Search results for: mobile marketing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2582

Search results for: mobile marketing

752 Estimation of Cholesterol Level in Different Brands of Vegetable Oils in Iraq

Authors: Mohammed Idaan Hassan Al-Majidi

Abstract:

An analysis of twenty one assorted brands of vegetable oils in Babylon Iraq, reveals varying levels of cholesterol content. Cholesterol was found to be present in most of the oil brands sampled using three standard methods. Cholesterol was detected in seventeen of the vegetable oil brands with concentration of less than 1 mg/ml while seven of the oil brands had cholesterol concentrations ranging between 1-4 mg/ml. Low iodine values were obtained in four of the vegetable oil brands and three of them had high acid values. High performance liquid chromatography (HPLC) confirmed the presence of cholesterol at varying concentrations in all the oil brands and gave the lowest detectable cholesterol values in all the oil brands. The Laser brand made from rapeseed had the highest cholesterol concentration of 3.2 mg/ml while Grand brand made from groundnuts had the least concentration (0.12 mg/ml) of cholesterol using HPLC analysis. Leibermann-Burchard method showed that Gino brand from palm kernel had the least concentration of cholesterol (3.86 mg/ml ±0.032) and the highest concentration of 3.996 mg/ml ±0.0404 was obtained in Sesame seed oil brand. This report is important in view of health implications of cholesterol in our diets. Consequently, we have been able to show that there is no cholesterol free oil in the market as shown on the vegetable oil brand labels. Therefore, companies producing and marketing vegetable oils are enjoined to desist from misleading the public by labeling their products as “cholesterol free”. They should indicate the amount of cholesterol present in the vegetable oil, no matter how small the quantity may be.

Keywords: vegetable oils, heart diseases, leibermann-burchard, cholesterol

Procedia PDF Downloads 244
751 Trace Analysis of Genotoxic Impurity Pyridine in Sitagliptin Drug Material Using UHPLC-MS

Authors: Bashar Al-Sabti, Jehad Harbali

Abstract:

Background: Pyridine is a reactive base that might be used in preparing sitagliptin. International Agency for Research on Cancer classifies pyridine in group 2B; this classification means that pyridine is possibly carcinogenic to humans. Therefore, pyridine should be monitored at the allowed limit in sitagliptin pharmaceutical ingredients. Objective: The aim of this study was to develop a novel ultra high performance liquid chromatography mass spectrometry (UHPLC-MS) method to estimate the quantity of pyridine impurity in sitagliptin pharmaceutical ingredients. Methods: The separation was performed on C8 shim-pack (150 mm X 4.6 mm, 5 µm) in reversed phase mode using a mobile phase of water-methanol-acetonitrile containing 4 mM ammonium acetate in gradient mode. Pyridine was detected by mass spectrometer using selected ionization monitoring mode at m/z = 80. The flow rate of the method was 0.75 mL/min. Results: The method showed excellent sensitivity with a quantitation limit of 1.5 ppm of pyridine relative to sitagliptin. The linearity of the method was excellent at the range of 1.5-22.5 ppm with a correlation coefficient of 0.9996. Recoveries values were between 93.59-103.55%. Conclusions: The results showed good linearity, precision, accuracy, sensitivity, selectivity, and robustness. The studied method was applied to test three batches of sitagliptin raw materials. Highlights: This method is useful for monitoring pyridine in sitagliptin during its synthesis and testing sitagliptin raw materials before using them in the production of pharmaceutical products.

Keywords: genotoxic impurity, pyridine, sitagliptin, UHPLC -MS

Procedia PDF Downloads 85
750 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 333
749 Advanced Driver Assistance System: Veibra

Authors: C. Fernanda da S. Sampaio, M. Gabriela Sadith Perez Paredes, V. Antonio de O. Martins

Abstract:

Today the transport sector is undergoing a revolution, with the rise of Advanced Driver Assistance Systems (ADAS), industry and society itself will undergo a major transformation. However, the technological development of these applications is a challenge that requires new techniques and great machine learning and artificial intelligence. The study proposes to develop a vehicular perception system called Veibra, which consists of two front cameras for day/night viewing and an embedded device capable of working with Yolov2 image processing algorithms with low computational cost. The strategic version for the market is to assist the driver on the road with the detection of day/night objects, such as road signs, pedestrians, and animals that will be viewed through the screen of the phone or tablet through an application. The system has the ability to perform real-time driver detection and recognition to identify muscle movements and pupils to determine if the driver is tired or inattentive, analyzing the student's characteristic change and following the subtle movements of the whole face and issuing alerts through beta waves to ensure the concentration and attention of the driver. The system will also be able to perform tracking and monitoring through GSM (Global System for Mobile Communications) technology and the cameras installed in the vehicle.

