Search results for: emergency service vehicle
3967 Assessment of Access to Water, Sanitation and Hygiene, in Relation to the SDG 6, in Small Towns in Senegal: The Case of the Town of Foundiougne
Authors: Elhadji Mamadou Sonko, Ndiogou Sankhare, Jean Birane Gning, Cheikh Diop
Abstract:
In Senegal, small towns have problems of access to water, hygiene, and sanitation. This study aims to assess the situation in Foundiougne. The methodology includes a literature review, semi-structured interviews with stakeholders, surveys of 100 households, and observation. The results show that 35% of households have unimproved water services, 46% have limited service, and 19% have basic service. Regarding sanitation, 77% of households have basic sanitation services, and 23% have limited sanitation services. Manual emptying alone is practiced by 4% of households, while 17% combine it with mechanical emptying. Household wastewater is disposed of in streets, vacant land, and concession yards. The emptied sludge is discharged into the environment without treatment. Hand washing is practiced by 98% of households. These results show that there is real work to be done at the small towns level to close the water and sanitation gap in order to achieve SDG 6 targets in Senegal.Keywords: foundiougne, SDG 6, senegal, small towns, water sanitation ang hygiene
Procedia PDF Downloads 1283966 A Study on Pattern of Acute Poisoning in Patients Admitted to Emergency Wards in a Tertiary Care Hospital
Authors: Sathvika Reddy, Devi Revathi
Abstract:
Background: In India, deliberate self-harm (DSH) with poisoning agents carries a significant impact on morbidity and mortality. Changes in the patterns of poisoning vary across various geographical locations. It is important to know the patterns in a given region in order to facilitate rapid clinical diagnosis, appropriate treatment to reduce associated morbidity and mortality. Aim and Objective: To study the patterns, treatment outcomes of acute poisoning in patients admitted to emergency wards in a tertiary care hospital and to provide poison information services. Materials and Methods: This study was conducted at M.S Ramaiah Memorial and Teaching Hospital from November 2016 to March 2017. The patient’s data was obtained from patient case sheet, interaction with health care professionals, interviewing patients and their caretakers (if possible), and were documented in a suitably designed form. Results: The study involved 131 patients with a mean age of 27.76 ± 15.5 years. Majority of the patients were in the age group 21-30 years, literates (n=53) dwelling in urban (n=113) areas belonging to upper middle class (n=50). Analgesics and antipyretics were commonly utilized in intentional drug overdosage (n=49). Envenomation constituted n=21(16.03%). Furthermore, a significant relationship was observed between marital status and self-poisoning (n=64) (P < 0.001) which commonly occurred through oral ingestion. The outcomes were correlated with the GCS and PSS system and n=85 recovered, n=17 were discharged against medical advice, and n=4 died, and n=4 were lost to follow up respectively. The poison information queries include drug overdose (n=29) and management related queries (n=22) provided majorly by residents (n=45) to update knowledge (n=11) and for better patient care (n=40). Conclusion: The trend in poisoning is dynamic. Medications were identified as the main cause of poisoning in urban areas of India. Educational programs with more emphasis on preventive measures are necessary to create awareness among the general public.Keywords: poisoning, suicides, clinical pharmacist, envenomation, poison information services
Procedia PDF Downloads 1643965 Using Lean-Six Sigma Philosophy to Enhance Revenues and Improve Customer Satisfaction: Case Studies from Leading Telecommunications Service Providers in India
Authors: Senthil Kumar Anantharaman
Abstract:
Providing telecommunications based network services in developing countries like India which has a population of 1.5 billion people, so that these services reach every individual, is one of the greatest challenges the country has been facing in its journey towards economic growth and development. With growing number of telecommunications service providers in the country, a constant challenge that has been faced by these providers is in providing not only quality but also delightful customer experience while simultaneously generating enhanced revenues and profits. Thus, the role played by process improvement methodologies like Six Sigma cannot be undermined and specifically in telecom service provider based operations, it has provided substantial benefits. Therefore, it advantages are quite comparable to its applications and advantages in other sectors like manufacturing, financial services, information technology-based services and Healthcare services. One of the key reasons that this methodology has been able to reap great benefits in telecommunications sector is that this methodology has been combined with many of its competing process improvement techniques like Theory of Constraints, Lean and Kaizen to give the maximum benefit to the service providers thereby creating a winning combination of organized process improvement methods for operational excellence thereby leading to business excellence. This paper discusses about some of the key projects and areas in the end to end ‘Quote to Cash’ process at big three Indian telecommunication companies that have been highly assisted by applying Six Sigma along with other process improvement techniques. While the telecommunication companies which we have considered, is primarily in India and run by both private operators and government based setups, the methodology can be applied equally well in any other part of developing countries around the world having similar context. This study also compares the enhanced revenues that can arise out of appropriate opportunities in emerging market scenarios, that Six Sigma as a philosophy and methodology can provide if applied with vigour and robustness. Finally, the paper also comes out with a winning framework in combining Six Sigma methodology with Kaizen, Lean and Theory of Constraints that will enhance both the top-line as well as the bottom-line while providing the customers a delightful experience.Keywords: emerging markets, lean, process improvement, six sigma, telecommunications, theory of constraints
