Search results for: embedded banking strategy
3132 Unravelling Green Entrepreneurial: Insights From a Hybrid Systematic Review
Authors: Shivani, Seema Sharma, Shveta Singh, Akriti Chandra
Abstract:
Business activities contribute to various environmental issues such as deforestation, waste generation, and pollution. Therefore, integration of environmental concerns within manufacturing operations is vital for the long-term survival of businesses. In this context, green entrepreneurial orientation (GEO) is recognized as a firm-level internal strategy to mitigate ecological damage through initiating green business practices. However, despite the surge in research on GEO in recent years, ambiguity remains on the genesis of GEO and the mechanism through which GEO impacts various organizational outcomes. This prompts an examination of the ongoing scholarly discourse about GEO and its domain knowledge structure within the entrepreneurship literature using bibliometric analysis and the Theories, Contexts, Characteristics, and Methodologies (TCCM) framework. The authors analyzed a dataset comprising 73 scientific documents sourced from the Scopus and Web of Science database from 2005 to 2024 to provide insights into the publication trends, prominent journals, authors, articles, countries' collaboration, and keyword analysis in GEO research. The findings indicate that the number of relevant papers and citations has increased consistently, with authors from China being the main contributors. The articles are mainly published in Business Strategy and the Environment and Sustainability. Dynamic capability view is the dominant framework applied in the GEO domain, with large manufacturing firms and SMEs constituting the majority of the sample. Further, various antecedents of GEO have been identified at an organizational level to which managers can focus their attention. The studies have used various contextual factors to explain when GEO translates into superior organizational outcomes. The Method analysis reveals that PLS-SEM is the commonly used approach for analyzing the primary data collected through surveys. Moreover, the content analysis indicates four emerging research frontiers identified as unidimensional vs. multidimensional perspectives of GEO, typologies of green innovation, environmental management in the hospitality industry, and tech-savvy sustainability in the agriculture sector. This study is one of the earliest to apply quantitative methods to synthesize the extant literature on GEO. This research holds relevance for management practice due to the escalating levels of carbon emissions, energy consumption, and waste discharges observed in recent years, resulting in increased apprehension about climate change.Keywords: green entrepreneurship, sustainability, SLR, TCCM
Procedia PDF Downloads 143131 Vertical Uplift Capacity of a Group of Equally Spaced Helical Screw Anchors in Sand
Authors: Sanjeev Mukherjee, Satyendra Mittal
Abstract:
This paper presents the experimental investigations on the behaviour of a group of single, double and triple helical screw anchors embedded vertically at the same level in sand. The tests were carried out on one, two, three and four numbers of anchors in sand for different depths of embedment keeping shallow and deep mode of behaviour in mind. The testing program included 48 tests conducted on three model anchors installed in sand whose density kept constant throughout the tests. It was observed that the ultimate pullout load varied significantly with the installation depth of the anchor and the number of anchors. The apparent coefficient of friction (f*) between anchor and soil was also calculated based on the test results. It was found that the apparent coefficient of friction varies between 1.02 and 4.76 for 1, 2, 3, and 4 numbers of single, double and triple helical screw anchors. Plate load tests conducted on model soil showed that the value of ф increases from 35o for virgin soil to 48o for soil with four double screw helical anchors. The graphs of ultimate pullout capacity of a group of two, three and four no. of anchors with respect to one anchor were plotted and design equations have been proposed correlating them. Based on these findings, it has been concluded that the load-displacement relationships for all groups can be reduced to a common curve. A 3-D finite element model, PLAXIS, was used to confirm the results obtained from laboratory tests and the agreement is excellent.Keywords: apparent coefficient of friction, helical screw anchor, installation depth, plate load test
Procedia PDF Downloads 5563130 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 3923129 Urban Development from the Perspective of Lou Gang Polder System: Taihu Lake, Huzhou as an Example
Authors: Wei Bin Shen
Abstract:
Lou Gang world irrigation project heritage in Taihu Lake is a systematic irrigation project integrating water conservancy, ecology and culture. Through the methods of historical documents and field investigation, this paper deeply analyzes the formation history, connotation and value of Lou Gang polder system: Lou Gang heritage, describes in detail the relationship between Lou Gang polder system in Taihu Lake and the development and evolution of Huzhou City, and initially explores the protection and Utilization Strategies of Lou Gang water conservancy cultural heritage resources in Taihu Lake from the current situation.Keywords: Lou Gang, protection strategy, urban evolution, waterconservancyculturalheritage
Procedia PDF Downloads 1703128 Searching for an Effective Marketing in the Food Supplement Industry in Japan
Authors: Michiko Miyamoto
Abstract:
The market for "functional foods" and "foods with functional claims" that are effective in maintaining and improving health, has expanded year by year due to the entry of major food and beverage manufacturers following the introduction of the specified health food system in 1991 in Japan. To bring health claims related products or services to the market, it is necessary to let consumers to learn about these products or services; an effective marketing through advertising are important. This research proposes a framework for an effective advertisement medium for the food supplement industry by using survey data of 2,500 people.Keywords: functional foods, dietary supplements, marketing strategy, structural equation modeling
Procedia PDF Downloads 1463127 On the Derivation of Variable Step BBDF for Solving Second Order Stiff ODEs
Authors: S. A. M. Yatim, Z. B. Ibrahim, K. I. Othman, M. Suleiman
Abstract:
The method of solving second order stiff ordinary differential equation (ODEs) that is based on backward differentiation formula (BDF) is considered in this paper. We derived the method by increasing the order of the existing method using an improved strategy in choosing the step size. Numerical results are presented to compare the efficiency of the proposed method to the MATLAB’s suite of ODEs solvers namely ode15s and ode23s. The method was found to be efficient to solve second order ordinary differential equation.Keywords: backward differentiation formulae, block backward differentiation formulae, stiff ordinary differential equation, variable step size
Procedia PDF Downloads 4993126 A Research Analysis on the Source Technology and Convergence Types
Authors: Kwounghee Choi
Abstract:
Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification
Procedia PDF Downloads 4883125 Mobile Augmented Reality for Collaboration in Operation
Authors: Chong-Yang Qiao
Abstract:
Mobile augmented reality (MAR) tracking targets from the surroundings and aids operators for interactive data and procedures visualization, potential equipment and system understandably. Operators remotely communicate and coordinate with each other for the continuous tasks, information and data exchange between control room and work-site. In the routine work, distributed control system (DCS) monitoring and work-site manipulation require operators interact in real-time manners. The critical question is the improvement of user experience in cooperative works through applying Augmented Reality in the traditional industrial field. The purpose of this exploratory study is to find the cognitive model for the multiple task performance by MAR. In particular, the focus will be on the comparison between different tasks and environment factors which influence information processing. Three experiments use interface and interaction design, the content of start-up, maintenance and stop embedded in the mobile application. With the evaluation criteria of time demands and human errors, and analysis of the mental process and the behavior action during the multiple tasks, heuristic evaluation was used to find the operators performance with different situation factors, and record the information processing in recognition, interpretation, judgment and reasoning. The research will find the functional properties of MAR and constrain the development of the cognitive model. Conclusions can be drawn that suggest MAR is easy to use and useful for operators in the remote collaborative works.Keywords: mobile augmented reality, remote collaboration, user experience, cognition model
Procedia PDF Downloads 1983124 Detection of Leptospira interrogans in Kidney and Urine of water Buffalo and its Relationship with Histopathological and Serological Findings
Authors: M. R. Haji Hajikolaei, A. A. Nikvand, A. R. Ghadrdan, M. Ghorbanpoor, B. Mohammadian
Abstract:
This study was carried out on water buffalo for detection of Leptospira interrogans in kidney and urine and its relationship with serological findings. Blood, urine and kidney samples were taken immediately after slaughter from 353 water buffalos at Ahvaz abattoir in Khouzestan province, Iran. Sera were initially screened at serum dilution of 1:100 against seven live antigens of Leptospira interrogans: pomona, hardjo, ballum, icterohemorrhagiae, tarasovi, australis and grippotyphosa using the microscopic agglutination test (MAT) and sera with positive results were titrated against reacting antigens in serial twofold dilution from 1:100 to 1:800. The samples of kidney were embedded in paraffin wax and 5µm thick sections were stained routinely with Haematoxylin and Eosin (H&E). Polymerase chain reaction (PCR) examination was done on urine and kidney by using LipL32 gene primers. Antibodies against one or more serovars at dilution >:100 were detected in sera. The most frequent reactor was hardjo (56.2%), followed by pomona (52.3%), australis (9.8%), tarassovi (5.9%), grippotyphosa (4.5%) and icterohaemorrhagiae (3.9%). The L. interrogans were detected in 43 (12.2%) of examined buffaloes, so that 26 (8.2%) of kidney tissues, 14 (4.8%) of urine samples separately and 3 (0.84%) of both kidney and urine samples were positive in PCR. From 153 (43.3%) buffaloes with positive MAT, 24 cases were positive by PCR of kidney and/or urine samples, synchronously. Renal lesions such as interstitial nephritis, acute tubular necrosis (ATN), pyelonephritis, glomerolonephritis, renal fibrosis and hydronephrosis were found in 128 (36.3%) cases. Statistical analysis indicated that there was no significant association between results of MAT, PCR and interstitial nephritis.Keywords: leptospiral infection, PCR, MAT, histopathology, river buffalo
Procedia PDF Downloads 3343123 An Application of a Feedback Control System to Minimize Unforeseen Disruption in a Paper Manufacturing Industry in South Africa
Authors: Martha E. Ndeley
Abstract:
Operation management is the key element within the manufacturing process. However, during this process, there are a number of unforeseen disruptions that causes the process to a standstill which are, machine breakdown, employees absenteeism, improper scheduling. When this happens, it forces the shop flow to a rescheduling process and these strategy reschedules only a limited part of the initial schedule to match up with the pre-schedule at some point with the objective to create a new schedule that is reliable which in the long run gets disrupted. In this work, we have developed feedback control system that minimizes any form of disruption before the impact becomes severe, the model was tested in a paper manufacturing industries and the results revealed that, if the disruption is minimized at the initial state, the impact becomes unnoticeable.Keywords: disruption, machine, absenteeism, scheduling
Procedia PDF Downloads 3083122 De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram
Authors: Damilohun D. Ayoyo, Anthony Mpiani, Temitope B. Oriola
Abstract:
The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror.Keywords: Boko Haram, female agency, Northern Nigeria, patriarchy, perpetrator of terror, radical Islamic terrorism, sharia, victim of terror, women insurgents
Procedia PDF Downloads 1243121 Healthcare Social Entrepreneurship: A Positive Theory Applied to the Case of YOU Foundation in Nepal
Authors: Simone Rondelli, Damiano Rondelli, Bishesh Poudyal, Juan Jose Cabrera-Lazarini
Abstract:
One of the main obstacles for Social Entrepreneurship is to find a business model that is financially sustainable. In other words, the captured value generates enough cash flow to ensure business continuity and reinvestment for growth. Providing Health Services in poor countries for the uninsured population affected by a high-cost chronical disease is not the exception for this challenge. As a prime example, cancer has become a high impact on a global disease not only because of the high morbidity but also of the financial impact on both the patient family and health services in underdeveloped countries. Therefore, it is relevant to find a Social Entrepreneurship Model that provides affordable treatment for this disease while maintaining healthy finances not only for the patient but also for the organization providing the treatment. Using the methodology of Constructive Research, this paper applied a Positive Theory and four business models of Social Entrepreneurship to a case of a Private Foundation model whose mission is to address the challenge previously described. It was found that the Foundation analyzed, in this case, is organized as an Embedded Business Model and complies with the four propositions of the Positive Theory considered. It is recommended for this Private Foundation to explore implementing the Integrated Business Model to ensure more robust sustainability in the long term. It evolves as a scalable model that can attract investors interested in contributing to expanding this initiative globally.Keywords: affordable treatment, global healthcare, social entrepreneurship theory, sustainable business model
Procedia PDF Downloads 1463120 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment
Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura
Abstract:
This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability
Procedia PDF Downloads 1673119 Presuppositions and Implicatures in Four Selected Speeches of Osama Bin Laden's Legitimisation of 'Jihad'
Authors: Sawsan Al-Saaidi, Ghayth K. Shaker Al-Shaibani
Abstract:
This paper investigates certain linguistics properties of four selected speeches by Al-Qaeda’s former leader Osama bin Laden who legitimated the use of jihad by Muslims in various countries when he was alive. The researchers adopt van Dijk’s (2009; 1998) Socio-Cognitive approach and Ideological Square theory respectively. Socio-Cognitive approach revolves around various cognitive, socio-political, and discursive aspects that can be found in political discourse as in Osama bin Laden’s one. The political discourse can be defined in terms of textual properties and contextual models. Pertaining to the ideological square, it refers to positive self-presentation and negative other-presentation which help to enhance the textual and contextual analyses. Therefore, among the most significant properties in Osama bin Laden’s discourse are the use of presuppositions and implicatures which are based on background knowledge and contextual models as well. Thus, the paper concludes that Osama bin Laden used a number of manipulative strategies which augmented and embellished the use of ‘jihad’ in order to develop a more effective discourse for his audience. In addition, the findings have revealed that bin Laden used different implicit and embedded interpretations of different topics which have been accepted as taken-for-granted truths for him to legitimate Jihad against his enemies. There are many presuppositions in the speeches analysed that result in particular common-sense assumptions and a world-view about the selected speeches. More importantly, the assumptions in the analysed speeches help consolidate the ideological analysis in terms of in-group and out-group members.Keywords: Al-Qaeda, cognition, critical discourse analysis, Osama Bin Laden, jihad, implicature, legitimisation, presupposition, political discourse
Procedia PDF Downloads 2403118 Data-Driven Surrogate Models for Damage Prediction of Steel Liquid Storage Tanks under Seismic Hazard
Authors: Laura Micheli, Majd Hijazi, Mahmoud Faytarouni
Abstract:
The damage reported by oil and gas industrial facilities revealed the utmost vulnerability of steel liquid storage tanks to seismic events. The failure of steel storage tanks may yield devastating and long-lasting consequences on built and natural environments, including the release of hazardous substances, uncontrolled fires, and soil contamination with hazardous materials. It is, therefore, fundamental to reliably predict the damage that steel liquid storage tanks will likely experience under future seismic hazard events. The seismic performance of steel liquid storage tanks is usually assessed using vulnerability curves obtained from the numerical simulation of a tank under different hazard scenarios. However, the computational demand of high-fidelity numerical simulation models, such as finite element models, makes the vulnerability assessment of liquid storage tanks time-consuming and often impractical. As a solution, this paper presents a surrogate model-based strategy for predicting seismic-induced damage in steel liquid storage tanks. In the proposed strategy, the surrogate model is leveraged to reduce the computational demand of time-consuming numerical simulations. To create the data set for training the surrogate model, field damage data from past earthquakes reconnaissance surveys and reports are collected. Features representative of steel liquid storage tank characteristics (e.g., diameter, height, liquid level, yielding stress) and seismic excitation parameters (e.g., peak ground acceleration, magnitude) are extracted from the field damage data. The collected data are then utilized to train a surrogate model that maps the relationship between tank characteristics, seismic hazard parameters, and seismic-induced damage via a data-driven surrogate model. Different types of surrogate algorithms, including naïve Bayes, k-nearest neighbors, decision tree, and random forest, are investigated, and results in terms of accuracy are reported. The model that yields the most accurate predictions is employed to predict future damage as a function of tank characteristics and seismic hazard intensity level. Results show that the proposed approach can be used to estimate the extent of damage in steel liquid storage tanks, where the use of data-driven surrogates represents a viable alternative to computationally expensive numerical simulation models.Keywords: damage prediction , data-driven model, seismic performance, steel liquid storage tanks, surrogate model
Procedia PDF Downloads 1443117 Nigeria Rural Water Supply Management: Participatory Process as the Best Option
Authors: E. O. Aluta, C. A. Booth, D. G. Proverbs, T. Appleby