Keywords: advanced driver assistance systems, tracking, traffic signal detection, vehicle perception system

Procedia PDF Downloads 142
748 Using Crowdsourced Data to Assess Safety in Developing Countries, The Case Study of Eastern Cairo, Egypt

Authors: Mahmoud Ahmed Farrag, Ali Zain Elabdeen Heikal, Mohamed Shawky Ahmed, Ahmed Osama Amer

Abstract:

Crowdsourced data refers to data that is collected and shared by a large number of individuals or organizations, often through the use of digital technologies such as mobile devices and social media. The shortage in crash data collection in developing countries makes it difficult to fully understand and address road safety issues in these regions. In developing countries, crowdsourced data can be a valuable tool for improving road safety, particularly in urban areas where the majority of road crashes occur. This study is the first to develop safety performance functions using crowdsourced data by adopting a negative binomial structure model and Full Bayes model to investigate traffic safety for urban road networks and provide insights into the impact of roadway characteristics. Furthermore, as a part of the safety management process, network screening has been undergone through applying two different methods to rank the most hazardous road segments: PCR method (adopted in the Highway Capacity Manual HCM) as well as a graphical method using GIS tools to compare and validate. Lastly, recommendations were suggested for policymakers to ensure safer roads.

Keywords: crowdsourced data, road crashes, safety performance functions, Full Bayes models, network screening

Procedia PDF Downloads 17
747 Intelligent Transport System: Classification of Traffic Signs Using Deep Neural Networks in Real Time

Authors: Anukriti Kumar, Tanmay Singh, Dinesh Kumar Vishwakarma

Abstract:

Traffic control has been one of the most common and irritating problems since the time automobiles have hit the roads. Problems like traffic congestion have led to a significant time burden around the world and one significant solution to these problems can be the proper implementation of the Intelligent Transport System (ITS). It involves the integration of various tools like smart sensors, artificial intelligence, position technologies and mobile data services to manage traffic flow, reduce congestion and enhance driver's ability to avoid accidents during adverse weather. Road and traffic signs’ recognition is an emerging field of research in ITS. Classification problem of traffic signs needs to be solved as it is a major step in our journey towards building semi-autonomous/autonomous driving systems. The purpose of this work focuses on implementing an approach to solve the problem of traffic sign classification by developing a Convolutional Neural Network (CNN) classifier using the GTSRB (German Traffic Sign Recognition Benchmark) dataset. Rather than using hand-crafted features, our model addresses the concern of exploding huge parameters and data method augmentations. Our model achieved an accuracy of around 97.6% which is comparable to various state-of-the-art architectures.

Keywords: multiclass classification, convolution neural network, OpenCV

Procedia PDF Downloads 161
746 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 224
745 Autonomic Sonar Sensor Fault Manager for Mobile Robots

Authors: Martin Doran, Roy Sterritt, George Wilkie

Abstract:

NASA, ESA, and NSSC space agencies have plans to put planetary rovers on Mars in 2020. For these future planetary rovers to succeed, they will heavily depend on sensors to detect obstacles. This will also become of vital importance in the future, if rovers become less dependent on commands received from earth-based control and more dependent on self-configuration and self-decision making. These planetary rovers will face harsh environments and the possibility of hardware failure is high, as seen in missions from the past. In this paper, we focus on using Autonomic principles where self-healing, self-optimization, and self-adaption are explored using the MAPE-K model and expanding this model to encapsulate the attributes such as Awareness, Analysis, and Adjustment (AAA-3). In the experimentation, a Pioneer P3-DX research robot is used to simulate a planetary rover. The sonar sensors on the P3-DX robot are used to simulate the sensors on a planetary rover (even though in reality, sonar sensors cannot operate in a vacuum). Experiments using the P3-DX robot focus on how our software system can be adapted with the loss of sonar sensor functionality. The autonomic manager system is responsible for the decision making on how to make use of remaining ‘enabled’ sonars sensors to compensate for those sonar sensors that are ‘disabled’. The key to this research is that the robot can still detect objects even with reduced sonar sensor capability.

Keywords: autonomic, self-adaption, self-healing, self-optimization

Procedia PDF Downloads 340
744 English Pronunciation Materials on TikTok

Authors: Sebastian Leal-Arenas

Abstract:

TikTok’s influence on contemporary society is undeniable. The impact of the mobile app transcends entertainment, as shown by the growing presence of specialized accounts dedicated to providing educational content, particularly as it pertains to language learning. However, the prevailing trend on the platform is vocabulary and grammar acquisition, neglecting a critical component: pronunciation. This study examines English pronunciation materials available on TikTok by taking a comprehensive approach that incorporates established assessment tools, such as the Learning Object Review Instrument and the Framework for Language Learning App Evaluation. Furthermore, novel evaluation categories are introduced to provide a more holistic assessment of these educational resources. 60 English pronunciation videos were part of the analysis. The findings reveal that these audio-visual materials present clear audio bolstered by high-quality video content and automatically generated closed captions. These three components enhance the comprehensibility of the input, making these concise videos valuable assets for language learners. Nevertheless, certain deficiencies are observed, such as the lack of emphasis on specific segments and their relationship with articulators. Improvements and refinements are discussed, as well as their potential utility within the language classroom. This study contributes to the ongoing investigation of multimedia materials used for language teaching and emphasizes the need to adapt pronunciation instruction methods to today’s technology.

