Search results for: multi-criteria users’ preferences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3035

Search results for: multi-criteria users’ preferences

1175 Extending the Theory of Planned Behaviour to Predict Intention to Commute by Bicycle: Case Study of Mexico City

Authors: Magda Cepeda, Frances Hodgson, Ann Jopson

Abstract:

There are different barriers people face when choosing to cycle for commuting purposes. This study examined the role of psycho-social factors predicting the intention to cycle to commute in Mexico City. An extended version of the theory of planned behaviour was developed and utilized with a simple random sample of 401 road users. We applied exploratory and confirmatory factor analysis and after identifying five factors, a structural equation model was estimated to find the relationships among the variables. The results indicated that cycling attributes, attitudes to cycling, social comparison and social image and prestige were the most important factors influencing intention to cycle. Although the results from this study are specific to Mexico City, they indicate areas of interest to transportation planners in other regions especially in those cities where intention to cycle its linked to its perceived image and there is political ambition to instigate positive cycling cultures. Moreover, this study contributes to the current literature developing applications of the Theory of Planned Behaviour.

Keywords: cycling, latent variable model, perception, theory of planned behaviour

Procedia PDF Downloads 342
1174 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program

Authors: Ming Wen, Nasim Nezamoddini

Abstract:

Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.

Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM

Procedia PDF Downloads 101
1173 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 263
1172 Developing Cause-effect Model of Urban Resilience versus Flood in Karaj City using TOPSIS and Shannon Entropy Techniques

Authors: Mohammad Saber Eslamlou, Manouchehr Tabibian, Mahta Mirmoghtadaei

Abstract:

The history of urban development and the increasing complexities of urban life have long been intertwined with different natural and man-made disasters. Sometimes, these unpleasant events have destroyed the cities forever. The growth of the urban population and the increase of social and economic resources in the cities increased the importance of developing a holistic approach to dealing with unknown urban disasters. As a result, the interest in resilience has increased in most of the scientific fields, and the urban planning literature has been enriched with the studies of the social, economic, infrastructural, and physical abilities of the cities. In this regard, different conceptual frameworks and patterns have been developed focusing on dimensions of resilience and different kinds of disasters. As the most frequent and likely natural disaster in Iran is flooding, the present study aims to develop a cause-effect model of urban resilience against flood in Karaj City. In this theoretical study, desk research and documentary studies were used to find the elements and dimensions of urban resilience. In this regard, 6 dimensions and 32 elements were found for urban resilience and a questionnaire was made by considering the requirements of TOPSIS techniques (pairwise comparison). The sample of the research consisted of 10 participants who were faculty members, academicians, board members of research centers, managers of the Ministry of Road and Urban Development, board members of New Towns Development Company, experts, and practitioners of consulting companies who had scientific and research backgrounds. The gathered data in this survey were analyzed using TOPSIS and Shannon Entropy techniques. The results show that Infrastructure/Physical, Social, Organizational/ Institutional, Structural/Physical, Economic, and Environmental dimensions are the most effective factors in urban resilience against floods in Karaj, respectively. Finally, a comprehensive model and a systematic framework of factors that affect the urban resilience of Karaj against floods was developed. This cause – effect model shows how different factors are related and influence each other, based on their connected structure and preferences.

Keywords: urban resilience, TOPSIS, Shannon entropy, cause-effect model of resilience, flood

Procedia PDF Downloads 46
1171 Chatbots vs. Websites: A Comparative Analysis Measuring User Experience and Emotions in Mobile Commerce

Authors: Stephan Boehm, Julia Engel, Judith Eisser

Abstract:

During the last decade communication in the Internet transformed from a broadcast to a conversational model by supporting more interactive features, enabling user generated content and introducing social media networks. Another important trend with a significant impact on electronic commerce is a massive usage shift from desktop to mobile devices. However, a presentation of product- or service-related information accumulated on websites, micro pages or portals often remains the pivot and focal point of a customer journey. A more recent change of user behavior –especially in younger user groups and in Asia– is going along with the increasing adoption of messaging applications supporting almost real-time but asynchronous communication on mobile devices. Mobile apps of this type cannot only provide an alternative for traditional one-to-one communication on mobile devices like voice calls or short messaging service. Moreover, they can be used in mobile commerce as a new marketing and sales channel, e.g., for product promotions and direct marketing activities. This requires a new way of customer interaction compared to traditional mobile commerce activities and functionalities provided based on mobile web-sites. One option better aligned to the customer interaction in mes-saging apps are so-called chatbots. Chatbots are conversational programs or dialog systems simulating a text or voice based human interaction. They can be introduced in mobile messaging and social media apps by using rule- or artificial intelligence-based imple-mentations. In this context, a comparative analysis is conducted to examine the impact of using traditional websites or chatbots for promoting a product in an impulse purchase situation. The aim of this study is to measure the impact on the customers’ user experi-ence and emotions. The study is based on a random sample of about 60 smartphone users in the group of 20 to 30-year-olds. Participants are randomly assigned into two groups and participate in a traditional website or innovative chatbot based mobile com-merce scenario. The chatbot-based scenario is implemented by using a Wizard-of-Oz experimental approach for reasons of sim-plicity and to allow for more flexibility when simulating simple rule-based and more advanced artificial intelligence-based chatbot setups. A specific set of metrics is defined to measure and com-pare the user experience in both scenarios. It can be assumed, that users get more emotionally involved when interacting with a system simulating human communication behavior instead of browsing a mobile commerce website. For this reason, innovative face-tracking and analysis technology is used to derive feedback on the emotional status of the study participants while interacting with the website or the chatbot. This study is a work in progress. The results will provide first insights on the effects of chatbot usage on user experiences and emotions in mobile commerce environments. Based on the study findings basic requirements for a user-centered design and implementation of chatbot solutions for mobile com-merce can be derived. Moreover, first indications on situations where chatbots might be favorable in comparison to the usage of traditional website based mobile commerce can be identified.

Keywords: chatbots, emotions, mobile commerce, user experience, Wizard-of-Oz prototyping

Procedia PDF Downloads 447
1170 New Media and Deliberative Democracy in Malaysia

Authors: Rosyidah Muhamad

Abstract:

This article seeks to access the democratic implication of new media in Malaysia through three important key points of deliberative democracy; information access, rational critical deliberation and mechanism of vertical accountability. The article suggests that the Internet is expanding political opportunity in which contributed to a more diverse discourse. It is depending on how users used it; for democratic or non-democratic outcome. The Internet has been a key instrument in exposing human rights abuse, corruption, organizing protests and mobilizing voters during election campaigns. It therefore pushes for transparency and accountability and thus increasing the rise of deliberative democracy in Malaysia. While there are some elements of an emerging deliberative politics, it is also clear that the Malaysian online political discourse is acting as moderate forms of discourse as the sphere increasingly exist in a chaotic and diversified online discourse. Yet, the online sphere still allows citizens to discuss public affairs. When the public opinion is strong enough, it can influence public policies to ensure that they reflect the public interest. It is suggesting an increased space of negotiation and contestation among the previously muzzled offline situation. This is a big step in the progress democracy in Malaysia.

Keywords: Keywords: New Media, democratization, deliberative democracy, Malaysian politics

Procedia PDF Downloads 287
1169 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 270
1168 Energy Audit: A Case Study of a Hot Rolling Mill in Steel Industry

Authors: Arvind Dhingra, Tejinder Singh Saggu

Abstract:

As the energy demands rise and the pollution levels grow, it becomes imperative for us to save energy in all the fields in which it is used. The industrial sector is the major commercial energy consuming sector in India, where electrical energy is the most common and widely used type of energy. As the demand and price of energy are increasing day by day, therefore, the subject of energy conservation is a concern for most energy users particularly industry. Judicious use of energy becomes imperative for third world developing country being presence of energy crisis. This paper provides some measure for energy saving that can be commonly recommended for a rolling unit of steel industry. A case of hot rolling unit in JSL Stainless Ltd., Hisar for energy conservation is given. Overall improvement in energy consumption in light of the stated recommendation is illustrated along with the proposed utilization of the techniques and their applications. Energy conservation in conventional motor with replacement or use of star delta star converter, reduction in cable losses, replacement of filament of LED lamps, replacement of conventional transformer with cast resin dry type transformer and provision of energy management system for energy conservation and per unit production cost reduction are elaborated in this paper.

