Search results for: library personnel
1111 Spectrum Assignment Algorithms in Optical Networks with Protection
Authors: Qusay Alghazali, Tibor Cinkler, Abdulhalim Fayad
Abstract:
In modern optical networks, the flex grid spectrum usage is most widespread, where higher bit rate streams get larger spectrum slices while lower bit rate traffic streams get smaller spectrum slices. To our practice, under the ITU-T recommendation, G.694.1, spectrum slices of 50, 75, and 100 GHz are being used with central frequency at 193.1 THz. However, when these spectrum slices are not sufficient, multiple spectrum slices can use either one next to another or anywhere in the optical wavelength. In this paper, we propose the analysis of the wavelength assignment problem. We compare different algorithms for this spectrum assignment with and without protection. As a reference for comparisons, we concluded that the Integer Linear Programming (ILP) provides the global optimum for all cases. The most scalable algorithm is the greedy one, which yields results in subsequent ranges even for more significant network instances. The algorithms’ benchmark implemented using the LEMON C++ optimization library and simulation runs based on a minimum number of spectrum slices assigned to lightpaths and their execution time.Keywords: spectrum assignment, integer linear programming, greedy algorithm, international telecommunication union, library for efficient modeling and optimization in networks
Procedia PDF Downloads 1701110 From Achilles to Chris Kyle-Militarized Masculinity and Hollywood in the Post-9/11 Era
Authors: Mary M. Park
Abstract:
Hollywood has had a long and enduring history of showcasing the United States military to civilian audiences, and the portrayals of soldiers in films have had a definite impact on the civilian perception of the US military. The growing gap between the civilian population and the military in the US has led to certain stereotypes of military personnel to proliferate, especially in the area of militarized masculinity, which has often been harmful to the psychological and spiritual wellbeing of military personnel. Examining Hollywood's portrayal of soldiers can serve to enhance our understanding of how civilians may be influenced in their perception of military personnel. Moreover, it can provide clues as to how male military personnel may also be influenced by Hollywood films as they form their own military identity. The post 9/11 era has seen numerous high budget films lionizing a particular type of soldier, the 'warrior-hero', who adheres to a traditional form of hegemonic masculinity and exhibits traits such as physical strength, bravery, stoicism, and an eagerness to fight. This paper examines how the portrayal of the 'warrior-hero' perpetuates a negative stereotype that soldiers are a blend of superheroes and emotionless robots and, therefore, inherently different from civilians. This paper examines the portrayal of militarized masculinity in three of the most successful war films of the post-9/11 era; Black Hawk Down (2001), The Hurt Locker (2008), and American Sniper (2014). The characters and experiences of the soldiers depicted in these films are contrasted with the lived experiences of soldiers during the Iraq and Afghanistan wars. Further, there is an analysis of popular films depicting ancient warriors, such as Troy (2004) and 300 (2007), which were released during the early years of the War on Terror. This paper draws on the concept of hegemonic militarised masculinity by leading scholars and feminist international relations theories on militarized masculinity. This paper uses veteran testimonies collected from a range of public sources, as well as previous studies on the link between traditional masculinity and war-related mental illness. This paper concludes that the seemingly exclusive portrayal of soldiers as 'warrior-heroes' in films in the post-9/11 era is misleading and damaging to civil-military relations and that the reality of the majority of soldiers' experiences is neglected in Hollywood films. As civilians often believe they are being shown true depictions of the US military in Hollywood films, especially in films that portray real events, it is important to find the differences between the idealized fictional 'warrior-heroes' and the reality of the soldiers on the ground in the War on Terror.Keywords: civil-military relations, gender studies, militarized masculinity, social pyschology
Procedia PDF Downloads 1261109 Relation between Organizational Climate and Personnel Performance Assessment in a Tourist Service Company
Authors: Daniel A. Montoya, Marta L. Tostes
Abstract:
This investigation aims at analyzing and determining the relation between two very important variables in the human resource management: The organizational climate and the performance assessment. This study aims at contributing with knowledge in the search of the relation between the mentioned variables because the literature still does not provide solid evidence to this respect and the cases revised are incipient to reach conclusions enabling a typology about this relation.To this regard, a correlational and cross-sectional perspective was adopted in which quantitative and qualitative techniques were chosen with the total of the workers of the tourist service company PTS Peru. In order to measure the organizational climate, the OCQ (Organization Climate Questionnaire) from was used; it has 50 items and measures 9 dimensions of the Organizational Climate. Also, to assess performance, a questionnaire with 21 items and 6 dimensions was designed. As a means of assessment, a focus group was prepared and was applied to a worker in every area of the company. Additionally, interviews to human resources experts were conducted. The results of the investigation show a clear relation between the organizational climate and the personnel performance assessment as well as a relation between the nine dimensions of the organizational climate and the work performance in general and with some of its dimensions.Keywords: job performance, job satisfaction, organization climate, performance assessment
Procedia PDF Downloads 3841108 Application of IED to Condition Based Maintenance of Medium Voltage GCB/VCB
Authors: Ming-Ta Yang, Jyh-Cherng Gu, Chun-Wei Huang, Jin-Lung Guan
Abstract:
Time base maintenance (TBM) is conventionally applied by the power utilities to maintain circuit breakers (CBs), transformers, bus bars and cables, which may result in under maintenance or over maintenance. As information and communication technology (ICT) industry develops, the maintenance policies of many power utilities have gradually changed from TBM to condition base maintenance (CBM) to improve system operating efficiency, operation cost and power supply reliability. This paper discusses the feasibility of using intelligent electronic devices (IEDs) to construct a CB CBM management platform. CBs in power substations can be monitored using IEDs with additional logic configuration and wire connections. The CB monitoring data can be sent through intranet to a control center and be analyzed and integrated by the Elipse Power Studio software. Finally, a human-machine interface (HMI) of supervisory control and data acquisition (SCADA) system can be designed to construct a CBM management platform to provide maintenance decision information for the maintenance personnel, management personnel and CB manufacturers.Keywords: circuit breaker, condition base maintenance, intelligent electronic device, time base maintenance, SCADA
