in all facets of the society, by the year 2030. Education is no doubt a key tool for social change. However, educational institutions in most African nations need a paradigmatic shift to strike a balance between policies (curricular) and practices, with regards to Education for Sustainable Development (ESD). The paradigm shift in this regard is described as whole-institution/school approach. The whole institution approaches advocate action-focused ESD. In other words, ESD policy and curriculum makers, formal and non-formal education institutions, need to ‘practice what they preach’. This paper is developed from an ongoing study carried out by the author and guided by two research questions: -What are the views of intermediate phase science and technology preservice teachers on the ESD content included in the science and technology modules? -What challenges or enable intermediate phase science and technology pre-service teachers to learn about ESD in science and technology modules? The study drew from the views and experiences of preservice science teachers, learning about ESD in a university’s college of education in South Africa. Using qualitative case study research design, the research data were generated via questionnaires and focus group discussions. Analysis of generated data indicates that universities and institutions of higher learning need to demonstrate practical involvement while implementing ESD in societies, rather than just standing as knowledge media. Findings of the study further suggest that natural sciences and technology courses in teacher education programmes and other institutions of higher learning, should be perceived as key transformative tools in shaping the consciousness of students towards integrating and fostering ESD in developing countries such as South Africa. Thus, this paper seeks to promote ‘Whole Institution Involvement’ in teacher education colleges in South Africa, as a measure of improving ESD in higher education settings. The paper suggests that in order to achieve ESD in higher education settings and beyond, policies and practices should be reexamined beyond rhetoric and buzzwords. The paper further argues that implementation of ESD is largely influenced by context, hence two different contexts should be examined empirically.

Keywords: education for sustainable development, higher education institutions, pre-service science teachers, qualitative case study research, whole institution involvement

Procedia PDF Downloads 172
2115 Implementation of an Accessible State-Wide Trauma Education Program

Authors: Christine Lassen, Elizabeth Leonard, Matthew Oliver

Abstract:

The management of trauma is often complex and outcomes dependent on clinical expertise, effective teamwork, and a supported trauma system. The implementation of a statewide trauma education program should be accessible to all clinicians who manage trauma, but this can be challenging due to diverse individual needs, trauma service needs and geography. The NSW Institute of Trauma and Injury Management (ITIM) is a government funded body, responsible for coordinating and supporting the NSW Trauma System. The aim of this presentation is to describe how education initiatives have been implemented across the state. Simulation: In 2006, ITIM developed a Trauma Team Training Course - aimed to educate clinicians on the technical and non-technical skills required to manage trauma. The course is now independently coordinated by trauma services across the state at major trauma centres as well as in regional and rural hospitals. ITIM is currently in the process of re-evaluating and updating the Trauma Team Training Course to allow for the development of new resources and simulation scenarios. Trauma Education Evenings: In 2013, ITIM supported major trauma services to develop trauma education evenings which allowed the provision of free education to staff within the area health service and local area. The success of these local events expanded to regional hospitals. A total of 75 trauma education evenings have been conducted within NSW, with over 10,000 attendees. Wed-Based Resources: Recently, ITIM commenced free live streaming of the trauma education evenings which have now had over 3000 live views. The Trauma App developed in 2015 provides trauma clinicians with a centralised portal for trauma information and works on smartphones and tablets that integrate with the ITIM website. This supports pre-hospital and bedside clinical decisions and allows for trauma care to be more standardised, evidence-based, timely, and appropriate. Online e-Learning modules have been developed to assist clinicians, reduce unwarranted clinical variation and provide up to date evidence based education. The modules incorporate clinically focused education content with summative and formative assessments. Conclusion: Since 2005, ITIM has helped to facilitate the development of trauma education programs for doctors, nurses, pre-hospital and allied health clinicians. ITIM has been actively involved in more than 100 specialized trauma education programs, seminars and clinical workshops - attended by over 12,000 staff. The provision of state-wide trauma education is a challenging task requiring collaboration amongst numerous agencies working towards a common goal – to provide easily accessible trauma education.

Keywords: education, simulation, team-training, trauma

Procedia PDF Downloads 184
2114 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 471
2113 The Impact of Electronic Commerce on Organisational Efectiveness: A Study of Zenith Bank Plc

Authors: Olusola Abiodun Arinde

Abstract:

This research work was prompted by the very important role e-commerce plays in every organization, be it private or public. The underlying objective of this study is to have a critical appraisal of the extent to which e-commerce impacts on organizational effectiveness. This research was carried out using Zenith Bank Plc as a case study. Relevant data were collected through structured questionnaire, oral interview, journals, newspapers, and textbooks. The data collected were analyzed and hypotheses were tested. Based on the result of the hypotheses, it was observed that e-commerce is significant to every organization. Through e-commerce, fast services delivery would be guaranteed to customers, this would lead to higher productivity and profit for organizations. E-commerce should be managed in such a way that it does not alienate customers; it should also prevent enormous risks that are associated with e-commerce.

