Search results for: performing arts management
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10888

Search results for: performing arts management

9058 Environmental Corporate Social Responsibility in Industrial Cities: A Collaborative Governance Approach

Authors: Muhlisin, Moh. Sofyan Budiarto

Abstract:

Corporate social responsibility (CSR) initiatives based on charity and philanthropy have not alleviated many sustainable environmental issues, particularly in industrial towns. The collaborative governance strategy is seen to be an option for resolving difficulties of coordination and communication between businesses, the government, and the community so that the goals of urban environmental management can be met via collaborative efforts. The purpose of this research is to identify the different forms of environmental CSR implementation by corporate entities and to create a CSR collaborative governance model in environmental management. This qualitative investigation was carried out in 2020 in Cilegon City, one of Indonesia’s industrial cities. To investigate their support, a total of 20 informants from three stakeholder groups, namely the government, corporate entities, and the community, were questioned. According to the study’s findings, cleaner production, eco-office, energy and natural resource conservation, waste management, renewable energy, climate change adaptation, and environmental education are all examples of CSR application in the environmental sector. The environmental potential of CSR implementation is to create collaborative governance. The role of business entities in providing the beginning circumstances is critical, while the government offers facilitative leadership and the CSR forum launches institutional design. These three factors are crucial to the efficiency of collaborative governance in industrial cities' environmental management.

Keywords: collaborative governance, CSR forum, environmental CSR, industrial city

Procedia PDF Downloads 84
9057 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 96
9056 Using Balanced Scorecard Performance Metrics in Gauging the Delivery of Stakeholder Value in Higher Education: the Assimilation of Industry Certifications within a Business Program Curriculum

Authors: Thomas J. Bell III

Abstract:

This paper explores the value of assimilating certification training within a traditional course curriculum. This innovative approach is believed to increase stakeholder value within the Computer Information System program at Texas Wesleyan University. Stakeholder value is obtained from increased job marketability and critical thinking skills that create employment-ready graduates. This paper views value as first developing the capability to earn an industry-recognized certification, which provides the student with more job placement compatibility while allowing the use of critical thinking skills in a liberal arts business program. Graduates with industry-based credentials are often given preference in the hiring process, particularly in the information technology sector. And without a pioneering curriculum that better prepares students for an ever-changing employment market, its educational value is dubiously questioned. Since certifications are trending in the hiring process, academic programs should explore the viability of incorporating certification training into teaching pedagogy and courses curriculum. This study will examine the use of the balanced scorecard across four performance dimensions (financial, customer, internal process, and innovation) to measure the stakeholder value of certification training within a traditional course curriculum. The balanced scorecard as a strategic management tool may provide insight for leveraging resource prioritization and decisions needed to achieve various curriculum objectives and long-term value while meeting multiple stakeholders' needs, such as students, universities, faculty, and administrators. The research methodology will consist of quantitative analysis that includes (1) surveying over one-hundred students in the CIS program to learn what factor(s) contributed to their certification exam success or failure, (2) interviewing representatives from the Texas Workforce Commission to identify the employment needs and trends in the North Texas (Dallas/Fort Worth) area, (3) reviewing notable Workforce Innovation and Opportunity Act publications on training trends across several local business sectors, and (4) analyzing control variables to identify specific correlations between industry alignment and job placement to determine if a correlation exists. These findings may provide helpful insight into impactful pedagogical teaching techniques and curriculum that positively contribute to certification credentialing success. And should these industry-certified students land industry-related jobs that correlate with their certification credential value, arguably, stakeholder value has been realized.

Keywords: certification exam teaching pedagogy, exam preparation, testing techniques, exam study tips, passing certification exams, embedding industry certification and curriculum alignment, balanced scorecard performance evaluation

Procedia PDF Downloads 107
9055 Contextual Enablers and Behaviour Outputs for Action of Knowledge Workers

Authors: Juan-Gabriel Cegarra-Navarro, Alexeis Garcia-Perez, Denise Bedford

Abstract:

This paper provides guidelines for what constitutes a knowledge worker. Many graduates from non-managerial domains adopt, at some point in their professional careers, management roles at different levels, ranging from team leaders through to executive leadership. This is particularly relevant for professionals from an engineering background. Moving from a technical to an executive-level requires an understanding of those behaviour management techniques that can motivate and support individuals and their performance. Further, the transition to management also demands a shift of contextual enablers from tangible to intangible resources, which allows individuals to create new capacities, competencies, and capabilities. In this dynamic process, the knowledge worker becomes that key individual who can help members of the management board to transform information into relevant knowledge. However, despite its relevance in shaping the future of the organization in its transition to the knowledge economy, the role of a knowledge worker has not yet been studied to an appropriate level in the current literature. In this study, the authors review both the contextual enablers and behaviour outputs related to the role of the knowledge worker and relate these to their ability to deal with everyday management issues such as knowledge heterogeneity, varying motivations, information overload, or outdated information. This study highlights that the aggregate of capacities, competences and capabilities (CCCs) can be defined as knowledge structures, the study proposes several contextual enablers and behaviour outputs that knowledge workers can use to work cooperatively, acquire, distribute and knowledge. Therefore, this study contributes to a better comprehension of how CCCs can be managed at different levels through their contextual enablers and behaviour outputs.