Procedia PDF Downloads 3301107 Personnel Training of Automotive Manufacturers in Virtual Reality
Authors: Mirza Ahsan Baig, Paul Evans
Abstract:
Due to the high demand for automobiles, manufacturers have to run their production lines non-stop for long periods. At such a scale, unplanned downtime could cost up to $50 billion annually. Improper training of new hires could lead to safety issues causing unplanned downtimes. The project developed a virtual reality simulation that could train personnel for key operations on an automobile manufacturing floor, reducing the risk of unplanned downtime while eliminating any disruption (due to training) on the assembly line. An automation firm sponsored it to explore the possibilities the likes of Jaguar and BMW are yet to achieve! The project was inspired by Bentley, the only company that succeeded in simulation training scenarios within virtual space. The project aims to inspire other significant firms to do the same. It was increasing employee safety, eliminating downtimes, and improving efficiency. The developed prototype uncovered various limitations within existing simulation providers and was able to simulate state-of-the-art training scenarios. It also explored the possibility of a multiuser interface and resolved complex issues such as lack of movement space within the training area.Keywords: virtual reality, scenario training, limited movement, multiuser
Procedia PDF Downloads 871106 A Study on the Current State and Policy Implications of Engineer Operated National Research Facility and Equipment in Korea
Authors: Chang-Yong Kim, Dong-Woo Kim, Whon-Hyun Lee, Yong-Joo Kim, Tae-Won Chung, Kyung-Mi Lee, Han-Sol Kim, Eun-Joo Lee, Euh Duck Jeong
Abstract:
In the past, together with the annual increase in investment on national R&D projects, the government’s budget investment in FE has steadily maintained. In the case of major developed countries, R&D and its supporting works are distinguished and professionalized in their own right, in so far as having a training system for facilities, equipment operation, and maintenance personnel. In Korea, however, research personnel conduct both research and equipment operation, leading to quantitative shortages of operational manpower and qualitative problems due to insecure employment such as maintenance issues or the loss of effectiveness of necessary equipment. Therefore, the purpose of this study was to identify the current status of engineer operated national research FE in Korea based on a 2017 survey results of domestic facilities and to suggest policy implications. A total of 395 research institutes that carried out national R&D projects and registered more than two FE since 2005 were surveyed on-line for two months. The survey showed that 395 non-profit research facilities were operating 45,155 pieces of equipment with 2,211 engineer operated national research FE, meaning that each engineer had to manage 21 items of FE. Among these, 43.9% of the workers were employed in temporary positions, including indefinite term contracts. Furthermore, the salary and treatment of the engineer personnel were relatively low compared to researchers. In short, engineers who exclusively focused on managing and maintaining FE play a very important role in increasing research immersion and obtaining highly reliable research results. Moreover, institutional efforts and government support for securing operators are severely lacking as domestic national R&D policies are mostly focused on researchers. The 2017 survey on FE also showed that 48.1% of all research facilities did not even employ engineers. In order to solve the shortage of the engineer personnel, the government will start the pilot project in 2012, and then only the 'research equipment engineer training project' from 2013. Considering the above, a national long-term manpower training plan that addresses the quantitative and qualitative shortage of operators needs to be established through a study of the current situation. In conclusion, the findings indicate that this should not only include a plan which connects training to employment but also measures the creation of additional jobs by re-defining and re-establishing operator roles and improving working conditions.Keywords: engineer, Korea, maintenance, operation, research facilities and equipment
Procedia PDF Downloads 1911105 Research Development on the Role of Libraries and Librarians during COVID-19: A Scientometric Study
Authors: Saeed Ullah Jan, Muhammad Zahid
Abstract:
Purpose of study: The main theme of this study is to scrutinize and evaluate the available research on “role of libraries and librarians during COVID-19”. Design/Methodology/Approach: The quantitative research tool Bibliometric was used for the analysis of collected data. All the retrieved articles have been analyzed through MS office, MS Excel. Findings: It was depicted that 48 papers were published in 2021. The researchers from international countries have been published 45 and Pakistani researchers published only3 research papers on the subject cited above. Delimitations of the study: This study is delimited to the research articles published on the role of libraries and librarians during COVID-19. Practical implications: The findings of this study will be guideline for policy makers, higher ups and authorities of various facets of the libraries to revisit their priorities and work for the betterment of effective library culture in the country. Contribution to the knowledge: To the best of author's knowledge, no significant study has been done on this important topic of Library and Information Science research in Pakistan. This study will. add valuable literature the available literary world related to research development on the role of libraries and librarians during COVID-19.Keywords: role of libraries, COVID-19, libraries, librarians, Pakistan
Procedia PDF Downloads 1071104 Library on the Cloud: Universalizing Libraries Based on Virtual Space
Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan
Abstract:
Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access
Procedia PDF Downloads 6631103 The Integration and Automation of EDA Tools in an Integrated Circuit Design Environment
Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Rozaimah Baharim, M. Hanif M. Nasir
Abstract:
This paper will discuss how EDA tools are integrated and automated in an Integrated Circuit Design Environment. Some of the problems face in our current environment is that users need to configure manually on the library paths, start-up files and project directories. Certain manual processes that happen between the users and applications can be automated but they must be transparent to the users. For example, the users can run the applications directly after login without knowing the library paths and start-up files locations. The solution to these problems is to automate the processes using standard configuration files which will benefit the users and EDA support. This paper will discuss how the implementation is done to automate the process using scripting languages such as Perl, Tcl, Scheme and Shell Script. These scripting tools are great assets for design engineers to build a robust and powerful design flow and this technique is widely used to integrate all the tools together.Keywords: EDA tools, Integrated Circuits, scripting, integration, automation
Procedia PDF Downloads 3251102 Non-Local Simultaneous Sparse Unmixing for Hyperspectral Data
Authors: Fanqiang Kong, Chending Bian
Abstract:
Sparse unmixing is a promising approach in a semisupervised fashion by assuming that the observed pixels of a hyperspectral image can be expressed in the form of linear combination of only a few pure spectral signatures (end members) in an available spectral library. However, the sparse unmixing problem still remains a great challenge at finding the optimal subset of endmembers for the observed data from a large standard spectral library, without considering the spatial information. Under such circumstances, a sparse unmixing algorithm termed as non-local simultaneous sparse unmixing (NLSSU) is presented. In NLSSU, the non-local simultaneous sparse representation method for endmember selection of sparse unmixing, is used to finding the optimal subset of endmembers for the similar image patch set in the hyperspectral image. And then, the non-local means method, as a regularizer for abundance estimation of sparse unmixing, is used to exploit the abundance image non-local self-similarity. Experimental results on both simulated and real data demonstrate that NLSSU outperforms the other algorithms, with a better spectral unmixing accuracy.Keywords: hyperspectral unmixing, simultaneous sparse representation, sparse regression, non-local means
Procedia PDF Downloads 2481101 Risks of Investment in the Development of Its Personnel
Authors: Oksana Domkina
Abstract:
According to the modern economic theory, human capital became one of the main production factors and the most promising direction of investment, as such investment provides opportunity of obtaining high and long-term economic and social effects. Informational technology (IT) sector is the representative of this new economy which is most dependent on human capital as the main competitive factor. So the question for this sector is not whether investment in development of personal should be made, but what are the most effective ways of executing it and who has to pay for the education: Worker, company or government. In this paper we examine the IT sector, describe the labor market of IT workers and its development, and analyze the risks that IT companies may face if they invest in the development of their workers and what factors influence it. The main problem and difficulty of quantitative estimation of risk of investment in human capital of a company and its forecasting is human factor. Human behavior is often unpredictable and complex, so it requires specific approaches and methods of assessment. To build a comprehensive method of estimation of the risk of investment in human capital of a company considering human factor, we decided to use the method of analytic hierarchy process (AHP), that initially was created and developed. We separated three main group of factors: Risks related to the worker, related to the company, and external factors. To receive data for our research, we conducted a survey among the HR departments of Ukrainian IT companies used them as experts for the AHP method. Received results showed that IT companies mostly invest in the development of their workers, although several hire only already qualified personnel. According to the results, the most significant risks are the risk of ineffective training and the risk of non-investment that are both related to the firm. The analysis of risk factors related to the employee showed that, the factors of personal reasons, motivation, and work performance have almost the same weights of importance. Regarding internal factors of the company, there is a high role of the factor of compensation and benefits, factors of interesting projects, team, and career opportunities. As for the external environment, one of the most dangerous factor of risk is competitor activities, meanwhile the political and economical situation factor also has a relatively high weight, which is easy to explain by the influence of severe crisis in Ukraine during 2014-2015. The presented method allows to take into consideration all main factors that affect the risk of investment in human capital of a company. This gives a base for further research in this field and allows for a creation of a practical framework for making decisions regarding the personnel development strategy and specific employees' development plans for the HR departments.Keywords: risks, personnel development, investment in development, factors of risk, risk of investment in development, IT, analytic hierarchy process, AHP
Procedia PDF Downloads 3011100 Library Support for the Intellectually Disabled: Book Clubs and Universal Design
Authors: Matthew Conner, Leah Plocharczyk
Abstract:
This study examines the role of academic libraries in support of the intellectually disabled (ID) in post-secondary education. With the growing public awareness of the ID, there has been recognition of their need for post-secondary educational opportunities. This was an unforeseen result for a population that has been associated with elementary levels of education, yet the reasons are compelling. After aging out of the school system, the ID need and deserve educational and social support as much as anyone. Moreover, the commitment to diversity in higher education rings hollow if this group is excluded. Yet, challenges remain to integrating the ID into a college curriculum. This presentation focuses on the role of academic libraries. Neglecting this vital resource for the support of the ID is not to be thought of, yet the library’s contribution is not clear. Library collections presume reading ability and libraries already struggle to meet their traditional goals with the resources available. This presentation examines how academic libraries can support post-secondary ID. For context, the presentation first examines the state of post-secondary education for the ID with an analysis of data on the United States compiled by the ThinkCollege! Project. Geographic Information Systems (GIS) and statistical analysis will show regional and methodological trends in post-secondary support of the ID which currently lack any significant involvement by college libraries. Then, the presentation analyzes a case study of a book club at the Florida Atlantic University (FAU) libraries