Keywords: pronunciation, segments, teaching materials, technology

Procedia PDF Downloads 66
743 The Interventional, Prospective, Real-World Post-Marketing Clinical Follow-Up Trial of a Polycarbophil Vaginal Moisturising Gel in Women Affected by Vaginal Dryness in Late Menopausal Transition and Postmenopause: A Triple Investigation

Authors: A. Cagnacci, D. F. Barattini, E. Casolati, M. Mangrella, E. Piccolo, S. Rosu, L. C. Pătrașcu

Abstract:

This Triple study aimed to evaluate the efficacy of polycarbophil vaginal gel (PCV) in treating symptoms of vaginal atrophy (VA) in peri- and post-menopausal women. Women in peri- (n=29) and postmenopause (n=54) diagnosed with VA were progressively enrolled and treated once a day for 30 days. Thereafter, those wishing to continue (n=73) received the PCV treatment for an additional 180 days. The vaginal health index (VHI) and vaginal dryness, irritation, and pain at intercourse, along with treatment safety, were evaluated at baseline, 30 days of treatment, and after additional 180 days. At baseline, the VHI (p<0.056) and VAS of vaginal dryness (p=0.0001,) irritation (p=0.002), and pain at intercourse (p=0.0001) were worse in postmenopausal women than in perimenopausal women. VHI and VA symptoms improved in all women, and after 30 days of PCV administration, they were similar between peri-and postmenopausal women. After an additional 180 days of treatment, VHI further increased (p=0.0001), VAS of all symptoms (P=0.0001) and the Global Symptom Score (P=0.0001) further decreased. The treatment was safe. Treatment with PCV improves VA symptoms in both peri- and post-menopausal women. Prolongation of treatment up to 6 months increases the efficacy of treatment with no side effects.

Keywords: late menopausal transition, postmenopause, polycarbophil, sexuality, vaginal dryness

Procedia PDF Downloads 49
742 Autonomous Kuka Youbot Navigation Based on Machine Learning and Path Planning

Authors: Carlos Gordon, Patricio Encalada, Henry Lema, Diego Leon, Dennis Chicaiza

Abstract:

The following work presents a proposal of autonomous navigation of mobile robots implemented in an omnidirectional robot Kuka Youbot. We have been able to perform the integration of robotic operative system (ROS) and machine learning algorithms. ROS mainly provides two distributions; ROS hydro and ROS Kinect. ROS hydro allows managing the nodes of odometry, kinematics, and path planning with statistical and probabilistic, global and local algorithms based on Adaptive Monte Carlo Localization (AMCL) and Dijkstra. Meanwhile, ROS Kinect is responsible for the detection block of dynamic objects which can be in the points of the planned trajectory obstructing the path of Kuka Youbot. The detection is managed by artificial vision module under a trained neural network based on the single shot multibox detector system (SSD), where the main dynamic objects for detection are human beings and domestic animals among other objects. When the objects are detected, the system modifies the trajectory or wait for the decision of the dynamic obstacle. Finally, the obstacles are skipped from the planned trajectory, and the Kuka Youbot can reach its goal thanks to the machine learning algorithms.

Keywords: autonomous navigation, machine learning, path planning, robotic operative system, open source computer vision library

Procedia PDF Downloads 166
741 Comparison of Tourist Shopping Patterns in Korea, 2009-2015: A Case of China and Japan

Authors: Miju Choi, Ava Seo

Abstract:

Japan has been positioned as a major inbound market to Korea, accounting for about 31% of total inbound visitors until 2012. The percentage has sharply dropped each year since and remained in second place, reaching 13.33% in 2016. Meanwhile, China has been boosted as a major inbound market, reaching 46.79% in 2016. Chinese tourists mainly visit Korea with the major purpose of shopping. They consume Korean cosmetic/beauty products and clothes while Japanese tourists prefer to purchase healthy food such as ginseng and seaweed. This study aims to investigate and compare tourist shopping patterns across two major inbound markets, China and Japan. A quantitative approach using survey was applied from 2009 to 2016. Findings suggest Chinese visit Korea due to quality of product, value for money, and accessibility, and trust. Meanwhile, Japanese choose Korea as a shopping destination mainly due to convenience, affordability, and tourist attractions. Also, there were significant differences in shopping venues. For example, Japanese tourists prefer shopping at department stores while Chinese tourists prefer retail outlets and local markets. This study contributes to deeper understanding on two major inbound markets to Korea and suggests future marketing strategies.