Keywords: knowledge workers, capabilities, capacities, competences, knowledge structures

Procedia PDF Downloads 153
9054 A Power Management System for Indoor Micro-Drones in GPS-Denied Environments

Authors: Yendo Hu, Xu-Yu Wu, Dylan Oh

Abstract:

GPS-Denied drones open the possibility of indoor applications, including dynamic arial surveillance, inspection, safety enforcement, and discovery. Indoor swarming further enhances these applications in accuracy, robustness, operational time, and coverage. For micro-drones, power management becomes a critical issue, given the battery payload restriction. This paper proposes an application enabling battery replacement solution that extends the micro-drone active phase without human intervention. First, a framework to quantify the effectiveness of a power management solution for a drone fleet is proposed. The operation-to-non-operation ratio, ONR, gives one a quantitative benchmark to measure the effectiveness of a power management solution. Second, a survey was carried out to evaluate the ONR performance for the various solutions. Third, through analysis, this paper proposes a solution tailored to the indoor micro-drone, suitable for swarming applications. The proposed automated battery replacement solution, along with a modified micro-drone architecture, was implemented along with the associated micro-drone. Fourth, the system was tested and compared with the various solutions within the industry. Results show that the proposed solution achieves an ONR value of 31, which is a 1-fold improvement of the best alternative option. The cost analysis shows a manufacturing cost of $25, which makes this approach viable for cost-sensitive markets (e.g., consumer). Further challenges remain in the area of drone design for automated battery replacement, landing pad/drone production, high-precision landing control, and ONR improvements.

Keywords: micro-drone, battery swap, battery replacement, battery recharge, landing pad, power management

Procedia PDF Downloads 116
9053 Development of Distance Training Packages for Teacher on Education Management for Learners with Special Needs

Authors: Jareeluk Ratanaphan

Abstract:

The purposed of this research were; 1. To survey the teacher’s needs on knowledge about special education management for special needs student 2. Development of distance training packages for teacher on special education management for special needs student 3. to study the effects of using the packages on trainee’s achievement 4. to study the effects of using the packages on trainee’s opinion on the distance training packages. The design of the experiment was research and development. The research sample for survey were 86 teachers, and 22 teachers for study the effects of using the packages on achievement and opinion. The research instrument comprised: 1) training packages on special education management for special needs student 2) achievement test 3) questionnaire. Mean, percentage, standard deviation, t-test and content analysis were used for data analysis. The findings of the research were as follows: 1. The teacher’s needs on knowledge about teaching for a learner with learning disability, mental retardation, autism, physical and health impairment and research in special education. 2. The package composed of special education management for special needs student document and manual of distance training packages. The document consisted by the name of packages, the explanation for the educator, content’s structure, concept, objectives, content and activities. Manual of distance training packages consisted by the explanation about a document, objectives, explanation about using the package, training schedule, and evaluation. The efficiency of packages was established at 79.50/81.35. 3. The results of using the packages were the posttest average scores of trainee’s achievement were higher than the pretest. 4. The trainee’s opinion on the package was at the highest level.

Keywords: distance training package, teacher, learner with special needs

Procedia PDF Downloads 485
9052 Setting up Model Hospitals in Health Care Waste Management in Madagascar

Authors: Sandrine Andriantsimietry, Hantanirina Ravaosendrasoa

Abstract:

Madagascar, in 2018, set up the first best available technology, autoclave, to treat the health care waste in public hospitals according the best environmental practices in health care waste management. Incineration of health care waste, frequently through open burning is the most common practice of treatment and elimination of health care waste across the country. Autoclave is a best available technology for non-incineration of health care waste that permits recycling of treated waste and prevents harm in environment through the reduction of unintended persistent organic pollutants from the health sector. A Global Environment Fund project supported the introduction of the non-incineration treatment of health care waste to help countries in Africa to move towards Stockholm Convention objectives in the health sector. Two teaching hospitals in Antananarivo and one district hospital in Manjakandriana were equipped respectively with 1300L, 250L and 80L autoclaves. The capacity of these model hospitals was strengthened by the donation of equipment and materials and the training of the health workers in best environmental practices in health care waste management. Proper segregation of waste in the wards to collect the infectious waste that was treated in the autoclave was the main step guaranteeing a cost-efficient non-incineration of health care waste. Therefore, the start-up of the switch of incineration into non-incineration treatment was carried out progressively in each ward with close supervision of hygienist. Emissions avoided of unintended persistent organic pollutants during these four months of autoclaves use is 9.4 g Toxic Equivalent per year. Public hospitals in low income countries can be model in best environmental practices in health care waste management but efforts must be made internally for sustainment.