which has run for several years. Issues such as the selection of books, effective pedagogies, and evaluation procedures will be examined. The study has found that the instruction pedagogies used by libraries can be extended through concepts of Universal Learning Design (ULD) to effectively engage the ID. In particular, student-centered, participatory methodologies that accommodate different learning styles have proven to be especially useful. The choice of text is complex and determined not only by reading ability but familiarity of subject and features of the ID’s developmental trajectory. The selection of text is not only a necessity but also promises to give insight into the ID. Assessment remains a complex and unresolved subject, but the voluntary, sustained, and enthusiastic attendance of the ID is an undeniable indicator. The study finds that, through the traditional library vehicle of the book club, academic libraries can support ID students through training in both reading and socialization, two major goals of their post-secondary education.Keywords: academic libraries, intellectual disability, literacy, post-secondary education
Procedia PDF Downloads 1641099 Implementation of Human Resource Management in Greek Law Enforcement Agencies
Authors: Konstantinos G. Papaioannou, Panagiotis K. Serdaris
Abstract:
This study, examines the level of implementation of Human Resource Management (HRM) activities in law enforcement agencies in Greece. Recognizing that HRM is crucial for maximizing organizational performance, the study aims to evaluate its application within Greek law enforcement. A quantitative-descriptive survey was conducted, involving 996 executives from Greek Law Enforcement Agencies (477 from the Hellenic Police and 519 from the Hellenic Coast Guard), through random sampling. The survey, revealed significant concerns regarding the minimal implementation of HRM practices, in both agencies. The findings indicate that HRM practices, such as HR planning, recruitment, job position, selection, training and development, personnel management, compensation, labor relations and health and safety, are minimally applied. Neither the Hellenic Police nor the Hellenic Coast Guard appears to follow a comprehensive HRM plan. The study, contributes both theoretically and practically by highlighting the lack of HRM implementation in these agencies. The data suggest that by adopting strategic HRM practices, these organizations can enhance personnel performance and better fulfill their societal roles. Future research should extend to law enforcement agencies in other countries to draw more representative conclusion.Keywords: coastguard, human resources management, law enforcement agencies, performance management, police
Procedia PDF Downloads 461098 Toward an Informed Capacity Development Program in Inclusive and Sustainable Agricultural and Rural Development
Authors: Maria Ana T. Quimbo
Abstract:
As the Southeast Asian Regional Center for Graduate Study and Research in Agriculture (SEARCA) approaches its 50th founding anniversary. It continues to pursue its mission of strengthening the capacities of Southeast Asian leaders and institutions under its reformulated mission of Inclusive and Sustainable Agricultural and Rural Development (ISARD). Guided by this mission, this study analyzed the desired and priority capacity development needs of institutions heads and key personnel toward addressing the constraints, problems, and issues related to agricultural and rural development toward achieving their institutional goals. Adopting an exploratory, descriptive research design, the study examined the competency needs at the institutional and personnel levels. A total of 35 institution heads from seven countries and 40 key personnel from eight countries served as research participants. The results showed a variety of competencies in the areas of leadership and management, agriculture, climate change, research, monitoring, and evaluation, planning, and extension or community service. While mismatch was found in a number of desired and priority competency areas as perceived by the respondents, there were also interesting concordant answers in both technical and non-technical areas. Interestingly, the competency needs both desired and prioritized were a combination of “hard” or technical skills and “soft” or interpersonal skills. Policy recommendations were forwarded on the need to continue building capacities in core competencies along ISARD; have a balance of 'hard' skills and 'soft' skills through the use of appropriate training strategies and explicit statement in training objectives, strengthen awareness on “soft” skills through its integration in workplace culture, build capacity on action research, continue partnerships encourage mentoring, prioritize competencies, and build capacity of desired and priority competency areas.Keywords: capacity development, competency needs assessment, sustainability and development, ISARD
Procedia PDF Downloads 3791097 Personnel Selection Based on Step-Wise Weight Assessment Ratio Analysis and Multi-Objective Optimization on the Basis of Ratio Analysis Methods
Authors: Emre Ipekci Cetin, Ebru Tarcan Icigen
Abstract:
Personnel selection process is considered as one of the most important and most difficult issues in human resources management. At the stage of personnel selection, the applicants are handled according to certain criteria, the candidates are dealt with, and efforts are made to select the most appropriate candidate. However, this process can be more complicated in terms of the managers who will carry out the staff selection process. Candidates should be evaluated according to different criteria such as work experience, education, foreign language level etc. It is crucial that a rational selection process is carried out by considering all the criteria in an integrated structure. In this study, the problem of choosing the front office manager of a 5 star accommodation enterprise operating in Antalya is addressed by using multi-criteria decision-making methods. In this context, SWARA (Step-wise weight assessment ratio analysis) and MOORA (Multi-Objective Optimization on the basis of ratio analysis) methods, which have relatively few applications when compared with other methods, have been used together. Firstly SWARA method was used to calculate the weights of the criteria and subcriteria that were determined by the business. After the weights of the criteria were obtained, the MOORA method was used to rank the candidates using the ratio system and the reference point approach. Recruitment processes differ from sector to sector, from operation to operation. There are a number of criteria that must be taken into consideration by businesses in accordance with the structure of each sector. It is of utmost importance that all candidates are evaluated objectively in the framework of these criteria, after these criteria have been carefully selected in the selection of suitable candidates for employment. In the study, staff selection process was handled by using SWARA and MOORA methods together.Keywords: accommodation establishments, human resource management, multi-objective optimization on the basis of ratio analysis, multi-criteria decision making, step-wise weight assessment ratio analysis