Procedia PDF Downloads 1643964 Point-of-Interest Recommender Systems for Location-Based Social Network Services
Authors: Hoyeon Park, Yunhwan Keon, Kyoung-Jae Kim
Abstract:
Location Based Social Network services (LBSNs) is a new term that combines location based service and social network service (SNS). Unlike traditional SNS, LBSNs emphasizes empirical elements in the user's actual physical location. Point-of-Interest (POI) is the most important factor to implement LBSNs recommendation system. POI information is the most popular spot in the area. In this study, we would like to recommend POI to users in a specific area through recommendation system using collaborative filtering. The process is as follows: first, we will use different data sets based on Seoul and New York to find interesting results on human behavior. Secondly, based on the location-based activity information obtained from the personalized LBSNs, we have devised a new rating that defines the user's preference for the area. Finally, we have developed an automated rating algorithm from massive raw data using distributed systems to reduce advertising costs of LBSNs.Keywords: location-based social network services, point-of-interest, recommender systems, business analytics
Procedia PDF Downloads 2293963 A Review of the Long Term Effects of In-Service Training Towards Inclusive Education
Authors: Meenakshi Srivastava, Anke A. De Boer, Sip Jan Pij
Abstract:
Teacher’s preparedness towards special educational needs (SEN) of the students in regular schools is an important factor in making education inclusive as a goal to provide education for all. The current study measured the long term effects of an in-service teacher training programme which focused on the inclusion of students with a range of SEN. The programme was on three particular aspects: teachers’ attitudes, their knowledge about SEN and knowledge about teaching methods. A refresher course was also organized for participants of the initial training programme. The long term effects were examined by teachers using a self-report questionnaire (n = 38). The wider effects of the initial training were recorded by interviewing school principals (n = 4). Repeated measures of ANOVA revealed significant effects: more positive attitudes and increased knowledge about SEN among teachers who took the refresher course (n = 18) compared to those who had not (n = 19). Principals also found a more positive attitude, sensitivity and increased awareness about SEN among the participants.Keywords: inclusion, students with special educational needs, teacher training, follow-up, attitudes change
Procedia PDF Downloads 1253962 Approaches to Estimating the Radiation and Socio-Economic Consequences of the Fukushima Daiichi Nuclear Power Plant Accident Using the Data Available in the Public Domain
Authors: Dmitry Aron
Abstract:
Major radiation accidents carry not only the potential risks of negative consequences for public health due to exposure but also because of large-scale emergency measures were taken by authorities to protect the population, which can lead to unreasonable social and economic damage. It is technically difficult, as a rule, to assess the possible costs and damages from decisions on evacuation or resettlement of residents in the shortest possible time, since it requires specially prepared information systems containing relevant information on demographic, economic parameters and incoming data on radiation conditions. Foreign observers also face the difficulties in assessing the consequences of an accident in a foreign territory, since they usually do not have official and detailed statistical data on the territory of foreign state beforehand. Also, they can suppose the application of unofficial data from open Internet sources is an unreliable and overly labor-consuming procedure. This paper describes an approach to prompt creation of relational database that contains detailed actual data on economics, demographics and radiation situation at the Fukushima Prefecture during the Fukushima Daiichi NPP accident, received by the author from open Internet sources. This database was developed and used to assess the number of evacuated population, radiation doses, expected financial losses and other parameters of the affected areas. The costs for the areas with temporarily evacuated and long-term resettled population were investigated, and the radiological and economic effectiveness of the measures taken to protect the population was estimated. Some of the results are presented in the article. The study showed that such a tool for analyzing the consequences of radiation accidents can be prepared in a short space of time for the entire territory of Japan, and it can serve for the modeling of social and economic consequences for hypothetical accidents for any nuclear power plant in its territory.Keywords: Fukushima, radiation accident, emergency measures, database
Procedia PDF Downloads 1913961 Seismic Preparedness Challenge in Ionian Islands (Greece) through 'Telemachus' Project
Authors: A. Kourou, M. Panoutsopoulou
Abstract:
Nowadays, disaster risk reduction requires innovative ways of working collaboratively, monitoring tools, management methods, risk communication, and knowledge, as key factors for decision-making actors. Experience has shown that the assessment of seismic risk and its effective management is still an important challenge. In Greece, Ionian Islands region is characterized as the most seismic area of the country and one of the most active worldwide. It is well known that in case of a disastrous earthquake the local authorities need to assess the situation in the affected area and coordinate the disaster response. In particular, the main outcomes of 'Telemachus' project are the development of an innovative operational system that hosts the needed data of seismic risk management in the Ionian Islands and the implementation of educational actions for the involved target groups. This project is funded in the Priority Axis 'Environmental Protection and Sustainable Development' of Operational Plan 'Ionian Islands 2014-2020'. EPPO is one of the partners of the project and it is responsible, among others, for the development of proper training material. This paper presents the training material of 'Telemachus' and its usage as a helpful, managerial tool in case of earthquake emergency. This material is addressed to different target groups, such as civil protection staff, people that involved with the tourism industry, educators of disabled people, etc. Very positive aspect of the project is the involvement of end-users that should evaluate the training products; test standards; clarify the personnel’s roles and responsibilities; improve interagency coordination; identify gaps in resources; improve individual performance; and identify opportunities for improvement. It is worth mentioning that even though the abovementioned material developed is useful for the training of specific target groups on emergency management issues within Ionian Islands Region, it could be used throughout Greece and other countries too.Keywords: education of civil protection staff, Ionian Islands Region of Greece, seismic risk, training material
Procedia PDF Downloads 1233960 National Core Indicators - Aging and Disabilities: A Person-Centered Approach to Understanding Quality of Long-Term Services and Supports
Authors: Stephanie Giordano, Rosa Plasencia
Abstract:
In the USA, in 2013, public service systems such as Medicaid, aging, and disability systems undertook an effort to measure the quality of service delivery by examining the experiences and outcomes of those receiving public services. The goal of this effort was to develop a survey to measure the experiences and outcomes of those receiving public services, with the goal of measuring system performance for quality improvement. The performance indicators were developed through with input from directors of state aging and disability service systems, along with experts and stakeholders in the field across the United States. This effort, National Core Indicators –Aging and Disabilities (NCI-AD), grew out of National Core Indicators –Intellectual and Developmental Disabilities, an effort to measure developmental disability (DD) systems across the States. The survey tool and administration protocol underwent multiple rounds of testing and revision between 2013 and 2015. The measures in the final tool – called the Adult Consumer Survey (ACS) – emphasize not just important indicators of healthcare access and personal safety but also includes indicators of system quality based on person-centered outcomes. These measures indicate whether service systems support older adults and people with disabilities to live where they want, maintain relationships and engage in their communities and have choice and control in their everyday lives. Launched in 2015, the NCI-AD Adult Consumer Survey is now used in 23 states in the US. Surveys are conducted by NCI-AD trained surveyors via direct conversation with a person receiving public long-term services and supports (LTSS). Until 2020, surveys were only conducted in person. However, after a pilot to test the reliability of videoconference and telephone survey modes, these modes were adopted as an acceptable practice. The nature of the survey is that of a “guided conversation” survey administration allows for surveyor to use wording and terminology that is best understand by the person surveyed. The survey includes a subset of questions that may be answered by a proxy respondent who knows the person well if the person is receiving services in unable to provide valid responses on their own. Surveyors undergo a standardized training on survey administration to ensure the fidelity of survey administration. In addition to the main survey section, a Background Information section collects data on personal and service-related characteristics of the person receiving services; these data are typically collected through state administrative record. This information is helps provide greater context around the characteristics of people receiving services. It has also been used in conjunction with outcomes measures to look at disparity (including by race and ethnicity, gender, disability, and living arrangements). These measures of quality are critical for public service delivery systems to understand the unique needs of the population of older adults and improving the lives of older adults as well as people with disabilities. Participating states may use these data to identify areas for quality improvement within their service delivery systems, to advocate for specific policy change, and to better understand the experiences of specific populations of people served.Keywords: quality of life, long term services and supports, person-centered practices, aging and disability research, survey methodology
Procedia PDF Downloads 1213959 Evaluation of the Impact of Reducing the Traffic Light Cycle for Cars to Improve Non-Vehicular Transportation: A Case of Study in Lima
Authors: Gheyder Concha Bendezu, Rodrigo Lescano Loli, Aldo Bravo Lizano
Abstract:
In big urbanized cities of Latin America, motor vehicles have priority over non-motor vehicles and pedestrians. There is an important problem that affects people's health and quality of life; lack of inclusion towards pedestrians makes it difficult for them to move smoothly and safely since the city has been planned for the transit of motor vehicles. Faced with the new trend for sustainable and economical transport, the city is forced to develop infrastructure in order to incorporate pedestrians and users with non-motorized vehicles in the transport system. The present research aims to study the influence of non-motorized vehicles on an avenue, the optimization of a cycle using traffic lights based on simulation in Synchro software, to improve the flow of non-motor vehicles. The evaluation is of the microscopic type; for this reason, field data was collected, such as vehicular, pedestrian, and non-motor vehicle user demand. With the values of speed and travel time, it is represented in the current scenario that contains the existing problem. These data allow to create a microsimulation model in Vissim software, later to be calibrated and validated so that it has a behavior similar to reality. The results of this model are compared with the efficiency parameters of the proposed model; these parameters are the queue length, the travel speed, and mainly the travel times of the users at this intersection. The results reflect a reduction of 27% in travel time, that is, an improvement between the proposed model and the current one for this great avenue. The tail length of motor vehicles is also reduced by 12.5%, a considerable improvement. All this represents an improvement in the level of service and in the quality of life of users.Keywords: bikeway, microsimulation, pedestrians, queue length, traffic light cycle, travel time