Keywords: energy audit, energy conservation, energy efficient motors

Procedia PDF Downloads 515
1167 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 464
1166 Designing Cultural-Creative Products with the Six Categories of Hanzi (Chinese Character Classification)

Authors: Pei-Jun Xue, Ming-Yu Hsiao

Abstract:

Chinese characters, or hanzi, represent a process of simplifying three-dimensional signs into plane signifiers. From pictograms at the beginning to logograms today, a Han linguist thus classified them into six categories known as the six categories of Chinese characters. Design is a process of signification, and cultural-creative design is a process translating ideas into design with creativity upon culture. Aiming to investigate the process of cultural-creative design transforming cultural text into cultural signs, this study analyzed existing cultural-creative products with the six categories of Chinese characters by treating such products as representations which accurately communicate the designer’s ideas to users through the categorization, simplification, and interpretation of sign features. This is a two-phase pilot study on designing cultural-creative products with the six categories of Chinese characters. Phase I reviews the related literature on the theory of the six categories of Chinese characters investigated and concludes with the process and principles of character evolution. Phase II analyzes the design of existing cultural-creative products with the six categories of Chinese characters and explores the conceptualization of product design.

Keywords: six categories of Chinese characters, cultural-creative product design, cultural signs, cultural product

Procedia PDF Downloads 327
1165 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 351
1164 Impact of Cultural Intelligence on Decision Making Styles of Managers: A Turkish Case

Authors: Fusun Akdag

Abstract:

Today, as business becomes increasingly global, managers/leaders of multinational companies or local companies work with employees or customers from a variety of cultural backgrounds. To do this effectively, they need to develop cultural competence. Therefore, cultural intelligence (CQ) becomes a vitally important aptitude and skill, especially for leaders. The organizational success or failure depends upon the way, the kind of leadership which has been provided to its members. The culture we are born into deeply effects our values, beliefs, and behavior. Cultural intelligence (CQ) focuses on how well individuals can relate and work across cultures. CQ helps minimize conflict and maximize performance of a diverse workforce. The term 'decision,' refers to a commitment to a course of action that is intended to serve the interests and values of particular people. One dimension of culture that has received attention is individualism-collectivism or, independence-interdependence. These dimensions are associated with different conceptualizations of the 'self.' Individualistic cultures tend to value personal goal pursuit as opposed to pursuit of others’ goals. Collectivistic cultures, by contrast, view the 'self' as part of a whole. Each person is expected to work with his or her in-group toward goals, generally pursue group harmony. These differences underlie cross-cultural variation in decision-making, such as the decision modes people use, their preferences, negotiation styles, creativity, and more. The aim of this study is determining the effect of CQ on decision making styles of male and female managers in Turkey, an emergent economy framework. The survey is distributed to gather data from managers at various companies. The questionnaire consists of three parts: demographics, The Cultural Intelligence Scale (CQS) to measure the four dimensions of cultural intelligence and General Decision Making Style (GMDS) Inventory to measure the five subscales of decision making. The results will indicate the Turkish managers’ score at metacognitive, cognitive, motivational and behavioral aspects of cultural intelligence and to what extent these scores affect their rational, avoidant, dependent, intuitive and spontaneous decision making styles since business leaders make dozens of decisions every day that influence the success of the company and also having an impact on employees, customers, shareholders and the market.

Keywords: cultural intelligence, decision making, gender differences, management styles,

Procedia PDF Downloads 362
1163 State Budget Accounting: Factors Affected and Basic Orientation to Vietnamese Public Sector Entities

Authors: Pham Quang Huy

Abstract:

State budget is considered as an effective tool for controlling, adjusting and regulating the market economy of any countries. To ensure that the activities of the state in the fields of politics, economy and society has been efficiency, it requires major sources of certain budget. These financial funds are formed from tax revenues and tax revenues beyond. Therefore, the Governments need to have an accounting regime to manage the receipt, expenditure which are suitable for recording a full range of items. From that, it can help to increase the transparency and accountability in budget system. One of the main requirements in Vietnamese policies is to improve that accounting system of revenues and expenditures which can provide many reports to meet the information required of government and users, as well as directions to the trends of international standards requirements. By using quantitative research methods and analytical models to exploring factors, the main purpose of this article is to identify the factors affecting budget accounting and providing some direction for Vietnamese public sector in the future. The results indicated that Vietnam budget accounting has been impacted by seven factors and aims to implement three main orientations in the public sector units.