Procedia PDF Downloads 3441096 Lies and Pretended Fairness of Police Officers in Sharing
Authors: Eitan Elaad
Abstract:
The current study aimed to examine lying and pretended fairness by police personnel in sharing situations. Forty Israeli police officers and 40 laypeople from the community, all males, self-assessed their lie-telling ability, rated the frequency of their lies, evaluated the acceptability of lying, and indicated using rational and intuitive thinking while lying. Next, according to the ultimatum game procedure, participants were asked to share 100 points with an imagined target, either a male policeman or a male non-policeman. Participants allocated points to the target person bearing in mind that the other person must accept or reject their offer. Participants' goal was to retain as many points as possible, and to this end, they could tell the target person that fewer than 100 points were available for distribution. We defined concealment or lying as the difference between the available 100 points and the sum of points designated for sharing. Results indicated that police officers lied less to their fellow police targets than non-police targets, whereas laypeople lied less to non-police targets than imagined police targets. The ratio between the points offered to the imagined target person and the points endowed by the participant as available for sharing defined pretended fairness.Enhanced pretended fairness indicates higher motivation to display fair sharing even if the fair sharing is fictitious. Police officers presented higher pretended fairness to police targets than laypeople, whereas laypeople set off more fairness to non-police targets than police officers. We discussed the results concerning occupation solidarity and loyalty among police personnel. Specifically, police work involves uncertainty, danger and risk, coercive authority, and the use of force, which isolates the police from the community and dictates strong bonds of solidarity between police personnel. No wonder police officers shared more points (lied less) to fellow police targets than non-police targets. On the other hand, police legitimacy or the belief that the police are acting honestly in the best interest of the citizens constitutes citizens' attitudes toward the police. The relatively low number of points shared for distribution by laypeople to police targets indicates difficulties with the legitimacy of the Israeli police.Keywords: lying, fairness, police solidarity, police legitimacy, sharing, ultimatum game
Procedia PDF Downloads 1151095 Working Hours of Nurses in Public Hospitals: An Analyse Based on Working Schedules
Authors: Feride Eskin Bacaksiz, Arzu K. Harmanci Seren
Abstract:
The problems about the working hours of nursing personnel, such as overworking, numbers of night or daytime shifts, is stated one of the most complained issues by nurses. Otherwise, besides of nursing shortage, absenteeism of nurses because of sickness, some other health problems, or other reasons enforces nurse managers to make working schedules. In this study, it was aimed to analyse and evaluate the working schedules of nurses working in public hospitals. Working schedule lists of nursing personnel for the months of October and November in two public hospitals were analysed and evaluated. Approvals were acquired from the head nurse managers. Descriptive and comparative analyses were used. Totally 36 lists were analysed from two hospitals. There were totally 416 nurses (manager nurse: 25, nurse: 391) and 6-28 (12.6, SD=5.34) nurses in each list. It was found that nurses were working 8 (42.5%), 12 (27.9%) and 16 (20%) hours, in inpatient clinics (74.8%). Totally 20.2% of the nurses were absent during analysing time due to the annual, paid or unpaid leaves. Nurses were generally working 20-112 hours (80.27, SD=11.92). Most of the nurses over worked 1.5-443 hours (47.436, SD=60.78) the year before that year. It was determined that 11.8% of the nurses (n: 49) were working only night shifts and 42.1% (n: 175) of the nurses were working only daytime shifts. It was found that there were inequities in the working hours of nurses.Keywords: nurse, public hospitals, working conditions, working schedules
Procedia PDF Downloads 2841094 Evaluation of Radiological Health Danger Indices Arising from Diagnostic X-Ray Rooms
Authors: Jessica Chukwuyem Molua, Collins O Molua
Abstract:
The effective dose of selected health care workers who are constantly exposed to X-ray radiation was measured using thermoluminescence dosimeters (TLD) placed over the lead apron at the chest region in all categories of medical personnel investigated. To measure radiation in all the selected hospitals to ascertain the exposure of x-ray machines at exactly 1m from the primary source. The work was carried out within a year in each of the selected centers. The personnel examination records containing the type of examination each day, peak tube voltage, tube current, and exposure time, including the actual number of films used, were obtained. A total of 40personel were examined in government hospital Agbor, 21 in central hospital Owa Alero and 18 in Okonye hospital The method used here has also been used by other researchers. Findings showed that the results obtained from the three hospitals investigated in this work were found to conform with the recommendations of the National Commission on radiological and protection {NCRP} 70 and 116 protocols. The Radiologist in the three study areas has the highest dose level, but of particular note is the dosage of the radiologist in Okonye hospital. This, as observed, is because the protective shielding parameters were inadequate and this could result in severe health consequences over time.Keywords: radiology, health, Agbor, Owa
Procedia PDF Downloads 841093 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme
Authors: Cavidan Yakupoglu, Kurt Rohloff
Abstract:
In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE
Procedia PDF Downloads 1631092 The Touristic Development of the Archaeological and Heritage Areas in Alexandria City, Egypt
Authors: Salma I. Dwidar, Amal A. Abdelsattar
Abstract:
Alexandria city is one of the greatest cities in the world. It confronted different civilizations throughout the ages due to its special geographical location and climate which left many archaeological areas of great heritage (Ptolemaic, Greek, Romanian, especially sunken monuments, Coptic, Islamic, and finally, the Modern). Also, Alexandria city contains areas with different patterns of urban planning, both Hellenistic and compacted planning which merited the diversity in planning. Despite the magnitude of this city, which contains all the elements of tourism, the city was not included in the tourism map of Egypt properly comparing with similar cities in Egypt. This paper discusses the importance of heritage areas in Alexandria and the relationship between heritage areas and modern buildings. It highlights the absence of a methodology to deal with heritage areas as touristic areas. Also, the paper aims to develop multiple touristic routes to visit archaeological areas and other sights of significance in Alexandria. The research methodology is divided into two main frameworks. The first framework is a historical study of the urban development of Alexandria and the most important remaining monuments throughout the ages, as well as an analytical study of sunken monuments and their importance in increasing the rate of tourism. Moreover, it covers a study of the importance of the Library of Alexandria and its effect on the international focus of the city. The second framework focuses on the proposal of some tourism routes to visit the heritage areas, archaeological monuments, sunken monuments and the sights of Alexandria. The study concludes with the proposal of three tourism routes. The first route, which is the longest one, passes by all the famous monuments of the city as well as its modern sights. The second route passes through the heritage areas, sunken monuments, and Library of Alexandria. The third route includes the sunken monuments and Library of Alexandria. These three tourism routes will ensures the touristic development of the city which leads to the economic growth of the city and the country.Keywords: archeological buildings, heritage buildings, heritage tourism, planning of Islamic cities
Procedia PDF Downloads 1431091 Community Integration: Post-Secondary Education (PSE) and Library Programming
Authors: Leah Plocharczyk, Matthew Conner
Abstract:
This paper analyzes the relatively new trend of PSE programs which seek to provide education, vocational training, and a college experience to individuals with an intellectual and developmental disability (IDD). Specifically, the paper examines the degree of interaction between PSE programs and the libraries of their college campuses. Using ThinkCollege, a clearinghouse and advocate for PSE programs, the researchers identified 293 programs throughout the country. These were all contacted with an email survey asking them about the nature of their involvement, if any, with the academic libraries on their campus. Where indicated by the responses, the libraries of PSE programs were contacted for additional information about their programming. Responses to the survey questions were tabulated and analyzed quantitatively. Written comments were analyzed for themes which were then tabulated. This paper presents the results of this study. They show obvious preferences for library programming, such as group formal instruction, individual liaisons, embedded reference, and various instructional designs. These are discussed in terms of special education principles of mainstreaming, level of restriction, training demands and cost effectiveness. The work serves as a foundation for best practices that can advance the field.Keywords: disability studies, instructional design, universal design for learning, assessment methodology
Procedia PDF Downloads 701090 A Multi-Criteria Decision Method for the Recruitment of Academic Personnel Based on the Analytical Hierarchy Process and the Delphi Method in a Neutrosophic Environment
Authors: Antonios Paraskevas, Michael Madas
Abstract:
For a university to maintain its international competitiveness in education, it is essential to recruit qualitative academic staff as it constitutes its most valuable asset. This selection demonstrates a significant role in achieving strategic objectives, particularly by emphasizing a firm commitment to the exceptional student experience and innovative teaching and learning practices of high quality. In this vein, the appropriate selection of academic staff establishes a very important factor of competitiveness, efficiency and reputation of an academic institute. Within this framework, our work demonstrates a comprehensive methodological concept that emphasizes the multi-criteria nature of the problem and how decision-makers could utilize our approach in order to proceed to the appropriate judgment. The conceptual framework introduced in this paper is built upon a hybrid neutrosophic method based on the Neutrosophic Analytical Hierarchy Process (N-AHP), which uses the theory of neutrosophy sets and is considered suitable in terms of a significant degree of ambiguity and indeterminacy observed in the decision-making process. To this end, our framework extends the N-AHP by incorporating the Neutrosophic Delphi Method (N-DM). By applying the N-DM, we can take into consideration the importance of each decision-maker and their preferences per evaluation criterion. To the best of our knowledge, the proposed model is the first which applies the Neutrosophic Delphi Method in the selection of academic staff. As a case study, it was decided to use our method for a real problem of academic personnel selection, having as the main goal to enhance the algorithm proposed in previous scholars’ work, and thus taking care of the inherent ineffectiveness which becomes apparent in traditional multi-criteria decision-making methods when dealing with situations alike. As a further result, we prove that our method demonstrates greater applicability and reliability when compared to other decision models.Keywords: multi-criteria decision making methods, analytical hierarchy process, delphi method, personnel recruitment, neutrosophic set theory
Procedia PDF Downloads 1181089 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System
Authors: J. K. Adedeji, M. O. Oyekanmi
Abstract:
This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.Keywords: biometric characters, facial recognition, neural network, OpenCV
Procedia PDF Downloads 2581088 An Analysis of the Need of Training for Indian Textile Manufacturing Sector
Authors: Shipra Sharma, Jagat Jerath
Abstract:
Human resource training is an essential element of talent management in the current era of global competitiveness and dynamic trade in the manufacturing industry. Globally, India is behind only China as the largest textile manufacturer. The major challenges faced by the Indian textile manufacturing Industry are low technology levels, growing skill gaps, unorganized structure, lower efficiencies, etc. indicating the need for constant talent up-gradation. Assessment of training needs from a strategic perspective is an essential step for the formulation of effective training. The paper established the significance of training in the Indian textile industry and to determine the training needs on various parameters as presented. 40 HR personnel/s working in the textile and apparel companies based in the industrial region of Punjab, India, were the respondents for the study. The research tool used in this case was a structured questionnaire as per five-point Likert scale. Statistical analysis through descriptive statistics and chi-square test indicated the increased need for training whenever there were technical changes in the organizations. As per the data presented in this study, most of the HR personnel/s agreed that the variables associated with organizational analysis, task analysis, and individual analysis have a statistically significant role to play in determining the need for training in an organization.Keywords: Indian textile manufacturing industry, significance of training, training needs analysis, parameters for training needs assessment