Keywords: tourist shopping patterns, Korea, China, Japan, historical data

Procedia PDF Downloads 187
740 True Single SKU Script: Applying the Automated Test to Set Software Properties in a Global Software Development Environment

Authors: Antonio Brigido, Maria Meireles, Francisco Barros, Gaspar Mota, Fernanda Terra, Lidia Melo, Marcelo Reis, Camilo Souza

Abstract:

As the globalization of the software process advances, companies are increasingly committed to improving software development technologies across multiple locations. On the other hand, working with teams distributed in different locations also raises new challenges. In this sense, automated processes can help to improve the quality of process execution. Therefore, this work presents the development of a tool called TSS Script that automates the sample preparation process for carrier requirements validation tests. The objective of the work is to obtain significant gains in execution time and reducing errors in scenario preparation. To estimate the gains over time, the executions performed in an automated and manual way were timed. In addition, a questionnaire-based survey was developed to discover new requirements and improvements to include in this automated support. The results show an average gain of 46.67% of the total hours worked, referring to sample preparation. The use of the tool avoids human errors, and for this reason, it adds greater quality and speed to the process. Another relevant factor is the fact that the tester can perform other activities in parallel with sample preparation.

Keywords: Android, GSD, automated testing tool, mobile products

Procedia PDF Downloads 297
739 The Use of Eye Tracking in Evaluating the Success of Golfers in Putting

Authors: Klára Gajdošíková

Abstract:

The aim of this study was to examine the quiet eye method and its components using the mobile eye tracking device. Quiet eye training was proven to be beneficial for different sports, including golf. The main idea of this method is to prolong your fixations on a specific place in order to improve your performance. The shot examined in this study is called putt. Its importance is based on its role on a golf course because, many times, it is the last putt that decides whether you win or lose. Quiet eye training helps players be more focused under pressure, control their attention and overall improve their putting success. Six highly skilled golfers with a handicap ranging from - 4 to + 4, aged 23 to 26, participated in a pilot study with the usage of an eye-tracking device. The study took place in an indoor training area at the golf club Hostivař. Crosstabs showed significant differences between individuals' laterality and their gaze into AOI - areas of interest (middle part of the ball, top of the ball, bottom of the ball, back side of the ball). Statistically significant differences were also discovered between the mean fixation duration of participants with AOI on the middle part of the ball and all other AOIs. The results of this study helped us understand the examined phenomena and showed us the next aim in future quiet eye research. Future research should focus on examining a quiet eye on the golf course. Applying a quiet eye and therefore changing the way we concentrate might be beneficial for coaches and players themselves.

Keywords: eye tracking, golf, laterality, quiet eye

Procedia PDF Downloads 98
738 Scientific Analysis and Significance of the Digital Media Market, Global Market Share, Media Vendor, Multimedia Systems Design, and Computer Graphics Amidst Fluctuating Global and Local Scale Economy

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study focused on determining the impact of multimedia systems and computer graphic design on global and local scale economies. Firstly, the study identified the major players and the world’s top five digital media distribution in the digital media market. It then examined if the digital media vendor and market shares differ or remain the same. Also, the research studied whether the global and local desktop, mobile, and tablet markets differ. Again, the study assessed the link between the top five digital media and global market shares. Finally, the paper observed the extent of growth rate, economic gains, major setbacks, and opportunities within the digital media industry amidst global and local scale economic flux. Multiple regression analysis methods were used to analyse the significant influence of the top five Global Digital Media on the total market share. Furthermore, to analyse the global digital media vendor market share data, and so on, the Analysis of Variance (ANOVA) was employed. The findings were intriguing and significant.

Keywords: multimedia, systems design, computer graphics, digital media market, media vendor, global market share, user interface, social media, market size

Procedia PDF Downloads 10
737 Art Market in Oran: Emergence and Contraintes

Authors: Hirreche Baghdad Mohamed

Abstract:

Our research is linked to cultural policies because the initiation to taste and beauty is a matter for all cultural and educational institutions. It's done by a downstream process (programs, actions, lessons, etc.) that begins at a young age in order to inscribe aesthetic values in memories, imaginations, and practices. Preparing future art lovers probably takes a lot of time. Upstream, continuity is ensured by the "cultural industries" which make cultural products available to actors in the "art market" through professional training, production, dissemination, and sales processes. It turns out that the cultural industries borrow from the "classical" industries the same processes and logic: product, production, marketing, diffusion, profit and profits, supply and demand, the market, the creation of wealth, the entrepreneurship. Today, culture has become a product almost like the others. In the cultural industries system, we protect the rights of authors (owners) and the rights of intermediaries (entrepreneurs of culture), and we provide consumers with an accessible product that meets their needs and expectations. We aim to present an inventory and to reveal, through the speeches of the actors themselves, the processes and modes of operation and deployment of the plastic arts market by showing how it is perceived, imagined, and lived in the city of 'Oran from the 2000s to the present day. However, it is possible to clarify this field of research by looking at previous periods; and even to make comparisons with other regions in Algeria in order to give meaning to practices in various contexts.

Keywords: Oran, Algeria, fine art, art market

Procedia PDF Downloads 114
736 Cultural Dynamics in Online Consumer Behavior: Exploring Cross-Country Variances in Review Influence

Authors: Eunjung Lee

Abstract:

This research investigates the intricate connection between cultural differences and online consumer behaviors by integrating Hofstede's Cultural Dimensions theory with analysis methodologies such as text mining, data mining, and topic analysis. Our aim is to provide a comprehensive understanding of how national cultural differences influence individuals' behaviors when engaging with online reviews. To ensure the relevance of our investigation, we systematically analyze and interpret the cultural nuances influencing online consumer behaviors, especially in the context of online reviews. By anchoring our research in Hofstede's Cultural Dimensions theory, we seek to offer valuable insights for marketers to tailor their strategies based on the cultural preferences of diverse global consumer bases. In our methodology, we employ advanced text mining techniques to extract insights from a diverse range of online reviews gathered globally for a specific product or service like Netflix. This approach allows us to reveal hidden cultural cues in the language used by consumers from various backgrounds. Complementing text mining, data mining techniques are applied to extract meaningful patterns from online review datasets collected from different countries, aiming to unveil underlying structures and gain a deeper understanding of the impact of cultural differences on online consumer behaviors. The study also integrates topic analysis to identify recurring subjects, sentiments, and opinions within online reviews. Marketers can leverage these insights to inform the development of culturally sensitive strategies, enhance target audience segmentation, and refine messaging approaches aligned with cultural preferences. Anchored in Hofstede's Cultural Dimensions theory, our research employs sophisticated methodologies to delve into the intricate relationship between cultural differences and online consumer behaviors. Applied to specific cultural dimensions, such as individualism vs. collectivism, masculinity vs. femininity, uncertainty avoidance, and long-term vs. short-term orientation, the study uncovers nuanced insights. For example, in exploring individualism vs. collectivism, we examine how reviewers from individualistic cultures prioritize personal experiences while those from collectivistic cultures emphasize communal opinions. Similarly, within masculinity vs. femininity, we investigate whether distinct topics align with cultural notions, such as robust features in masculine cultures and user-friendliness in feminine cultures. Examining information-seeking behaviors under uncertainty avoidance reveals how cultures differ in seeking detailed information or providing succinct reviews based on their comfort with ambiguity. Additionally, in assessing long-term vs. short-term orientation, the research explores how cultural focus on enduring benefits or immediate gratification influences reviews. These concrete examples contribute to the theoretical enhancement of Hofstede's Cultural Dimensions theory, providing a detailed understanding of cultural impacts on online consumer behaviors. As online reviews become increasingly crucial in decision-making, this research not only contributes to the academic understanding of cultural influences but also proposes practical recommendations for enhancing online review systems. Marketers can leverage these findings to design targeted and culturally relevant strategies, ultimately enhancing their global marketing effectiveness and optimizing online review systems for maximum impact.

Keywords: comparative analysis, cultural dimensions, marketing intelligence, national culture, online consumer behavior, text mining

Procedia PDF Downloads 34
735 Small and Medium Enterprises Owner-Managers/Entrepreneurs and Their Risk Perception in Songkhla Province, Thailand

Authors: Patraporn Kaewkhanitarak, Weerawan Marangkun

Abstract:

The objective of this study was to explore the establishment and to investigate the relationship between the gender (male or female) of SME owner-managers/ entrepreneurs and their risk perception in business activity. The study examines the data by interviewing 76 SME owner-managers/entrepreneurs’ responses (37 males, 39 females) in manufacturing, finance, human resources and marketing sector in the economic regions of Songkhla province, Thailand. This study found that four tools which were operation, cash flow, staff, and new market were perceived by the SME owner-managers/entrepreneurs at high level. However, male and female SME owner-managers/entrepreneurs perceived some factors such as the age of SME owner-managers/entrepreneurs, the duration of firm operation, type of firm, and type of business without significant differences. In contrast, the gender affected the risk perception about increasing cost, fierce competition, leapfrog development of firm, substandard staff, namely that male and female perceived these factors with significant differences. According to the research, SME owner-managers/entrepreneurs should develop their risk management competency to deal with the risk efficiently. Secondly, SME firms should gather into groups. Furthermore, it was shown that the five key tools used to manage these risky situations were the use of managerial competencies and clustering.