Keywords: state budget, accounting, IPSAS, budget management, government, public sector

Procedia PDF Downloads 259
1162 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 79
1161 Impact of the Pandemic on China's Digital Creative Industries: Mechanisms and Manifestations

Authors: Li Qiaoming

Abstract:

The outbreak of Coronavirus disease 2019 (COVID-19) in early 2020 brought new opportunities to the development of the digital creative industry in China. Based on the realistic foundation of the development of the digital creative industry in China, an analysis was conducted on the mechanism of action of the pandemic on this industry from both sides of supply and demand by sorting out its concept, connotation, and related theories. To be specific, the demand side experienced changes due to the changes in the consumption habits of residents, the sharp increase in gross domestic time (GDT), the satisfaction of the psychological needs of users, search for substitutes for offline consumption, and other factors. An analysis was carried out on the mechanism of action of the pandemic on the digital creative industry from the production link, supply subjects, product characteristics, and transmission link of the supply side. Then, a detailed discussion was held on the manifestation forms of the impact of the pandemic from the dimensions of time and space. Finally, this paper discussed the main development focuses of the digital creative industry in the post-pandemic era from the aspects of the government, industries, and enterprises.

Keywords: COVID-19, demand and supply relationship, digital creative industries, industry shocks

Procedia PDF Downloads 142
1160 English Learning Speech Assistant Speak Application in Artificial Intelligence

Authors: Albatool Al Abdulwahid, Bayan Shakally, Mariam Mohamed, Wed Almokri

Abstract:

Artificial intelligence has infiltrated every part of our life and every field we can think of. With technical developments, artificial intelligence applications are becoming more prevalent. We chose ELSA speak because it is a magnificent example of Artificial intelligent applications, ELSA speak is a smartphone application that is free to download on both IOS and Android smartphones. ELSA speak utilizes artificial intelligence to help non-native English speakers pronounce words and phrases similar to a native speaker, as well as enhance their English skills. It employs speech-recognition technology that aids the application to excel the pronunciation of its users. This remarkable feature distinguishes ELSA from other voice recognition algorithms and increase the efficiency of the application. This study focused on evaluating ELSA speak application, by testing the degree of effectiveness based on survey questions. The results of the questionnaire were variable. The generality of the participants strongly agreed that ELSA has helped them enhance their pronunciation skills. However, a few participants were unconfident about the application’s ability to assist them in their learning journey.

Keywords: ELSA speak application, artificial intelligence, speech-recognition technology, language learning, english pronunciation

Procedia PDF Downloads 95
1159 Analysis of the Diffusion Behavior of an Information and Communication Technology Platform for City Logistics

Authors: Giulio Mangano, Alberto De Marco, Giovanni Zenezini

Abstract:

The concept of City Logistics (CL) has emerged to improve the impacts of last mile freight distribution in urban areas. In this paper, a System Dynamics (SD) model exploring the dynamics of the diffusion of a ICT platform for CL management across different populations is proposed. For the development of the model two sources have been used. On the one hand, the major diffusion variables and feedback loops are derived from a literature review of existing diffusion models. On the other hand, the parameters are represented by the value propositions delivered by the platform as a response to some of the users’ needs. To extract the most important value propositions the Business Model Canvas approach has been used. Such approach in fact focuses on understanding how a company can create value for her target customers. These variables and parameters are thus translated into a SD diffusion model with three different populations namely municipalities, logistics service providers, and own account carriers. Results show that, the three populations under analysis fully adopt the platform within the simulation time frame, highlighting a strong demand by different stakeholders for CL projects aiming at carrying out more efficient urban logistics operations.

Keywords: city logistics, simulation, system dynamics, business model

Procedia PDF Downloads 259
1158 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 369
1157 Assessment of Naturally Occurring Radionuclides of the Surface Water in Vaal River, South Africa

Authors: Kgantsi B. T., Ochwelwang A. R., Mathuthu M., Jegede O. A.