Keywords: autoclave, health care waste management, model hospitals, non-incineration

Procedia PDF Downloads 163
9051 Efficient Deep Neural Networks for Real-Time Strawberry Freshness Monitoring: A Transfer Learning Approach

Authors: Mst. Tuhin Akter, Sharun Akter Khushbu, S. M. Shaqib

Abstract:

A real-time system architecture is highly effective for monitoring and detecting various damaged products or fruits that may deteriorate over time or become infected with diseases. Deep learning models have proven to be effective in building such architectures. However, building a deep learning model from scratch is a time-consuming and costly process. A more efficient solution is to utilize deep neural network (DNN) based transfer learning models in the real-time monitoring architecture. This study focuses on using a novel strawberry dataset to develop effective transfer learning models for the proposed real-time monitoring system architecture, specifically for evaluating and detecting strawberry freshness. Several state-of-the-art transfer learning models were employed, and the best performing model was found to be Xception, demonstrating higher performance across evaluation metrics such as accuracy, recall, precision, and F1-score.

Keywords: strawberry freshness evaluation, deep neural network, transfer learning, image augmentation

Procedia PDF Downloads 89
9050 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 480
9049 Defining Human Resources “Bundles” and Its’ Correlation with Companies’ Financial Performances

Authors: Ivana Tadic, Snjezana Pivac

Abstract:

Although human resources are recognized as the crucial companies’ resources and their positive influence on companies’ performances has been confirmed through different researches, scientists are still debating it. In order to contribute this debate, this paper firstly discusses the most important human resource management elements and practices and its influence on companies’ success. Afterwards it defines human resource “bundles” – interrelated and internally consistent human resource practices, complementary to each other, or the most important human resource practices and elements regarding Croatian companies and its human resource management activities. Finally, the paper provides empirical results; more precisely it reveals the relation of the level of development of human resource management function (“bundles”) and companies’ financial performances (using profitability ratios, liquidity ratios, solvency ratios and a group of additional ratios related to employees’ indicators).

Keywords: companies’ performances, human resource bundles, multivariate statistical analysis, marketing

Procedia PDF Downloads 421
9048 Exploring the Barriers Regarding Safe Discussions about Menopausal Symptom Management, As Perceived or Experienced by Pre-menopausal and Menopausal Women

Authors: Karish Thavabalan, Aman Sutaria, Alistair Ovenell, Annabelle Parkhouse, Numan Baydemir, Theodore Lally

Abstract:

Background: Open discussions surrounding menopause are often associated with stigma, with many women feeling uncomfortable engaging in them with friends, colleagues, and healthcare professionals. Though the barriers regarding safe discussions of symptom management experienced by menopausal women are well documented, existing research offers little insight into whether these were shared by pre-menopausal women. This study aimed to explore the barriers regarding safe discussions about menopausal symptom management as perceived or experienced by pre-menopausal and menopausal women. Methods: This qualitative study was conducted over a 2-month period (March 2022 - April 2022) under the auspices of Imperial College Business School, London, UK. Snowball sampling was used to recruit both menopausal (age 45-70) and pre-menopausal participants (age <45) and sampling continued until data saturation was achieved. Sixteen semi-structured online interviews were conducted, and transcripts were thematically analyzed following Braun and Clarke’s six-step methodology. Results: A total of 7 higher themes regarding safe discussion of menopausal symptom management were identified by both pre-menopausal and menopausal women, including: “ineffective coping mechanisms,” “perceived onus to self-endure,” “lack of workplace support,” “poor knowledge of management approaches,” “poor healthcare infrastructure,” “poor support from friends and family,” “lack of knowledge and interest from a young age.” Conclusion: Identifying the barriers regarding safe discussion helped to highlight which areas require the most significant intervention. Alongside tackling the barriers, menopausal women face, ultimately, there is a pertinent need to address the lack of insight into menopause from a younger age and to encourage earlier discussions so as to not propagate the cycle of stigma.