Keywords: risk perception, owner-managers/entrepreneurs, SME, Songkhla, Thailand

Procedia PDF Downloads 423
734 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 429
733 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 248
732 Autonomous Taxiing Robot for Grid Resilience Enhancement in Green Airport

Authors: Adedayo Ajayi, Patrick Luk, Liyun Lao

Abstract:

This paper studies the supportive needs for the electrical infrastructure of the green airport. In particular, the core objective revolves around the choice of electric grid configuration required to meet the expected electrified loads, i.e., the taxiing and charging loads of hybrid /pure electric aircraft in the airport. Further, reliability and resilience are critical aspects of a newly proposed grid; the concept of mobile energy storage as energy as a service (EAAS) for grid support in the proposed green airport is investigated using an autonomous electric taxiing robot (A-ETR) at a case study (Cranfield Airport). The performance of the model is verified and validated through DigSILENT power factory simulation software to compare the networks in terms of power quality, short circuit fault levels, system voltage profile, and power losses. Contingency and reliability index analysis are further carried out to show the potential of EAAS on the grid. The results demonstrate that the low voltage a.c network ( LVAC) architecture gives better performance with adequate compensation than the low voltage d.c (LVDC) microgrid architecture for future green airport electrification integration. And A-ETR can deliver energy as a service (EaaS) to improve the airport's electrical power system resilience and energy supply.

Keywords: reliability, voltage profile, flightpath 2050, green airport

Procedia PDF Downloads 69
731 An Empirical Analysis of the Freight Forwarders’ Buying Behaviour: Implications for the Ocean Container Carriers

Authors: Peter Dzakah Fanam, Hong O. Nguyen, Stephen Cahoon

Abstract:

The objective of this study is to explore the buying behavior of the freight forwarders and to evaluate how their buying decision affects the ocean container carriers’ market share. This study analysed the buying decisions of the freight forwarders and validated the process of stages that the freight forwarders’ pass through before choosing an ocean container carrier. Factor analysis was applied to data collected from 105 freight forwarding companies to unveil the influential factors the freight forwarders’ consider important when selecting an ocean container carrier. This study did not only analysed the buying behaviour of the freight forwarders but also unveiled the influential factors affecting the competitiveness of the ocean container carriers in their market share maximisation. Furthermore, the study have made a methodological contribution that helps in better understanding of the critical factors influencing the selection of the ocean container carriers from the freight forwarders’ perspective. The implications of the freight forwarders’ buying behaviour is important to the ocean container carriers because it have severe effect on the market share of the ocean container carriers and the percentage of customers they control within the liner shipping sector. The findings of this study will help the ocean container carriers to formulate relevant marketing strategies in attracting the freight forwarders in purchasing the liner shipping service.

Keywords: ocean carrier, freight forwarder, buying behaviour, influential factors

Procedia PDF Downloads 241
730 Perceived Benefits of Technology Enhanced Learning by Learners in Uganda: Three Band Benefits

Authors: Kafuko M. Maria, Namisango Fatuma, Byomire Gorretti

Abstract:

Mobile learning (m-learning) is steadily growing and has undoubtedly derived benefits to learners and tutors in different learning environments. This paper investigates the variation in benefits derived from enhanced classroom learning through use of m-learning platforms in the context of a developing country owing to the fact that it is still in its initial stages. The study focused on how basic technology-enhanced pedagogic innovation like cell phone-based learning is enhancing classroom learning from the learners’ perspective. The paper explicitly indicates the opportunities presented by enhanced learning to a conventional learning environment like a physical classroom. The findings were obtained through a survey of two universities in Uganda in which data was quantitatively collected, analyzed and presented in a three banded diagram depicting the variation in the obtainable benefits. Learners indicated that a smartphone is the most commonly used device. Learners also indicate that straight lectures, student to student plus student to lecturer communication, accessing learning material and assignments are core activities. In a TEL environment support by smartphones, learners indicated that they conveniently achieve the prior activities plus discussions and group work. Learners seemed not attracted to the possibility of using TEL environment to take lectures, as well as make class presentations. The less attractiveness of these two factors may be due to the teacher centered approach commonly applied in the country’s education system.