Abstract:

Anthropogenic activities near water bodies contribute to poor water quality, which degrades the condition of the biota and elevates the risk to human health. The Vaal River is essential in supplying Gauteng and neighboring regions of South Africa with portable water for a variety of consumers and industries. Consequently, it is necessary to monitor and assess the radioactive risk in relation to the river's water quality. This study used an inductive coupled plasma mass spectrometer (ICPMS) to analyze the radionuclide activity concentration in the Vaal River, South Africa. Along with thorium and potassium, the total uranium concentration was calculated using the isotopic content of uranium. The elemental concentration of ²³⁸U, ²³⁵U, ²³⁴U, ²³²Th, and 40K were translated into activity concentrations. To assess the water safety for all users and consumers, all values were compared to world average activity concentrations 35, 30, and 400 Bqkg⁻¹ for ²³⁸U, ²³⁴Th, and ⁴⁰K, respectively, according to the UNSCEAR report. The results will serve as a database for further monitoring and evaluation of the radionuclide from the river, taking cognisance of potential health hazards.

Keywords: Val Rivers, ICPMS, uranium, risks

Procedia PDF Downloads 154
1156 An Efficient Architecture for Dynamic Customization and Provisioning of Virtual Appliance in Cloud Environment

Authors: Rajendar Kandan, Mohammad Zakaria Alli, Hong Ong

Abstract:

Cloud computing is a business model which provides an easier management of computing resources. Cloud users can request virtual machine and install additional softwares and configure them if needed. However, user can also request virtual appliance which provides a better solution to deploy application in much faster time, as it is ready-built image of operating system with necessary softwares installed and configured. Large numbers of virtual appliances are available in different image format. User can download available appliances from public marketplace and start using it. However, information published about the virtual appliance differs from each providers leading to the difficulty in choosing required virtual appliance as it is composed of specific OS with standard software version. However, even if user choses the appliance from respective providers, user doesn’t have any flexibility to choose their own set of softwares with required OS and application. In this paper, we propose a referenced architecture for dynamically customizing virtual appliance and provision them in an easier manner. We also add our experience in integrating our proposed architecture with public marketplace and Mi-Cloud, a cloud management software.

Keywords: cloud computing, marketplace, virtualization, virtual appliance

Procedia PDF Downloads 276
1155 Zooming into the Leadership Behaviours Desired by the 21st Century Workforce: Introduction of the Research Theory and Methods

Authors: Anita Bela, Marta Juhasz

Abstract:

Adapting to the always-changing environment comes with complex determinants. The authors are zooming into one aspect only when the current workforce comes with obstacles by being less keen to stay engaged, even short or mid-term, resulting in additional challenges impacting the business performance. Seeing these occurring in practice made the researchers eager to gain a better understanding of the reasons behind. The paper aims to provide an overview of the theoretical background and research methods planned for the different stages of the research. The theoretical part takes the leadership behaviors under lens while the focus is on finding ways to attract and retain those who prefer working under more flexible employment conditions (e.g. contractor, contingent worker, etc.). These are considered as the organizational values and along with the power of people management are having their engaging relevance. The organizational culture (visible or invisible level) is clearly the mirror of the set of shared values guiding all members of the companies towards acceptable behavior. The applied research method, inductive reasoning was selected since the focus and questions raised in this research are results of specific observations made on the employees (various employment types) and leaders of start-ups and corporates. By comparing the similarities and differences, the researchers are hoping to prove the readiness and agility of the start-up culture for the desired leadership behaviours of the current and future workforce against the corporate culture. While exploring the preferences and engaging factors of the 21st-century workforce the data gathering would happen through website analysis – using ATLAS.ti qualitative software – followed by interview sessions where demographics will be collected and preferred leadership behaviors - using the Critical Incident Technique. Moreover, a short engagement survey will be administered to understand the linkage between the organizational culture type and engagement level. To conclude, after gaining theoretical understanding, we will zoom back to the employees to reveal the behaviors to be followed to achieve engagement in an environment where nothing is stable and where the companies always must keep their agile eyes and reactions vivid.