Procedia PDF Downloads 1763958 Context, Challenges, Constraints and Strategies of Non-Profit Organisations in Responding to the Needs of Asylum Seekers and Refugees in Cape Town, South Africa
Authors: C. O’Brien, Chloe Reiss
Abstract:
While South Africa has been the chosen host country for over 1,2 million asylum seekers/refugees it has at the same time, been struggling to address the needs of its own people who are still trapped in poverty with little prospects of employment. This limited exploratory, qualitative study was undertaken in Cape Town with a purposive sample of 21 key personnel from various NPOs providing a service to asylum seekers/refugees. Individual in-depth face to face interviews were carried out and the main findings were: Some of the officials at the Department of Home Affairs, health personnel, landlords, school principals, employers, bank officials and police officers were prejudicial in their practices towards asylum seekers/ refugees. The major constraints experienced by NPOs in this study were linked to a lack of funding and minimal government support, strained relationship with the Department of Home Affairs and difficulties in accessing refugees. And finally, the strategies adopted by these NPOs included networking with other service providers, engaging in advocacy, raising community awareness and liaising with government. Thus, more focused intervention strategies are needed to build social cohesion, address prejudices which fuels xenophobic attacks and raise awareness/educate various sectors about refugee rights. Given this burgeoning global problem, social work education and training should include curriculum content on migrant issues. Furthermore, larger studies using mixed methodology approaches would yield more nuanced data and provide for more strategic interventions.Keywords: refugees and asylum seekers, constraints of service delivery, non-profit organisations, refugee challenges
Procedia PDF Downloads 2053957 The Relationship between Marketing Mix Strategy and Valuable of Muay Thai Training and Thai Massage in Foreign Tourists' Perception
Authors: Thammamonr Khunrattanaporn
Abstract:
The purpose of the research was to examine the relationship between the marketing mix factors and valuable of Muay Thai Training and Thai massage in foreign tourists’ perception. The research used the 8 P’s of marketing framework presented in the theory of compound marketing services strategy. Data was collect using survey for 400 questionnaires using the Quota sampling from foreign tourists travelling in Thailand. The data was analyzed to determine valuation statistics, the frequency, percent average, means and standard deviation and pearson's correlation coefficients. The result shows the foreign tourists’ perception with the marketing mix strategy in term of Muay Thai training and massage regarding curriculum areas: product, pricing, channel distribution, Promotion, Personnel services, Physical evidence and external partnerships the overall, it significant at a high level. The awareness level of service and value for travelers had two aspects of service quality and value for money it significant at the highest level.Keywords: foreign tourists’ perception, marketing mix strategy, Muay Thai training, the massage
Procedia PDF Downloads 2653956 Authority and Function of Administrative Organs According to the Constitution: A Construction of Democracy in the Administrative Law of Indonesia
Authors: Andhika Danesjvara, Nur Widyastanti
Abstract:
The constitution regulates the forms, types, and powers of sState organs in a government. The powers of the organs are then regulated in more detail in the legislation. One of these organs is a government organ, headed by a president or by another name that serves as the main organizer of government. The laws and regulations will govern how the organs of government shall exercise their authority and functions. In a modern state, the function of enacting laws or called executive power does not exercise the functions of government alone, but there are other organs that help the government run the country. These organs are often called government agencies, government accelerating bodies, independent regulatory bodies, commissions, councils or other similar names. The legislation also limits the power of officials within the organs to keep from abusing its authority. The main question in this paper is whether organs are the implementation of a democratic country, or as a form of compromise with the power of stakeholders. It becomes important to see how the administrative organs perform their functions. The administrative organs that are bound by government procedures work in the public service; therefore the next question is how far the function of public service is appropriate and not contradictory to the constitution.Keywords: administrative organs, constitution, democracy, government
Procedia PDF Downloads 3043955 Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System
Authors: Vuk M. Popovic, Dunja D. Popovic
Abstract:
Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects.Keywords: laboratory information system, maintenance engineering, neural networks, software maintenance, software maintenance costs
Procedia PDF Downloads 3583954 Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Abstract:
Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.Keywords: SIM card, mobile financial services, cryptography, secure data storage