Keywords: menopause, safe discussion, symptom management, stigma

Procedia PDF Downloads 58
9047 Analysis of Cultural Influences on Quality Management by Comparison of Japanese and German Enterprises

Authors: Hermann Luecken, Young Won Park, Judith M. Puetter

Abstract:

Quality is known to be the accordance of product characteristics and customer requirements. Both the customer requirements and the assessment of the characteristics of the product with regard to the fulfillment of customer requirements are subject to cultural influences. Of course, the processes itself which lead to product manufacturing is also subject to cultural influences. In the first point, the cultural background of the customer influences the quality, in the second point, it is the cultural background of the employees and the company that influences the process itself. In times of globalization products are manufactured at different locations around the world, but typically the quality management system of the country in which the mother company is based is used. This leads to significantly different results in terms of productivity, product quality and process efficiency at the different locations, although the same quality management system is in use. The aim of an efficient and effective quality management system is therefore not doing the same at all locations, but to have the same result at all locations. In the past, standardization was used to achieve the same results. Recent investigations show that this is not the best way to achieve the same characteristics of product quality and production performance. In the present work, it is shown that the consideration of cultural aspects in the design of processes, production systems, and quality management systems results in a significantly higher efficiency and a quality improvement. Both Japanese and German companies were investigated with comparative interviews. The background of this selection is that in most cases the cultural difference regarding industrial processes between Germany and Japan is high. At the same time, however, the customer expectations regarding the product quality are very similar. Interviews were conducted with experts from German and Japanese companies; in particular, companies were selected that operate production facilities both in Germany and in Japan. The comparison shows that the cultural influence on the respective production performance is significant. Companies that adapt the design of their quality management and production systems to the country where the production site is located have a significantly higher productivity and a significantly higher quality of the product than companies that work with a centralized system.

Keywords: comparison of German and Japanese production systems, cultural influence on quality management, expert interviews, process efficiency

Procedia PDF Downloads 160
9046 Data Analytics in Energy Management

Authors: Sanjivrao Katakam, Thanumoorthi I., Antony Gerald, Ratan Kulkarni, Shaju Nair

Abstract:

With increasing energy costs and its impact on the business, sustainability today has evolved from a social expectation to an economic imperative. Therefore, finding methods to reduce cost has become a critical directive for Industry leaders. Effective energy management is the only way to cut costs. However, Energy Management has been a challenge because it requires a change in old habits and legacy systems followed for decades. Today exorbitant levels of energy and operational data is being captured and stored by Industries, but they are unable to convert these structured and unstructured data sets into meaningful business intelligence. It must be noted that for quick decisions, organizations must learn to cope with large volumes of operational data in different formats. Energy analytics not only helps in extracting inferences from these data sets, but also is instrumental in transformation from old approaches of energy management to new. This in turn assists in effective decision making for implementation. It is the requirement of organizations to have an established corporate strategy for reducing operational costs through visibility and optimization of energy usage. Energy analytics play a key role in optimization of operations. The paper describes how today energy data analytics is extensively used in different scenarios like reducing operational costs, predicting energy demands, optimizing network efficiency, asset maintenance, improving customer insights and device data insights. The paper also highlights how analytics helps transform insights obtained from energy data into sustainable solutions. The paper utilizes data from an array of segments such as retail, transportation, and water sectors.

Keywords: energy analytics, energy management, operational data, business intelligence, optimization

Procedia PDF Downloads 363
9045 Role of Digital Economy in the Emerging Countries Like Nigeria

Authors: Aminu Fagge Muhammad

Abstract:

The digital economy is fast becoming the most innovative and widest reaching economy in the world, especially in developing countries. The paper aimed at examining role of digital economy in the emerging countries like Nigeria. The methodology used in the study is Business Model Perspective: lying between the process and structural perspectives, bring in the idea of the new business models that are being enabled e.g. e-business or e-commerce. The paper concluded that, the policy objectives and measures, and processes and structures necessary to enhance digital economy growth and its contribution to socio-economic development. The finding reveals that, digital infrastructure is in part incomplete, costly and poorly-performing in emerging economies like Nigeria. The wider digital ecosystem suffers a shortfall in human capabilities, weak financing, and poor governance. It is also found that, Growth in the digital economy is exacerbating digital exclusion, inequality, adverse incorporation and other digital harms. It is recommended that, government in partnership with private sector should build strong local infrastructure to enable broadband availability and accessibility and to create an enabling environment for strong competition in the telecom and technology ecosystem.