Keywords: leadership behaviours, organizational culture, qualitative analysis, workforce engagement

Procedia PDF Downloads 103
1154 Perception of Value Affecting Engagement Through Online Audio Communication

Authors: Apipol Penkitti

Abstract:

The new normal or a new way of life stemmed from the COVID-19 outbreak, gave rise to a new form of social media: audio-based social platforms (ABSPs), known as Clubhouse, Twitter space, and Facebook live audio room. These platforms, on which audio-based communication is featured, became popular in a short span of time. The objective of the research study is to understand ABSPs users’ behaviors in Thailand. The study, in which functional attitude theory, uses and gratifications theory, and social influence theory are referred to, is conducted through consumer perceived utilitarian, hedonic, and social value that affect engagement. This research study is mixed method paradigm, utilizing Model of Triangulation as its framework. The data acquisition is proceeded through questionnaires from a sample of 384 male, female and LGBTQA+ individuals aged 25 - 34 who, from various occupations, have used audio-based social platform applications. This research study employs the structural equation modeling to analyze the relationships between variables, and it uses the semi - structured interviewing to comprehend the rationality of the variables in the study. The study found that hedonic value directly affects engagement.

Keywords: audio based social platform, engagement, hedonic, perceived value, social, utilitarian

Procedia PDF Downloads 115
1153 Methotrexate Associated Skin Cancer: A Signal Review of Pharmacovigilance Center

Authors: Abdulaziz Alakeel, Abdulrahman Alomair, Mohammed Fouda

Abstract:

Introduction: Methotrexate (MTX) is an antimetabolite used to treat multiple conditions, including neoplastic diseases, severe psoriasis, and rheumatoid arthritis. Skin cancer is the out-of-control growth of abnormal cells in the epidermis, the outermost skin layer, caused by unrepaired DNA damage that triggers mutations. These mutations lead the skin cells to multiply rapidly and form malignant tumors. The aim of this review is to evaluate the risk of skin cancer associated with the use of methotrexate and to suggest regulatory recommendations if required. Methodology: Signal Detection team at Saudi Food and Drug Authority (SFDA) performed a safety review using National Pharmacovigilance Center (NPC) database as well as the World Health Organization (WHO) VigiBase, alongside with literature screening to retrieve related information for assessing the causality between skin cancer and methotrexate. The search conducted in July 2020. Results: Four published articles support the association seen while searching in literature, a recent randomized control trial published in 2020 revealed a statistically significant increase in skin cancer among MTX users. Another study mentioned methotrexate increases the risk of non-melanoma skin cancer when used in combination with immunosuppressant and biologic agents. In addition, the incidence of melanoma for methotrexate users was 3-fold more than the general population in a cohort study of rheumatoid arthritis patients. The last article estimated the risk of cutaneous malignant melanoma (CMM) in a cohort study shows a statistically significant risk increase for CMM was observed in MTX exposed patients. The WHO database (VigiBase) searched for individual case safety reports (ICSRs) reported for “Skin Cancer” and 'Methotrexate' use, which yielded 121 ICSRs. The initial review revealed that 106 cases are insufficiently documented for proper medical assessment. However, the remaining fifteen cases have extensively evaluated by applying the WHO criteria of causality assessment. As a result, 30 percent of the cases showed that MTX could possibly cause skin cancer; five cases provide unlikely association and five un-assessable cases due to lack of information. The Saudi NPC database searched to retrieve any reported cases for the combined terms methotrexate/skin cancer; however, no local cases reported up to date. The data mining of the observed and the expected reporting rate for drug/adverse drug reaction pair is estimated using information component (IC), a tool developed by the WHO Uppsala Monitoring Centre to measure the reporting ratio. Positive IC reflects higher statistical association, while negative values translated as a less statistical association, considering the null value equal to zero. Results showed that a combination of 'Methotrexate' and 'Skin cancer' observed more than expected when compared to other medications in the WHO database (IC value is 1.2). Conclusion: The weighted cumulative pieces of evidence identified from global cases, data mining, and published literature are sufficient to support a causal association between the risk of skin cancer and methotrexate. Therefore, health care professionals should be aware of this possible risk and may consider monitoring any signs or symptoms of skin cancer in patients treated with methotrexate.