Procedia PDF Downloads 1661087 A Methodological Approach to Digital Engineering Adoption and Implementation for Organizations
Authors: Sadia H. Syeda, Zain H. Malik
Abstract:
As systems continue to become more complex and the interdependencies of processes and sub-systems continue to grow and transform, the need for a comprehensive method of tracking and linking the lifecycle of the systems in a digital form becomes ever more critical. Digital Engineering (DE) provides an approach to managing an authoritative data source that links, tracks, and updates system data as it evolves and grows throughout the system development lifecycle. DE enables the developing, tracking, and sharing system data, models, and other related artifacts in a digital environment accessible to all necessary stakeholders. The DE environment provides an integrated electronic repository that enables traceability between design, engineering, and sustainment artifacts. The DE activities' primary objective is to develop a set of integrated, coherent, and consistent system models for the program. It is envisioned to provide a collaborative information-sharing environment for various stakeholders, including operational users, acquisition personnel, engineering personnel, and logistics and sustainment personnel. Examining the processes that DE can support in the systems engineering life cycle (SELC) is a primary step in the DE adoption and implementation journey. Through an analysis of the U.S Department of Defense’s (DoD) Office of the Secretary of Defense (OSD’s) Digital Engineering Strategy and their implementation, examples of DE implementation by the industry and technical organizations, this paper will provide descriptions of the current DE processes and best practices of implementing DE across an enterprise. This will help identify the capabilities, environment, and infrastructure needed to develop a potential roadmap for implementing DE practices consistent with its business strategy. A capability maturity matrix will be provided to assess the organization’s DE maturity emphasizing how all the SELC elements interlink to form a cohesive ecosystem. If implemented, DE can increase efficiency and improve the systems engineering processes' quality and outcomes.Keywords: digital engineering, digital environment, digital maturity model, single source of truth, systems engineering life-cycle
Procedia PDF Downloads 951086 LGG Architecture for Brain Tumor Segmentation Using Convolutional Neural Network
Authors: Sajeeha Ansar, Asad Ali Safi, Sheikh Ziauddin, Ahmad R. Shahid, Faraz Ahsan
Abstract:
The most aggressive form of brain tumor is called glioma. Glioma is kind of tumor that arises from glial tissue of the brain and occurs quite often. A fully automatic 2D-CNN model for brain tumor segmentation is presented in this paper. We performed pre-processing steps to remove noise and intensity variances using N4ITK and standard intensity correction, respectively. We used Keras open-source library with Theano as backend for fast implementation of CNN model. In addition, we used BRATS 2015 MRI dataset to evaluate our proposed model. Furthermore, we have used SimpleITK open-source library in our proposed model to analyze images. Moreover, we have extracted random 2D patches for proposed 2D-CNN model for efficient brain segmentation. Extracting 2D patched instead of 3D due to less dimensional information present in 2D which helps us in reducing computational time. Dice Similarity Coefficient (DSC) is used as performance measure for the evaluation of the proposed method. Our method achieved DSC score of 0.77 for complete, 0.76 for core, 0.77 for enhanced tumor regions. However, these results are comparable with methods already implemented 2D CNN architecture.Keywords: brain tumor segmentation, convolutional neural networks, deep learning, LGG
Procedia PDF Downloads 1831085 A Multi-criteria Decision Method For The Recruitment Of Academic Personnel Based On The Analytical Hierarchy Process And The Delphi Method In A Neutrosophic Environment (Full Text)
Authors: Antonios Paraskevas, Michael Madas
Abstract:
For a university to maintain its international competitiveness in education, it is essential to recruit qualitative academic staff as it constitutes its most valuable asset. This selection demonstrates a significant role in achieving strategic objectives, particularly by emphasizing a firm commitment to exceptional student experience and innovative teaching and learning practices of high quality. In this vein, the appropriate selection of academic staff establishes a very important factor of competitiveness, efficiency and reputation of an academic institute. Within this framework, our work demonstrates a comprehensive methodological concept that emphasizes on the multi-criteria nature of the problem and on how decision makers could utilize our approach in order to proceed to the appropriate judgment. The conceptual framework introduced in this paper is built upon a hybrid neutrosophic method based on the Neutrosophic Analytical Hierarchy Process (N-AHP), which uses the theory of neutrosophy sets and is considered suitable in terms of significant degree of ambiguity and indeterminacy observed in decision-making process. To this end, our framework extends the N-AHP by incorporating the Neutrosophic Delphi Method (N-DM). By applying the N-DM, we can take into consideration the importance of each decision-maker and their preferences per evaluation criterion. To the best of our knowledge, the proposed model is the first which applies Neutrosophic Delphi Method in the selection of academic staff. As a case study, it was decided to use our method to a real problem of academic personnel selection, having as main goal to enhance the algorithm proposed in previous scholars’ work, and thus taking care of the inherit ineffectiveness which becomes apparent in traditional multi-criteria decision-making methods when dealing with situations alike. As a further result, we prove that our method demonstrates greater applicability and reliability when compared to other decision models.Keywords: analytical hierarchy process, delphi method, multi-criteria decision maiking method, neutrosophic set theory, personnel recruitment
Procedia PDF Downloads 2011084 The Consequence of Being Perceived as An 'Immodest Woman': The Kuwaiti Criminal Justice System’s Response to Allegations of Sexual Violence
Authors: Eiman Alqattan
Abstract:
Kuwaiti criminal justice system’s responses to allegations of sexual violence against women during the pre-trial process, suggesting that the system in Kuwait is affected by an ethos that is male dominated and patriarchal, and which results in prejudicial, unfair, and unequal treatment of female victims of serious sexual offenses. Data derived from qualitative semi-structured face-to-face interviews with four main groups of criminal justice system personnel in Kuwait (prosecutors, police investigators, police officers, and investigators) reveal the characteristics of a complaint of sexual violence that contribute to cases being either sent to court or dismissed. This proposed paper will suggest that Arab cultural views of women appear to influence and even shape the views, perceptions, and conduct of the interviewed Kuwaiti criminal justice system personnel regarding complaints of sexual violence made by citizens. Data from the interviews show how the image of the ‘modest woman’ that exists within Arabic cultural views and norms greatly contributes to shaping the characteristics of what the majority of the interviewed officials considered to be a ‘credible’ allegation of sexual violence. In addition, it is clear that the interviewees’ definitions of ‘modesty’ varied. Yet the problem is not only about the stereotypical perceptions of complainants or the consequences of those perceptions on the decision to send the case to court. These perceptions also affected the behaviours of criminal justice system personnel towards citizen complainants. When complainants’ allegations were questioned, investigators went as far as abusing the women verbally or physically, often in order to force them to withdraw the so-called ‘false’ complaint in order to protect the ‘real’ victim: the ‘innocent defendant’. The proposed presentation will discuss these police approaches to women and the techniques used in assessing the credibility of their accusations, including how they differ depending on whether the complainant was under or over 21 years old.Keywords: criminal justice system, law and Arab culture, modest woman, sexual violence
Procedia PDF Downloads 2971083 Assessment of the Administration and Services of Public Access Computers in Academic Libraries in Kaduna State, Nigeria
Authors: Usman Ahmed Adam, Umar Ibrahim, Ezra S. Gbaje
Abstract:
This study is posed to explore the practice of Public Access Computers (PACs) in academic libraries in Kaduna State, Nigeria. The study aimed to determine the computers and other tools available, their services and challenges of the practices. Three questions were framed to identify number of public computers and tools available, their services and problems faced during the practice. The study used qualitative research design along with semi-constructed interview and observation as tools for data collection. Descriptive analysis was employed to analyze the data. The sample size of the study comprises 52 librarian and IT staff from the seven academic institutions in Kaduna State. The findings revealed that, PACs were provided for access to the Internet, digital resources, library catalogue and training services. The study further explored that, despite the limit number of the computers, users were not allowed to enjoy many services. The study recommends that libraries in Kaduna state should provide more public computers to be able to cover the population of their users; libraries should allow users to use the computers without limitations and restrictions.Keywords: academic libraries, computers in library, digital libraries, public computers
Procedia PDF Downloads 3541082 Librarian Liaisons: Facilitating Multi-Disciplinary Research for Academic Advancement
Authors: Tracey Woods
Abstract:
In the ever-evolving landscape of academia, the traditional role of the librarian has undergone a remarkable transformation. Once considered as custodians of books and gatekeepers of information, librarians have the potential to take on the vital role of facilitators of cross and inter-disciplinary projects. This shift is driven by the growing recognition of the value of interdisciplinary collaboration in addressing complex research questions in pursuit of novel solutions to real-world problems. This paper shall explore the potential of the academic librarian’s role in facilitating innovative, multi-disciplinary projects, both recognising and validating the vital role that the librarian plays in a somewhat underplayed profession. Academic libraries support teaching, the strengthening of knowledge discourse, and, potentially, the development of innovative practices. As the role of the library gradually morphs from a quiet repository of books to a community-based information hub, a potential opportunity arises. The academic librarian’s role is to build knowledge across a wide span of topics, from the advancement of AI to subject-specific information, and, whilst librarians are generally not offered the research opportunities and funding that the traditional academic disciplines enjoy, they are often invited to help build research in support of the academic. This identifies that one of the primary skills of any 21st-century librarian must be the ability to collaborate and facilitate multi-disciplinary projects. In universities seeking to develop research diversity and academic performance, there is an increasing awareness of the need for collaboration between faculties to enable novel directions and advancements. This idea has been documented and discussed by several researchers; however, there is not a great deal of literature available from recent studies. Having a team based in the library that is adept at creating effective collaborative partnerships is valuable for any academic institution. This paper outlines the development of such a project, initiated within and around an identified library-specific need: the replication of fragile special collections for object-based learning. The research was developed as a multi-disciplinary project involving the faculties of engineering (digital twins lab), architecture, design, and education. Centred around methods for developing a fragile archive into a series of tactile objects furthers knowledge and understanding in both the role of the library as a facilitator of projects, chairing and supporting, alongside contributing to the research process and innovating ideas through the bank of knowledge found amongst the staff and their liaising capabilities. This paper shall present the method of project development from the initiation of ideas to the development of prototypes and dissemination of the objects to teaching departments for analysis. The exact replication of artefacts is also balanced with the adaptation and evolutionary speculations initiated by the design team when adapted as a teaching studio method. The dynamic response required from the library to generate and facilitate these multi-disciplinary projects highlights the information expertise and liaison skills that the librarian possesses. As academia embraces this evolution, the potential for groundbreaking discoveries and innovative solutions across disciplines becomes increasingly attainable.Keywords: Liaison librarian, multi-disciplinary collaborations, library innovations, librarian stakeholders
Procedia PDF Downloads 74