Keywords: technology enhanced learning, m-learning, classroom learning, perceived benefits

Procedia PDF Downloads 222
729 Traffic Forecasting for Open Radio Access Networks Virtualized Network Functions in 5G Networks

Authors: Khalid Ali, Manar Jammal

Abstract:

In order to meet the stringent latency and reliability requirements of the upcoming 5G networks, Open Radio Access Networks (O-RAN) have been proposed. The virtualization of O-RAN has allowed it to be treated as a Network Function Virtualization (NFV) architecture, while its components are considered Virtualized Network Functions (VNFs). Hence, intelligent Machine Learning (ML) based solutions can be utilized to apply different resource management and allocation techniques on O-RAN. However, intelligently allocating resources for O-RAN VNFs can prove challenging due to the dynamicity of traffic in mobile networks. Network providers need to dynamically scale the allocated resources in response to the incoming traffic. Elastically allocating resources can provide a higher level of flexibility in the network in addition to reducing the OPerational EXpenditure (OPEX) and increasing the resources utilization. Most of the existing elastic solutions are reactive in nature, despite the fact that proactive approaches are more agile since they scale instances ahead of time by predicting the incoming traffic. In this work, we propose and evaluate traffic forecasting models based on the ML algorithm. The algorithms aim at predicting future O-RAN traffic by using previous traffic data. Detailed analysis of the traffic data was carried out to validate the quality and applicability of the traffic dataset. Hence, two ML models were proposed and evaluated based on their prediction capabilities.

Keywords: O-RAN, traffic forecasting, NFV, ARIMA, LSTM, elasticity

Procedia PDF Downloads 203
728 Prevalence and the Results of the Czech Nationwide Survey and Personality Traits of Adolescence Playing Computer Games

Authors: Jaroslava Sucha, Martin Dolejs, Helena Pipova, Panajotis Cakirpaloglu

Abstract:

The paper introduces the research project which is focused on evaluating the level of pathological relation towards computer or video games playing (including any games played by using a screen such as a mobile or a tablet). The study involves representative sample of the Czech adolescents between ages 11 and 19. This poster presents the psychometric indicators of the new psychologic assessment method (mean, standard deviation, reliability, validity) which will be able to detect an acceptable level of games’ playing and at the same time will detect and describe the level of gaming which might be potentially risky. The prevalence of risky computer game playing at Czech adolescents in age 11 to 19 will be mentioned. The research study also aims to describe the personality profile of the problematic players with respect to the digital games. The research area will encompass risky behaviour, aggression, the level of self-esteem, impulsivity, anxiety and depression. The contribution will introduce a new test method for the assessment of pathological playing computer games. The research will give the first screening information of playing computer games in the Czech Republic by adolescents between 11-19 years. The results clarify what relationship exists between playing computer games and selected personality characteristics (it will describe personality of the gamer, who is in the category of ‘pathological playing computer games’).

Keywords: adolescence, computer games, personality traits, risk behaviour

Procedia PDF Downloads 224
727 Determining the Functionality of Urban Wildlife with Large Megafauna: A Case Study from Chobe District, Northern Botswana

Authors: Tempe S. F. Adams, Michael J. Chase, Tracey L. Rogers, Keith E. A. Leggett

Abstract:

Transfrontier wildlife corridors can be successful conservation tools, connecting protected areas and reducing the impact of habitat fragmentation on mobile species. Urban wildlife corridors have been proposed as a potential mitigation tool to facilitate the passage of elephants through towns without causing conflict with urban communities. However, because such corridors are typically narrow and close to human development, wildlife (particularly large mammals) may be less likely to use them. We used remote-sensor camera traps and global positioning system collars to identify the movement patterns of African elephants Loxondonta africana through narrow, urban corridors in Botswana. The corridors were in three types of human-dominated land-use designations with varying levels of human activity: agricultural, industrial and open space recreational land. We found that elephants used the corridors within all three land-use designations and we identified, using a model selection approach, that season, time of day and rainfall were important factors in determining the presence of elephants in the corridors. Elephants moved more slowly through the narrow corridors compared with their movement patterns through broader, wide-ranging corridors. Our results indicate that urban wildlife corridors are useful for facilitating elephants to pass through urban areas.

Keywords: camera traps, conservation, human-elephant coexistence, land management, urban wildlife corridors

Procedia PDF Downloads 289
726 An Algorithm Based on Control Indexes to Increase the Quality of Service on Cellular Networks

Authors: Rahman Mofidi, Sina Rahimi, Farnoosh Darban

Abstract:

Communication plays a key role in today’s world, and to support it, the quality of service has the highest priority. It is very important to differentiate between traffic based on priority level. Some traffic classes should be a higher priority than other classes. It is also necessary to give high priority to customers who have more payment for better service, however, without influence on other customers. So to realize that, we will require effective quality of service methods. To ensure the optimal performance of the network in accordance with the quality of service is an important goal for all operators in the mobile network. In this work, we propose an algorithm based on control parameters which it’s based on user feedback that aims at minimizing the access to system transmit power and thus improving the network key performance indicators and increasing the quality of service. This feedback that is known as channel quality indicator (CQI) indicates the received signal level of the user. We aim at proposing an algorithm in control parameter criterion to study improving the quality of service and throughput in a cellular network at the simulated environment. In this work we tried to parameter values have close to their actual level. Simulation results show that the proposed algorithm improves the system throughput and thus satisfies users' throughput and improves service to set up a successful call.