Keywords: methotrexate, skin cancer, signal detection, pharmacovigilance

Procedia PDF Downloads 106
1152 Probability Model Accidents of Motorcyclist Based on Driver's Personality

Authors: Margareth E. Bolla, Ludfi Djakfar, Achmad Wicaksono

Abstract:

The increase in the number of motorcycle users in Indonesia is in line with the increase in accidents involving motorcycles. Several previous studies have shown that humans are the biggest factor causing accidents, and the driver's personality factor will affect his behavior on the road. This study was conducted to see how a person's personality traits will affect the probability of having an accident while driving. The Big Five Inventory (BFI) questionnaire and the Honda Riding Trainer (HRT) simulator were used as measuring tools, while the analysis carried out was logistic regression analysis. The results of the descriptive analysis of the respondent's personality based on the BFI show that the majority of drivers have the dominant character of neuroticism (34%), while the smallest group is the driver with the dominant type of openness character (6%). The percentage of motorists who were not involved in an accident was 54%. The results of the logistic regression analysis form a mathematical model as follows Y = -3.852 - 0.288 X1 + 0.596 X2 + 0.429 X3 - 0.386 X4 - 0.094 X5 + 0.436 X6 + 0.162 X7, where the results of hypothesis testing indicate that the variables openness, conscientiousness, extraversion, agreeableness, neuroticism, history of traffic accidents and age at starting driving did not have a significant effect on the probability of a motorcyclist being involved in an accident.

Keywords: accidents, BFI, probability, simulator

Procedia PDF Downloads 138
1151 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE

Authors: Emad Bataineh, Sara Al-Mutawa

Abstract:

The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.

Keywords: e-government portal, e-service, usability, TAM model

Procedia PDF Downloads 418
1150 The Clash Between Sexual Choices and Socio-Culturo-Religious Morality in Ghana: Public Perceptions on the Impact of Anti-LGBTQIs Activities on Communal Peace

Authors: George Hikah Benson

Abstract:

The promotion of lesbian, gay, bisexual, transgender, queer and Intersex (LGBTQIs) rights within the continent of Africa in general and Ghana, in particular, has for some time now, met the fiercest of resistance; premised mainly on socio-cultural-religious factors. This phenomenon contrasts with notions of countries of the Global North where persons within the context of their fundamental freedoms and rights have the right to sexual choices and preferences. A Private Member’s Bill was introduced to the Ghanaian Parliament in 2021, seeking to criminalize the promotion and advocacy of LGBTQIs related activities. This paper in assessing public views on the matter also seeks to ascertain the security implications regarding the passage of the law at the community level. The study also evaluates LGBTQIs rights vis-a-vis the provisions of Chapter 5 of the 1992 Ghana Constitution and global legal jurisprudence on fundamental human rights. To that end, the study adopted a mixed design approach (quantitative and qualitative) to gather data from 1,550 respondents from all ‘walks of life, across all sixteen regions of Ghana. The main findings are that first, over 85% of Ghanaians abhor the practices of LGBTQIs in keeping with the societal, cultural and religious beliefs of Ghanaians, and will go any length to prevent its survival in the country. Further, the time is not ripe for the acceptance of LGBTQ rights in Ghana as the activities will disrupt family values and poison the existing peace that Ghanaians are currently enjoying. However, it is generally believed that when the bill is passed into law, Ghana’s international image will be dented, and 60% of participants and respondents will be unmoved. Against this hostile, intolerant backdrop regarding LGBTQIs rights in the country and in many other African countries, the study foremost recommends that such a law, when passed, should come with a ‘human face’ that will not just seek to be punitive of LGBTQIs persons but corrective. Additionally, the law should be one that offers them support in line with their rights as Ghanaian and African citizens. Moreover, religious and traditional bodies should endeavor to engage LGBTQIs persons in a friendlier, corrective and loving manner rather than in the current hostile environment that society exposes them to.