Procedia PDF Downloads 3123953 X-Ray Diffraction Technique as a Means for Degradation Assessment of Welded Joints
Authors: Jaroslav Fiala, Jaroslav Kaiser, Pavel Zlabek, Vaclav Mentl
Abstract:
The X-ray diffraction technique was recognized as a useful tool for the assessment of material degradation degree after a long-time service. In many industrial applications materials are subjected to degradation of mechanical properties as a result of real service conditions. The assessment of the remnant lifetime of components and structures is commonly based on correlated procedures including numerous destructive, non-destructive and mathematical techniques that should guarantee reasonable precise assessment of the current damage extent of materials in question and the remnant lifetime assessment. This paper summarizes results of an experimental programme concentrated on mechanical properties degradation of welded components. Steel an Al-alloy test specimens of base metal, containing welds and simple weldments were fatigue loaded at room temperature to obtain Woehler S-N curve. X-ray diffraction technique was applied to assess the degradation degree of material as a result of cyclic loading.Keywords: fatigue loading, material degradation, steels, AL-alloys, X-ray diffraction
Procedia PDF Downloads 4393952 Mathematical Modelling and AI-Based Degradation Analysis of the Second-Life Lithium-Ion Battery Packs for Stationary Applications
Authors: Farhad Salek, Shahaboddin Resalati
Abstract:
The production of electric vehicles (EVs) featuring lithium-ion battery technology has substantially escalated over the past decade, demonstrating a steady and persistent upward trajectory. The imminent retirement of electric vehicle (EV) batteries after approximately eight years underscores the critical need for their redirection towards recycling, a task complicated by the current inadequacy of recycling infrastructures globally. A potential solution for such concerns involves extending the operational lifespan of electric vehicle (EV) batteries through their utilization in stationary energy storage systems during secondary applications. Such adoptions, however, require addressing the safety concerns associated with batteries’ knee points and thermal runaways. This paper develops an accurate mathematical model representative of the second-life battery packs from a cell-to-pack scale using an equivalent circuit model (ECM) methodology. Neural network algorithms are employed to forecast the degradation parameters based on the EV batteries' aging history to develop a degradation model. The degradation model is integrated with the ECM to reflect the impacts of the cycle aging mechanism on battery parameters during operation. The developed model is tested under real-life load profiles to evaluate the life span of the batteries in various operating conditions. The methodology and the algorithms introduced in this paper can be considered the basis for Battery Management System (BMS) design and techno-economic analysis of such technologies.Keywords: second life battery, electric vehicles, degradation, neural network
Procedia PDF Downloads 653951 Protection from Risks of Natural Disasters and Social and Economic Support to the Native Population
Authors: Maria Angela Bedini, Fabio Bronzini
Abstract:
The risk of natural disasters affects all the countries of the world, whether it refers to seismic events or tsunamis or hydrogeological disasters. In most cases, the risk can be considered in its three components: hazard, exposure, vulnerability (and urban vulnerability). The aim of this paper is to evaluate how the Italian scientific community has related the contribution of these three components, superimposing the three different maps that summarize the fundamental structure of the risk. Based on the three components considered, the study applies the Regional Planning methodology on the three phases of the risk protection and mitigation process: the prevention phase, the emergency intervention phase, the post-disaster phase. The paper illustrates the Italian experience of the pre-during-post-earthquake intervention. Main results: The study deepens these aspects in the belief that “a historical center” and an “island” can present similar problems at the international level, both in the phase of prevention (earthquake, tsunamis, hydrogeological disasters), in emergency phase (protocols and procedures of intervention) and in the post-disaster phase. The conclusions of the research identify the need to plan in advance how to deal with the post-disaster phase and consider it a priority with respect to the simple reconstruction of destroyed buildings. In fact the main result of the post-disaster intervention must be the return and the social and economic support of the indigenous population, and not only the construction of new housing and equipment. In this sense, the results of the research show that the elderly inhabitants of a historic center can be compared to the indigenous population of an atoll of fishermen, as both constitute the most important resource: the human resource. Their return in conditions of security testifies, with their presence, the culture, customs, and values rooted in the history of a people.Keywords: post-disaster interventions, risk of natural disasters in Italy and abroad, seismic events in Italy, social and economic protection and support for the native population of historical centers
Procedia PDF Downloads 1013950 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund
Authors: Chutikarn Sriviboon
Abstract:
The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.Keywords: effectiveness, quality, labor funds, service
Procedia PDF Downloads 3563949 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1213948 Library on the Cloud: Universalizing Libraries Based on Virtual Space
Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan
Abstract:
Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access
Procedia PDF Downloads 6623947 Map UI Design of IoT Application Based on Passenger Evacuation Behaviors in Underground Station
Authors: Meng-Cong Zheng
Abstract:
When the public space is in an emergency, how to quickly establish spatial cognition and emergency shelter in the closed underground space is the urgent task. This study takes Taipei Station as the research base and aims to apply the use of Internet of things (IoT) application for underground evacuation mobility design. The first experiment identified passengers' evacuation behaviors and spatial cognition in underground spaces by wayfinding tasks and thinking aloud, then defined the design conditions of User Interface (UI) and proposed the UI design. The second experiment evaluated the UI design based on passengers' evacuation behaviors by wayfinding tasks and think aloud again as same as the first experiment. The first experiment found that the design conditions that the subjects were most concerned about were "map" and hoping to learn the relative position of themselves with other landmarks by the map and watch the overall route. "Position" needs to be accurately labeled to determine the location in underground space. Each step of the escape instructions should be presented clearly in "navigation bar." The "message bar" should be informed of the next or final target exit. In the second experiment with the UI design, we found that the "spatial map" distinguishing between walking and non-walking areas with shades of color is useful. The addition of 2.5D maps of the UI design increased the user's perception of space. Amending the color of the corner diagram in the "escape route" also reduces the confusion between the symbol and other diagrams. The larger volume of toilets and elevators can be a judgment of users' relative location in "Hardware facilities." Fire extinguisher icon should be highlighted. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. However, "Compass and return to present location" are less used in underground space.Keywords: evacuation behaviors, IoT application, map UI design, underground station
Procedia PDF Downloads 2073946 Helping the Helper: Impact of Teaching Assistantship Program among Psychology Alumni
Authors: Clarissa Delariarte
Abstract:
With the aim of helping the poorest of the poor achieve quality education, Psychology students supported and served as teacher assistants to its Early Childhood Education Center in two barangays since the program began in 1999. Making use of qualitative approach, the impact of the program to 29 alumni who served as teacher assistants between 2000-2014 was assessed. Results show that the impact to the alumni is in cognitive as well as social-emotional in terms of feelings of deep satisfaction and sense of volunteerism which is being carried out in their respective workspaces. They also expressed positive feelings of inspiration, gratefulness and happiness. A wider perspective in life, being confident, creative and resourceful was also articulated as concrete impacts. It is concluded that the program had an impact on helping the helper and is a concrete manifestation of the academe being successful in its commitment of forming individuals into becoming integrated and compassionate in the service of the Church and Society. It implies that more opportunities of helping others be provided to students since, in the final analysis, is actually an opportunity of helping the helper be of better service to others.Keywords: applied psychology, life skill, qualitative research, quality education
Procedia PDF Downloads 1863945 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network
Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang
Abstract:
Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving
Procedia PDF Downloads 3313944 Knowledge Management and Administrative Effectiveness of Non-teaching Staff in Federal Universities in the South-West, Nigeria
Authors: Nathaniel Oladimeji Dixon, Adekemi Dorcas Fadun
Abstract:
Educational managers have observed a downward trend in the administrative effectiveness of non-teaching staff in federal universities in South-west Nigeria. This is evident in the low-quality service delivery of administrators and unaccomplished institutional goals and missions of higher education. Scholars have thus indicated the need for the deployment and adoption of a practice that encourages information collection and sharing among stakeholders with a view to improving service delivery and outcomes. This study examined the extent to which knowledge management correlated with the administrative effectiveness of non-teaching staff in federal universities in South-west Nigeria. The study adopted the survey design. Three federal universities (the University of Ibadan, Federal University of Agriculture, Abeokuta, and Obafemi Awolowo University) were purposively selected because administrative ineffectiveness was more pronounced among non-teaching staff in government-owned universities, and these federal universities were long established. The proportional and stratified random sampling was adopted to select 1156 non-teaching staff across the three universities along the three existing layers of the non-teaching staff: secretarial (senior=311; junior=224), non-secretarial (senior=147; junior=241) and technicians (senior=130; junior=103). Knowledge Management Practices Questionnaire with four sub-scales: knowledge creation (α=0.72), knowledge utilization (α=0.76), knowledge sharing (α=0.79) and knowledge transfer (α=0.83); and Administrative Effectiveness Questionnaire with four sub-scales: communication (α=0.84), decision implementation (α=0.75), service delivery (α=0.81) and interpersonal relationship (α=0.78) were used for data collection. Data were analyzed using descriptive statistics, Pearson product-moment correlation and multiple regression at 0.05 level of significance, while qualitative data were content analyzed. About 59.8% of the non-teaching staff exhibited a low level of knowledge management. The indices of administrative effectiveness of non-teaching staff were rated as follows: service delivery (82.0%), communication (78.0%), decision implementation (71.0%) and interpersonal relationship (68.0%). Knowledge management had significant relationships with the indices of administrative effectiveness: service delivery (r=0.82), communication (r=0.81), decision implementation (r=0.80) and