Keywords: e-commerce, fast service, productivity, profit

Procedia PDF Downloads 244
2112 Offshore Outsourcing: Global Data Privacy Controls and International Compliance Issues

Authors: Michelle J. Miller

Abstract:

In recent year, there has been a rise of two emerging issues that impact the global employment and business market that the legal community must review closer: offshore outsourcing and data privacy. These two issues intersect because employment opportunities are shifting due to offshore outsourcing and some States, like the United States, anti-outsourcing legislation has been passed or presented to retain jobs within the country. In addition, the legal requirements to retain the privacy of data as a global employer extends to employees and third party service provides, including services outsourced to offshore locations. For this reason, this paper will review the intersection of these two issues with a specific focus on data privacy.

Keywords: outsourcing, data privacy, international compliance, multinational corporations

Procedia PDF Downloads 409
2111 Cluster Analysis of Customer Churn in Telecom Industry

Authors: Abbas Al-Refaie

Abstract:

The research examines the factors that affect customer churn (CC) in the Jordanian telecom industry. A total of 700 surveys were distributed. Cluster analysis revealed three main clusters. Results showed that CC and customer satisfaction (CS) were the key determinants in forming the three clusters. In two clusters, the center values of CC were high, indicating that the customers were loyal and SC was expensive and time- and energy-consuming. Still, the mobile service provider (MSP) should enhance its communication (COM), and value added services (VASs), as well as customer complaint management systems (CCMS). Finally, for the third cluster the center of the CC indicates a poor level of loyalty, which facilitates customers churn to another MSP. The results of this study provide valuable feedback for MSP decision makers regarding approaches to improving their performance and reducing CC.

Keywords: cluster analysis, telecom industry, switching cost, customer churn

Procedia PDF Downloads 322
2110 Increasing the Dialogue in Workplaces Enhances the Age-Friendly Organisational Culture and Helps Employees Face Work-Related Dilemmas

Authors: Heli Makkonen, Eini Hyppönen

Abstract:

The ageing of employees, the availability of workforce, and employees’ engagement in work are today’s challenges in the field of health care and social services, and particularly in the care of older people. Therefore, it is important to enhance both the attractiveness of the work in the field of older people’s care and the retention of employees in the field, and also to pay attention to the length of careers. The length of careers can be affected, for example, by developing an age-friendly organisational culture. Changing the organisational culture in a workplace is, however, a slow process which requires engagement from employees and enhanced dialogue between employees. This article presents an example of age-friendly organisational culture in an older people’s care unit and presents the results of the development of this organisational culture to meet the identified development challenges. In this research-based development process, cycles used in action research were applied. Three workshops were arranged for employees in a service home for older people. The workshops worked as interventions, and the employees and their manager were given several consecutive assignments to be completed between them. In addition to workshops, the employees benchmarked two other service homes. In the workshops, data was collected by observing and documenting the conversations. After that, thematic analysis was used to identify the factors connected to an age-friendly organisational culture. By analysing the data and comparing it to previous studies, some dilemmas we recognised that were hindering or enhancing the attractiveness of work and the retention of employees in this nursing home. After each intervention, the process was reflected and evaluated, and the next steps were planned. The areas of development identified in the study were related to, for example, the flexibility of work, holistic ergonomics, the physical environment at the workplace, and the workplace culture. Some of the areas of development were taken over by the work community and carried out in cooperation with e.g. occupational health care. We encouraged the work community, and the employees provided us with information about their progress. In this research project, the focus was on the development of the workplace culture and, in particular, on the development of the culture of interaction. The workshops showed employees’ attitudes and strong opinions, which can be a challenge from the point of view of the attractiveness of work and the retention of employees in the field. On the other hand, the data revealed that the work community has an interest in developing the dialogue in the work community. Enhancing the dialogue gave the employees the opportunity and resources to face even challenging dilemmas related to the attractiveness of work and the retention of employees in the field. The psychological safety was also enhanced at the same time. The results of this study are part of a broader study that aims at building a model for extending older employees’ careers.

Keywords: age-friendliness, attractiveness of work, dialogue, older people, organisational culture, workplace culture

Procedia PDF Downloads 76