Keywords: Digital Economy, Emerging Countries, Business Model , Nigeria

Procedia PDF Downloads 126
9044 Overview of Time, Resource and Cost Planning Techniques in Construction Management Research

Authors: R. Gupta, P. Jain, S. Das

Abstract:

One way to approach construction scheduling optimization problem is to focus on the individual aspects of planning, which can be broadly classified as time scheduling, crew and resource management, and cost control. During the last four decades, construction planning has seen a lot of research, but to date, no paper had attempted to summarize the literature available under important heads. This paper addresses each of aspects separately, and presents the findings of an in-depth literature of the various planning techniques. For techniques dealing with time scheduling, the authors have adopted a rough chronological documentation. For crew and resource management, classification has been done on the basis of the different steps involved in the resource planning process. For cost control, techniques dealing with both estimation of costs and the subsequent optimization of costs have been dealt with separately.

Keywords: construction planning techniques, time scheduling, resource planning, cost control

Procedia PDF Downloads 485
9043 The Urban Stray Animal Identification Management System Based on YOLOv5

Authors: Chen Xi, LIU Xuebin, Kuan Sinman, LI Haofeng, Huang Hongming, Zeng Chengyu, Lao Xuerui

Abstract:

Stray animals are on the rise in mainland China's cities. There are legal reasons for this, namely the lack of protection for domestic pets in mainland China, where only wildlife protection laws exist. At a social level, the ease with which families adopt pets and the lack of a social view of animal nature have led to the frequent abandonment and loss of stray animals. If left unmanaged, conflicts between humans and stray animals can also increase. This project provides an inexpensive and widely applicable management tool for urban management by collecting videos and pictures of stray animals captured by surveillance or transmitted by humans and using artificial intelligence technology (mainly using Yolov5 recognition technology) and recording and managing them in a database.

Keywords: urban planning, urban governance, artificial intelligence, convolutional neural network, machine vision

Procedia PDF Downloads 96
9042 Poor Medical Waste Management (MWM) Practices and Its Risks to Human Health and the Environment

Authors: Babanyara Y. Y., Ibrahim D. B., Garba T., Bogoro A. G., Abubakar, M. Y.

Abstract:

Medical care is vital for our life, health, and well-being. However, the waste generated from medical activities can be hazardous, toxic, and even lethal because of their high potential for diseases transmission. The hazardous and toxic parts of waste from healthcare establishments comprising infectious, medical, and radioactive material as well as sharps constitute a grave risks to mankind and the environment, if these are not properly treated/disposed or are allowed to be mixed with other municipal waste. In Nigeria, practical information on this aspect is inadequate and research on the public health implications of poor management of medical wastes is few and limited in scope. Findings drawn from Literature particularly in the third world countries highlights financial problems, lack of awareness of risks involved in MWM, lack of appropriate legislation and lack of specialized MWM staff. The paper recommends how MWM practices can be improved in medical facilities.

Keywords: environmental pollution, infectious, management, medical waste, public health

Procedia PDF Downloads 308
9041 KSVD-SVM Approach for Spontaneous Facial Expression Recognition

Authors: Dawood Al Chanti, Alice Caplier

Abstract:

Sparse representations of signals have received a great deal of attention in recent years. In this paper, the interest of using sparse representation as a mean for performing sparse discriminative analysis between spontaneous facial expressions is demonstrated. An automatic facial expressions recognition system is presented. It uses a KSVD-SVM approach which is made of three main stages: A pre-processing and feature extraction stage, which solves the problem of shared subspace distribution based on the random projection theory, to obtain low dimensional discriminative and reconstructive features; A dictionary learning and sparse coding stage, which uses the KSVD model to learn discriminative under or over dictionaries for sparse coding; Finally a classification stage, which uses a SVM classifier for facial expressions recognition. Our main concern is to be able to recognize non-basic affective states and non-acted expressions. Extensive experiments on the JAFFE static acted facial expressions database but also on the DynEmo dynamic spontaneous facial expressions database exhibit very good recognition rates.

Keywords: dictionary learning, random projection, pose and spontaneous facial expression, sparse representation

Procedia PDF Downloads 304
9040 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 408
9039 Risk Management Strategy for Protecting Cultural Heritage: Case Study of the Institute of Egypt

Authors: Amany A. Ragheb, Ghada Ragheb, Abd ElRahman A.