Keywords: Ghanaian parliament, LGBTQIs rights, perceptions, socio-culture-religious

Procedia PDF Downloads 80
1149 The Effect of a Computer-Assisted Glycemic Surveillance Protocol on Nursing Workload

Authors: Özlem Canbolat, Sevgisun Kapucu

Abstract:

The aim of this study was to determine the effect of a computer-assisted glycemic surveillance protocol on nursing workload in intensive care unit. The study is completed in an Education and Research Hospital in Ankara with the attendance of volunteered 19 nurse who had been worked in reanimation unit. Nurses used the written protocol and computer-assisted glycemic surveillance protocol for glycemic follow-up approach of the intensive care patients. Nurses used the written protocol first in the glycemic follow-up of the patient, then used the computer-assisted protocol. (Nurses used the written protocol first, then the computer-assisted protocol in the glycemic follow-up of the patient). Less time was spent in glycemic control with computerized protocol than written protocol and this difference is statistically significant (p < 0.001). It was determined that the computerized protocol application was completed in about 10 seconds (25% shorter) than the written protocol implementation. The computer-assisted glycemic surveillance protocol was found to be more easy and appropriate by nurses and the satisfaction level of the users was higher than with written protocol. While 79% of the nurses find it confusing to implement the written protocol, 79% were satisfied with the use of computerized protocol.

Keywords: computer-assisted protocol, glycemic control, insulin infusion protocol, intensive care, nursing workload

Procedia PDF Downloads 213
1148 Analysis of Methodological Issues in the Study of Digital Library Services: A Case Study of Nigeria University Systems

Authors: Abdulmumin Isah

Abstract:

Over the years, researchers have employed different approaches in the study of usage of library services in the traditional library system, such approaches have provided explanations on the users’ perception, attitude, and usage of library services. Findings of such studies which often employed survey research approach have guided librarians and library stakeholders in their drive to improve library services to patrons. However, with the advent of digital library services, librarians and information science researchers have been experiencing methodological issues in the study of digital library services. While some quantitative approaches have been employed to understand adoption and usage of digital library services, conflicting results from such studies have increased the need to employ qualitative approaches. The appropriateness of the qualitative approaches has also been questioned. This study intends to review methodological approaches in the studies of digital libraries and provides a framework for the selection of appropriate research approach for the study of digital libraries using Nigerian university systems as case study.

Keywords: digital library, university library, methodological issues, research approaches, quantitative, qualitative, Nigeria

Procedia PDF Downloads 498
1147 Exploring the Meaning of Safety in Acute Mental Health Inpatient Units from the Consumer Perspective

Authors: Natalie Cutler, Lorna Moxham, Moira Stephens

Abstract:

Safety is a priority in mental health services, and no more so than in the acute inpatient setting. Mental health service policies and accreditation frameworks commonly approach safety from a risk reduction or elimination perspective leading to service approaches that are arguably more focused on risk than on safety. An exploration what safety means for people who have experienced admission to an acute mental health inpatient unit is currently under way in Sydney, Australia. Using a phenomenographic research approach, this study is seeking to understand the meaning of safety from the perspective of people who use, rather than those who deliver mental health services. Preliminary findings suggest that the meanings of safety for users of mental health services vary from the meanings inherent in the policies and frameworks that inform how mental health services and mental health practice are delivered. This variance has implications for the physical and environmental design of acute mental health inpatient facilities, the policies and practices, and the education and training of mental health staff in particular nurses, who comprise the majority of the mental health workforce. These variances will be presented, along with their implications for the way quality and safety in mental health services are evaluated.

Keywords: acute inpatient, mental health, nursing, phenomenography, recovery, safety

Procedia PDF Downloads 218
1146 A Review on Future Safety Conditions and Requirements for E-Bikes

Authors: Jonas Palmer, Leon Brüning, Lukas Himmelsbach

Abstract:

The worldwide ambitions to transform the transportation sector are increasingly affecting the safety conditions for all traffic participants and the required infrastructure. To contribute to the transformation and for health aspects, individuals search for carbon-free alternatives that include physical excitation. Especially e-bikes experience a growing demand within the last few years and consequently change the safety requirements. E-cyclists are exposed to amplified risks due to higher velocity in comparison to classic cyclists. Furthermore, cyclists suffer from a lack of infrastructure, rider assistance systems as well as awareness of other road users. For minimizing the risk of accidents, it is crucial to identify, develop and implement safety measures for cyclists. The paper aims to contribute to future research with delivering an overview of the latest publications and to subsequently identify essential research gaps. Therefore, it is essential to analyze the areas of technical adjustments as well as legal aspects and the correlation of both. The review`s insights can intensify the awareness of safety issues related to e-bikes and promote the development and implementation of appropriate measures.

Keywords: e-bike safety measures, future mobility, risk management, road safety

Procedia PDF Downloads 104