Keywords: quality of service, key performance indicators, control parameter, channel quality indicator

Procedia PDF Downloads 188
725 Yield Parameters of Hulled Wheat Species, Grown in Organic Farming

Authors: Petr Konvalina, Jan Moudry

Abstract:

As organic farmers are searching foregoing crops for horticultural crops, there is possible to choice neglected wheat species and also have a new market and sale opportunities. Concerning wheat, there are landraces so called hulled wheat species (einkorn, emmer wheat, spelt) comprising parts of collections of the world gene banks. The advantage of this wheat species are small demands on growing conditions and also droughtiness in conditions of changing climate. Our paper aims at presenting the results of the study and the assessment of spring wheat forms, four einkorn cultivars, eight emmer wheat cultivars, seven spelt wheat cultivars in particular, as compared to modern bread wheat variety. Small-plot trials were established at two different localities within the Czech Republic and Austria in 2009 and 2012. The results of the trials show that some varieties were inclined to lodging. On the other hand, they were resistant to common wheat diseases (mildew, brown rust). Hulls served as barriers and obstacles against the DON grain contamination. The yield rate was lower. The grains were characterized by a high proportion of protein in grain (up to 18.1 %). However, they may be difficult to use for common baking. Moreover, new food products demonstrating a different technological quality of the hulled wheat species have to be launched on the market. They will be suitable for regional marketing.

Keywords: organic farming, hulled wheat species, einkorn, emmer, spelt

Procedia PDF Downloads 503
724 Effects of Grape Seed Oil on Postharvest Life and Quality of Some Grape Cultivars

Authors: Zeki Kara, Kevser Yazar

Abstract:

Table grapes (Vitis vinifera L.) are an important crop worldwide. Postharvest problems like berry shattering, decay and stem dehydration are some of the important factors that limit the marketing of table grapes. Edible coatings are an alternative for increasing shelf-life of fruits, protecting fruits from humidity and oxygen effects, thus retarding their deterioration. This study aimed to compare different grape seed oil applications (GSO, 0.5 g L-1, 1 g L-1, 2 g L-1) and SO2 generating pads effects (SO2-1, SO2-2). Treated grapes with GSO and generating pads were packaged into polyethylene trays and stored at 0 ± 1°C and 85-95% moisture. Effects of the applications were investigated by some quality and sensory evaluations with intervals of 15 days. SO2 applications were determined the most effective treatments for minimizing weight loss and changes in TA, pH, color and appearance value. Grape seed oil applications were determined as a good alternative for grape preservation, improving weight losses and °Brix, TA, the color values and sensory analysis. Commercially, ‘Alphonse Lavallée’ clusters were stored for 75 days and ‘Antep Karası’ clusters for 60 days. The data obtained from GSO indicated that it had a similar quality result to SO2 for up to 40 days storage.

Keywords: postharvest, quality, sensory analyses, Vitis vinifera L.

Procedia PDF Downloads 160
723 Analysis on Yogyakarta Istimewa Citygates on Urban Area Arterial Roads

Authors: Nizar Caraka Trihanasia, Suparwoko

Abstract:

The purpose of this paper is to analyze the design model of city gates on arterial roads as Yogyakarta’s “Istimewa” (special) identity. City marketing has become a trend among cities in the past few years. It began to compete with each other in promoting their identity to the world. One of the easiest ways to recognize the identity is by knowing the image of the city which can be seen through architectural buildings or urban elements. The idea is to recognize how the image of the city can represent Yogyakarta’s identity, which is limited to the contribution of the city gates distinctiveness on Yogyakarta urban area. This study has concentrated on the aspect of city gates as built environment that provides a diversity, configuration and scale of development that promotes a sense of place and community. The visual analysis will be conducted to interpreted the existing Yogyakarta city gates (as built environment) focussing on some variables of 1) character and pattern, 2) circulation system establishment, and 3) open space utilisation. Literature review and site survey are also conducted to understand the relationship between the built environment and the sense of place in the community. This study suggests that visually the Yogyakarta city gate model has strong visual characters and pattern by using the concept of a sense of place of Yogyakarta community value.

Keywords: visual analysis, model, Yogyakarta “Istimewa”, citygates

Procedia PDF Downloads 243