Abstract:

Egypt has a countless heritage of mansions, castles, cities, towns, villages, industrial and manufacturing sites. This richness of heritage provides endless and matchless prospects for culture. Despite being famous worldwide, Egypt’s heritage still is in constant need of protection. Political conflicts and religious revolutions form a direct threat to buildings in various areas, historic, archaeological sites, and religious monuments. Egypt has witnessed two revolutions in less than 60 years; both had an impact on its architectural heritage. In this paper, the authors aim to review legal and policy framework to protect the cultural heritage and present the risk management strategy for cultural heritage in conflict. Through a review of selected international models of devastated architectural heritage in conflict zones and highlighting some of their changes, we can learn from the experiences of other countries to assist towards the development of a methodology to halt the plundering of architectural heritage. Finally, the paper makes an effort to enhance the formulation of a risk management strategy for protection and conservation of cultural heritage, through which to end the plundering of Egypt’s architectural legacy in the Egyptian community (revolutions, 1952 and 2011); and by presenting to its surrounding community the benefits derived from maintaining it.

Keywords: cultural heritage, legal regulation, risk management, preservation

Procedia PDF Downloads 398
9038 A webGIS Methodology to Support Sediments Management in Wallonia

Authors: Nathalie Stephenne, Mathieu Veschkens, Stéphane Palm, Christophe Charlemagne, Jacques Defoux

Abstract:

According to Europe’s first River basin Management Plans (RBMPs), 56% of European rivers failed to achieve the good status targets of the Water Framework Directive WFD. In Central European countries such as Belgium, even more than 80% of rivers failed to achieve the WFD quality targets. Although the RBMP’s should reduce the stressors and improve water body status, their potential to address multiple stress situations is limited due to insufficient knowledge on combined effects, multi-stress, prioritization of measures, impact on ecology and implementation effects. This paper describes a webGis prototype developed for the Walloon administration to improve the communication and the management of sediment dredging actions carried out in rivers and lakes in the frame of RBMPs. A large number of stakeholders are involved in the management of rivers and lakes in Wallonia. They are in charge of technical aspects (client and dredging operators, organizations involved in the treatment of waste…), management (managers involved in WFD implementation at communal, provincial or regional level) or policy making (people responsible for policy compliance or legislation revision). These different kinds of stakeholders need different information and data to cover their duties but have to interact closely at different levels. Moreover, information has to be shared between them to improve the management quality of dredging operations within the ecological system. In the Walloon legislation, leveling dredged sediments on banks requires an official authorization from the administration. This request refers to spatial information such as the official land use map, the cadastral map, the distance to potential pollution sources. The production of a collective geodatabase can facilitate the management of these authorizations from both sides. The proposed internet system integrates documents, data input, integration of data from disparate sources, map representation, database queries, analysis of monitoring data, presentation of results and cartographic visualization. A prototype of web application using the API geoviewer chosen by the Geomatic department of the SPW has been developed and discussed with some potential users to facilitate the communication, the management and the quality of the data. The structure of the paper states the why, what, who and how of this communication tool.

Keywords: sediments, web application, GIS, rivers management

Procedia PDF Downloads 404
9037 Preventing Perpetuation of Structural Violence in the Workplace: An Australian Settlement Services Case Study

Authors: Jordan Fallow

Abstract:

Service and advocacy organisations that serve refugee populations are often staffed by a large percentage of former refugees themselves, and this carries a number of implications for refugee rights, specifically economic and social rights. This paper makes an argument for the importance of introducing an understanding of intersectionality theory into organizations who provide services to and employ, refugee staff. The benefits of this are threefold; on an individual level it reduces the risks of burn out, vicarious trauma and compassion fatigue while increasing employee satisfaction and development, at an organizational level services become more effective, and at a systems level it helps reduce structural violence, which may itself have been a contributing factor in the movement of refugee staff from their origin countries. In support of this argument, a case study of an Australian settlement services organization is provided. Mixed methods research, utilising both qualitative and quantitative data, measured the perceived efficacy of diversity management tools at the organization and the impact this had on staff performance, retention and wellbeing. The paper also draws on strategic human resource and reward management, diversity management, international development and intersectionality texts.

Keywords: structural violence, employment, human resource management, intersectionality

Procedia PDF Downloads 220
9036 Communication and Management of Incidental Pathology in a Cohort of 1,214 Consecutive Appendicectomies

Authors: Matheesha Herath, Ned Kinnear, Bridget Heijkoop, Eliza Bramwell, Alannah Frazetto, Amy Noll, Prajay Patel, Derek Hennessey, Greg Otto, Christopher Dobbins, Tarik Sammour, James Moore

Abstract:

Background: Important incidental pathology requiring further action is commonly found during appendicectomy, macro- and microscopically. It is unknown whether the acute surgical unit (ASU) model affects the management and disclosure of these findings. Methods: An ASU model was introduced at our institution on 01/08/2012. In this retrospective cohort study, all patients undergoing appendicectomy 2.5 years before (traditional group) or after (ASU group) this date were compared. The primary outcomes were rates of appropriate management of the incidental findings and communication of the findings to the patient and to their general practitioner (GP). Results: 1,214 patients underwent emergency appendicectomy; 465 in the traditional group and 749 in the ASU group. 80 (6.6%) patients (25 and 55 in each respective period) had important incidental findings. There were 24 patients with benign polyps, 15 with neuro-endocrine tumour, 11 with endometriosis, 8 with pelvic inflammatory disease, 8 Enterobius vermicularis infection, 7 with low grade mucinous cystadenoma, 3 with inflammatory bowel disease, 2 with diverticulitis, 2 with tubo-ovarian mass, 1 with secondary appendiceal malignancy and none with primary appendiceal adenocarcinoma. One patient had dual pathologies. There was no difference between the traditional and ASU group with regards to communication of the findings to the patient (p=0.44) and their GP (p=0.27), and there was no difference in the rates of appropriate management (p=0.21). Conclusions: The introduction of an ASU model did not change rates of surgeon-to-patient and surgeon-to-GP communication nor affect rates of appropriate management of important incidental pathology during an appendectomy.

Keywords: acute care surgery, appendicitis, appendicectomy, incidental

Procedia PDF Downloads 142
9035 Hunting Ban, Unfortunate Decisions for the Bear Population in Romania

Authors: Alexandru Gridan, Georgeta Ionescu, Ovidiu Ionescu, Ramon Jurj, George Sirbu, Mihai Fedorca

Abstract:

The Brown Bear population size in Romania is approximately 7300-7600 individuals, which is projected to be 3000 individuals over the ecological carrying capacity. The Habitats Directive imposed certain protection rules on European Union (EU) Member States with Brown Bear populations. These however allow countries like Sweden, Croatia, Slovakia, Estonia to hunting as management tool, harvesting up to 10% of the surplus bear population annually. From the point Romania joined the EU to 2016, active conservation management has contributed to maintaining the highest and most genetically diverse Brown Bear population in Europe. Importantly, there has been good coexistence between people and bears and low levels of human-bear conflict. After social pressure and campaigning by some non-governmental organisations citing issues over monitoring, the environment minister decided in September 2016 to stop the use of hunting as a management tool for bears. Against this background, this paper provides a set of recommendations to resolve the current conflict in Romania. These include the need for collaborative decision-making to reduce conflicts between stakeholders and mechanisms to reduce current human-bear conflicts, which have increased by 50 percent in the past year.

Keywords: bear, bear population, bear management, wildlife conflict

Procedia PDF Downloads 181
9034 Documenting the Undocumented: Performing Counter-Narratives on Citizenship

Authors: Luis Pascasio

Abstract:

In a time when murky debates on US immigration policy are polarizing a nation steeped in partisan and nativist politics, certain media texts are proposing to challenge the dominant ways in which immigrant discourses are shaped in political debates. The paper will examine how two media texts perform counter-hegemonic discourses against institutionalized concepts on citizenship. The article looks at Documented (2014), a documentary film, written and directed by Jose Antonio Vargas, a Pulitzer-winning journalist-turned-activist and a self-proclaimed undocumented immigrant; and DefineAmerican.com, an online media platform that articulates the convergence of multiple voices and discourses about post-industrial and post-semiotic citizenship. As sites of meaning production, the two media texts perform counter-narratives that inspire new forms of mediated social activism and postcolonial identities. The paper argues that a closer introspection of the media texts reveals emotional, thematic and ideological claims to an interrogation of a diasporic discourse on redefining the rules of inclusion and exclusion within the postmodern dialogic of citizenship.

Keywords: counter-narratives, documentary filmmaking, postmodern citizenship, diaspora media

Procedia PDF Downloads 320
9033 Modified Bat Algorithm for Economic Load Dispatch Problem

Authors: Daljinder Singh, J.S.Dhillon, Balraj Singh

Abstract:

According to no free lunch theorem, a single search technique cannot perform best in all conditions. Optimization method can be attractive choice to solve optimization problem that may have exclusive advantages like robust and reliable performance, global search capability, little information requirement, ease of implementation, parallelism, no requirement of differentiable and continuous objective function. In order to synergize between exploration and exploitation and to further enhance the performance of Bat algorithm, the paper proposed a modified bat algorithm that adds additional search procedure based on bat’s previous experience. The proposed algorithm is used for solving the economic load dispatch (ELD) problem. The practical constraint such valve-point loading along with power balance constraints and generator limit are undertaken. To take care of power demand constraint variable elimination method is exploited. The proposed algorithm is tested on various ELD problems. The results obtained show that the proposed algorithm is capable of performing better in majority of ELD problems considered and is at par with existing algorithms for some of problems.