interpersonal relationship (r=0.47). Knowledge management had a significant joint prediction on administrative effectiveness (F (4;1151)= 0.79, R=0.86), accounting for 73.0% of its variance. Knowledge sharing (β=0.38), knowledge transfer (β=0.26), knowledge utilization (β=0.22), and knowledge creation (β=0.06) had relatively significant contributions to administrative effectiveness. Lack of team spirit and withdrawal syndrome is the major perceived constraints to knowledge management practices among the non-teaching staff. Knowledge management positively influenced the administrative effectiveness of the non-teaching staff in federal universities in South-west Nigeria. There is a need to ensure that the non-teaching staff imbibe team spirit and embrace teamwork with a view to eliminating their withdrawal syndromes. Besides, knowledge management practices should be deployed into the administrative procedures of the university system.Keywords: knowledge management, administrative effectiveness of non-teaching staff, federal universities in the south-west of nigeria., knowledge creation, knowledge utilization, effective communication, decision implementation
Procedia PDF Downloads 1033943 Safety Tolerance Zone for Driver-Vehicle-Environment Interactions under Challenging Conditions
Authors: Matjaž Šraml, Marko Renčelj, Tomaž Tollazzi, Chiara Gruden
Abstract:
Road safety is a worldwide issue with numerous and heterogeneous factors influencing it. On the side, driver state – comprising distraction/inattention, fatigue, drowsiness, extreme emotions, and socio-cultural factors highly affect road safety. On the other side, the vehicle state has an important role in mitigating (or not) the road risk. Finally, the road environment is still one of the main determinants of road safety, defining driving task complexity. At the same time, thanks to technological development, a lot of detailed data is easily available, creating opportunities for the detection of driver state, vehicle characteristics and road conditions and, consequently, for the design of ad hoc interventions aimed at improving driver performance, increase awareness and mitigate road risks. This is the challenge faced by the i-DREAMS project. i-DREAMS, which stands for a smart Driver and Road Environment Assessment and Monitoring System, is a 3-year project funded by the European Union’s Horizon 2020 research and innovation program. It aims to set up a platform to define, develop, test and validate a ‘Safety Tolerance Zone’ to prevent drivers from getting too close to the boundaries of unsafe operation by mitigating risks in real-time and after the trip. After the definition and development of the Safety Tolerance Zone concept and the concretization of the same in an Advanced driver-assistance system (ADAS) platform, the system was tested firstly for 2 months in a driving simulator environment in 5 different countries. After that, naturalistic driving studies started for a 10-month period (comprising a 1-month pilot study, 3-month baseline study and 6 months study implementing interventions). Currently, the project team has approved a common evaluation approach, and it is developing the assessment of the usage and outcomes of the i-DREAMS system, which is turning positive insights. The i-DREAMS consortium consists of 13 partners, 7 engineering universities and research groups, 4 industry partners and 2 partners (European Transport Safety Council - ETSC - and POLIS cities and regions for transport innovation) closely linked to transport safety stakeholders, covering 8 different countries altogether.Keywords: advanced driver assistant systems, driving simulator, safety tolerance zone, traffic safety
Procedia PDF Downloads 683942 Evaluation of the Trauma System in a District Hospital Setting in Ireland
Authors: Ahmeda Ali, Mary Codd, Susan Brundage
Abstract:
Importance: This research focuses on devising and improving Health Service Executive (HSE) policy and legislation and therefore improving patient trauma care and outcomes in Ireland. Objectives: The study measures components of the Trauma System in the district hospital setting of the Cavan/Monaghan Hospital Group (CMHG), HSE, Ireland, and uses the collected data to identify the strengths and weaknesses of the CMHG Trauma System organisation, to include governance, injury data, prevention and quality improvement, scene care and facility-based care, and rehabilitation. The information will be made available to local policy makers to provide objective situational analysis to assist in future trauma service planning and service provision. Design, setting and participants: From 28 April to May 28, 2016 a cross-sectional survey using World Health Organisation (WHO) Trauma System Assessment Tool (TSAT) was conducted among healthcare professionals directly involved in the level III trauma system of CMHG. Main outcomes: Identification of the strengths and weaknesses of the Trauma System of CMHG. Results: The participants who reported inadequate funding for pre hospital (62.3%) and facility based trauma care at CMHG (52.5%) were high. Thirty four (55.7%) respondents reported that a national trauma registry (TARN) exists but electronic health records are still not used in trauma care. Twenty one respondents (34.4%) reported that there are system wide protocols for determining patient destination and adequate, comprehensive legislation governing the use of ambulances was enforced, however, there is a lack of a reliable advisory service. Over 40% of the respondents reported uncertainty of the injury prevention programmes available in Ireland; as well as the allocated government funding for injury and violence prevention. Conclusions: The results of this study contributed to a comprehensive assessment of the trauma system organisation. The major findings of the study identified three fundamental areas: the inadequate funding at CMHG, the QI techniques and corrective strategies used, and the unfamiliarity of existing prevention strategies. The findings direct the need for further research to guide future development of the trauma system at CMHG (and in Ireland as a whole) in order to maximise best practice and to improve functional and life outcomes.Keywords: trauma, education, management, system