Keywords: bat algorithm, economic load dispatch, penalty method, variable elimination method

Procedia PDF Downloads 457
9032 The Active Role of Teacher's in Managing Effective Classroom Environment for High School Students from the Viewpoint of the Teachers

Authors: Majda Ibrahim Aljaroudi, Jwaher Alburake

Abstract:

The study aimed to identify the active role of the teacher in the management of the effective classroom environment for high school students from the viewpoint of the teachers, and to identify whether there were statistically significant differences between the averages of the respondents regarding the active role of the high school teachers in managing effective classroom environment in Riyadh, and also the total score depending on the variables of the study (qualifications, years of experience, training and development programs). This study used the descriptive survey approach where a questionnaire has been built and consisted of (35) items about five areas as a tool to measure the teacher's role in the management of effective classroom environment for high school students. The study population consisted of (1313) high school teachers in the government schools in south of Riyadh. It consisted of (70) teachers who were selected randomly. It used the appropriate statistical methods to analyze data by using statistical packages (SPSS). The study found the following results: • Most of the study sample members agreed on their role in the effective classroom environment management for high school students in government schools in Riyadh with an average (3.91 out of 5), which falls in the fifth category of Quintet scale (from 3.41 to 4.20) that refers to the option "often". • There are statistically significant differences between the mean responses of the study sample about the active role of the teacher in the effective classroom environment management for high school students regarding the concept of order in the classroom depending on the variable of years of experience for the benefit of teachers who have over 10 years of experience. There are statistically significant differences between the mean responses of the study sample about the teacher's active role in the effective classroom environment management for high school students regarding the educational process for maintaining the order in the classroom depending on the variable of training and development programs for the benefit of the teachers who have more than (5) courses. Due to the results of the study the researcher recommended a number of recommendations to improve the teacher's role in the effective classroom environment management for high school students.

Keywords: effective management, active learning, educational sciences, pedagogical sciences

Procedia PDF Downloads 441
9031 The Role of Extrovert and Introvert Personality in Second Language Acquisition

Authors: Fatma Hsain Ali Suliman

Abstract:

Personality plays an important role in acquiring a second language. For second language learners to make maximum progress with their own learning styles, their individual differences must be recognized and attended to. Personality is considered to be a pattern of unique characteristics that give a person’s behavior a kind of consistency and individuality. Therefore, the enclosed study, which is entitled “The Role of Personality in Second language Acquisition: Extroversion and Introversion”, tends to shed light on the relationship between learners’ personalities and second language acquisition process. In other words, it aims at drawing attention to how individual differences of students as being extroverts or introverts could affect the language acquisition process. As a literature review, this paper discusses the results of some studies concerning this issue as well as the point views of researchers and scholars who have focused on the effect of extrovert and introvert personality on acquiring a second language. To accomplish the goals of this study, which is divided into 5 chapters including introduction, review of related literature, research method and design, results and discussions and conclusions and recommendations, 20 students of English Department, Faculty of Arts, Misurata University, Libya were handed out a questionnaire to figure out the effect of their personalities on the learning process. Finally, to be more sure about the role of personality in a second language acquisition process, the same students who were given the questionnaire were observed in their ESL classes.

Keywords: second language acquisition, personality, extroversion, introversion, individual differences, language learning strategy, personality factors, psycho linguistics

Procedia PDF Downloads 659
9030 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study

Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke

Abstract:

This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.

Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management

Procedia PDF Downloads 38
9029 Illegal, Unreported and Unregulated (IUU) Fishing in ASEAN Countries

Authors: Wen Chiat Lee, K. Kuperan Viswanathan

Abstract:

Illegal, Unreported and unregulated (IUU) fishing brings great losses to the economies of the fishing nations. Understanding the reasons contributing to IUU fishing is crucial in reducing it. Economic, institutional and social factors are key drivers of IIU fishing. The economic factor is the main contributor to IUU fishing. The two possible ways to curb the IUU fishing is highlighted. One way is to reduce the revenue from IUU fishing and another way is to increase the cost of IUU fishing. There are three costs of IUU fishing that can be increased namely the operating, capital and risk costs. Approaches for reducing the economic rent or profit from IUU fishing are developed and directions for reducing IUU fishing are also suggested. Improved registration of fishing vessels, preventing entry of illegal fish products and most importantly, developing co-management of fisheries are the ways forward for reducing IUU fishing. All governments in ASEAN must work in tandem with the stakeholders involved such as fishers, fishermen agencies or associations to exchange information for reducing the transaction cost of IUU fishing.

Keywords: Illegal, unreported and unregulated (IUU) fishing, co-management, fisheries management, economic rent framework

Procedia PDF Downloads 229