Procedia PDF Downloads 2443941 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates
Procedia PDF Downloads 3073940 The Role of Brand Loyalty in Generating Positive Word of Mouth among Malaysian Hypermarket Customers
Authors: S. R. Nikhashemi, Laily Haj Paim, Ali Khatibi
Abstract:
Structural Equation Modeling (SEM) was used to test a hypothesized model explaining Malaysian hypermarket customers’ perceptions of brand trust (BT), customer perceived value (CPV) and perceived service quality (PSQ) on building their brand loyalty (CBL) and generating positive word-of-mouth communication (WOM). Self-administered questionnaires were used to collect data from 374 Malaysian hypermarket customers from Mydin, Tesco, Aeon Big and Giant in Kuala Lumpur, a metropolitan city of Malaysia. The data strongly supported the model exhibiting that BT, CPV and PSQ are prerequisite factors in building customer brand loyalty, while PSQ has the strongest effect on prediction of customer brand loyalty compared to other factors. Besides, the present study suggests the effect of the aforementioned factors via customer brand loyalty strongly contributes to generate positive word of mouth communication.Keywords: brand trust, perceived value, Perceived Service Quality, Brand loyalty, positive word of mouth communication
Procedia PDF Downloads 4823939 Lessons Learned from Ransomware-as-a-Service (RaaS) Organized Campaigns
Authors: Vitali Kremez
Abstract:
The researcher monitored an organized ransomware campaign in order to gain significant visibility into the tactics, techniques, and procedures employed by a campaign boss operating a ransomware scheme out of Russia. As the Russian hacking community lowered the access requirements for unsophisticated Russian cybercriminals to engage in ransomware campaigns, corporations and individuals face a commensurately greater challenge of effectively protecting their data and operations from being held ransom. This report discusses two notorious ransomware campaigns. Though the loss of data can be devastating, the findings demonstrate that sending ransom payments does not always help obtain data. Key learnings: 1. From the ransomware affiliate perspective, such campaigns have significantly lowered the barriers for entry for low-tier cybercriminals. 2. Ransomware revenue amounts are not as glamorous and fruitful as they are often publicly reported. Average ransomware crime bosses make only $90K per year on average. 3. Data gathered indicates that sending ransom payments does not always help obtain data. 4. The talk provides the complete payout structure and Bitcoin laundering operation related to the ransomware-as-a-service campaign.Keywords: bitcoin, cybercrime, ransomware, Russia
Procedia PDF Downloads 1953938 Neonatology Clinical Routine in Cats and Dogs: Cases, Main Conditions and Mortality
Authors: Maria L. G. Lourenço, Keylla H. N. P. Pereira, Viviane Y. Hibaru, Fabiana F. Souza, João C. P. Ferreira, Simone B. Chiacchio, Luiz H. A. Machado
Abstract:
The neonatal care of cats and dogs represents a challenge to veterinarians due to the small size of the newborns and their physiological particularities. In addition, many Veterinary Medicine colleges around the world do not include neonatology in the curriculum, which makes it less likely for the veterinarian to have basic knowledge regarding neonatal care and worsens the clinical care these patients receive. Therefore, lack of assistance and negligence have become frequent in the field, which contributes towards the high mortality rates. This study aims at describing cases and the main conditions pertaining to the neonatology clinical routine in cats and dogs, highlighting the importance of specialized care in this field of Veterinary Medicine. The study included 808 neonates admitted to the São Paulo State University (UNESP) Veterinary Hospital, Botucatu, São Paulo, Brazil, between January 2018 and November 2019. Of these, 87.3% (705/808) were dogs and 12.7% (103/808) were cats. Among the neonates admitted, 57.3% (463/808) came from emergency c-sections due to dystocia, 8.7% (71/808) cane from vaginal deliveries with obstetric maneuvers due to dystocia, and 34% (274/808) were admitted for clinical care due to neonatal conditions. Among the neonates that came from emergency c-sections and vaginal deliveries, 47.3% (253/534) was born in respiratory distress due to severe hypoxia or persistent apnea and required resuscitation procedure, such as the Jen Chung acupuncture point (VG26), oxygen therapy with mask, pulmonary expansion with resuscitator, heart massages and administration of emergency medication, such as epinephrine. On the other hand, in the neonatal clinical care, the main conditions and alterations observed in the newborns were omphalophlebitis, toxic milk syndrome, neonatal conjunctivitis, swimmer puppy syndrome, neonatal hemorrhagic syndrome, pneumonia, trauma, low weight at birth, prematurity, congenital malformations (cleft palate, cleft lip, hydrocephaly, anasarca, vascular anomalies in the heart, anal atresia, gastroschisis, omphalocele, among others), neonatal sepsis and other local and systemic bacterial infections, viral infections (feline respiratory complex, parvovirus, canine distemper, canine infectious traqueobronchitis), parasitical infections (Toxocara spp., Ancylostoma spp., Strongyloides spp., Cystoisospora spp., Babesia spp. and Giardia spp.) and fungal infections (dermatophytosis by Microsporum canis). The most common clinical presentation observed was the neonatal triad (hypothermia, hypoglycemia and dehydration), affecting 74.6% (603/808) of the patients. The mortality rate among the neonates was 10.5% (85/808). Being knowledgeable about neonatology is essential for veterinarians to provide adequate care for these patients in the clinical routine. Adding neonatology to college curriculums, improving the dissemination of information on the subject, and providing annual training in neonatology for veterinarians and employees are important to improve immediate care and reduce the mortality rates.Keywords: neonatal care, puppies, neonatal, conditions
Procedia PDF Downloads 228