Abstract:
Challenges in the effective management of potable water have attracted global attention in recent years and remain many world regions’ major priorities. Scarcity and unavailability of potable water may potentially escalate poverty, obviate democratic expression of views and militate against inter-sectoral development. These challenges contra-indicate the inherent potentials of the resource. Thus, while creation of poverty may be regarded as a broad-based problem, it is capable of reflecting life-span reduction diseases, the friction of interests manifesting in threats and warfare, the relegation of democratic principles for authoritarian definitions and Human Rights abuse. The challenges may be identified as manifestations of ineffective management of potable water resource and therefore, regarded as major problems in environmental protection. In reaction, some nations have re-examined their laws and policies, while others have developed innovative projects, which seek to ameliorate difficulties of providing sustainable potable water. The problems resonate in Nigeria, where the legal framework supporting the supply and management of potable water has been criticized as ineffective. This has impacted more on rural community members, often regarded as ‘voiceless’. At that level, the participation of non-state actors has been identified as an effective strategy, which can improve water supply. However, there are indications that there is no pragmatic application of this, resulting in over-centralization and top-down management. Thus, this study focuses on how the participatory process may enable the development of participatory water governance framework, for use in Nigeria rural communities. The Rural Advisory Board (RAB) is proposed as a governing body to promote proximal relationships, institute democratisation borne out of participation, while enabling effective accountability and information. The RAB establishes mechanisms for effectiveness, taking into consideration Transparency, Accountability and Participation (TAP), advocated as guiding principles of decision-makers. Other tools, which may be explored in achieving these are, Laws and Policies supporting the water sector, under the direction of the Ministries and Law Courts, which ensure non-violation of laws. Community norms and values, consisting of Nigerian traditional belief system, perceptions, attitude and reality (often undermined in favour of legislations), are relied on to pave the way for enforcement. While the Task Forces consist of community members with specific designation of duties, which ensure compliance and enforceability, a cross-section of community members are assigned duties. Thus, the principle of participation is pragmatically reflected. A review of the literature provided information on the potentials of the participatory process, in potable water governance. Qualitative methodology was explored by using the semi-structured interview as strategy for inquiry. The purposive sampling strategy, consisting of homogeneous, heterogeneous and criterion techniques was applied to enable sampling. The samples, sourced from diverse positions of life, were from the study area of Delta State of Nigeria, involving three local governments of Oshimili South, Uvwie and Warri South. From the findings, there are indications that the application of the participatory process is inhered with empowerment of the rural community members to make legitimate demands for TAP. This includes the obviation of mono-decision making for the supply and management of potable water. This is capable of restructuring the top-down management to a top-down/bottom-up system.Keywords: participation, participatory process, participatory water governance, rural advisory board
Procedia PDF Downloads 3883116 A Blending Analysis of Metaphors and Metonymies Used to Depict the Deal of the Century by Jordanian Cartoonists
Authors: Aseel Zibin, Abdel Rahman Altakhaineh
Abstract:
This study analyses 30 cartoons depicting THE DEAL OF THE CENTURY as envisaged by two Jordanian cartoonists, namely, EmadHajjaj and Osama Hajjaj. Conceptual Blending Theory (CBT) and Multimodal Metaphor Theory (MMT) are adopted as a theoretical framework to interpret the metaphors and metonymies used in the target cartoons. The results reveal that the target domain THE DEAL OF THE CENTURY was conceptualized mainly through layered metaphors that have metonymic basis and event metaphors\allegories. Specifically, 6 groups were identified: OBJECT or a situation involving OBJECTS, situations involving HUMANS\HYBRIDS of HUMANS and OBJECTS, an ANIMAL OR situation involving an ANIMAL, hybrids of WEAPONS and humans, and event metaphors used to build a story\allegory. The target domain was also depicted via event metaphors used to build a story; some of which are embedded in the Jordanian culture, while others could be perceivable cross-culturally. The results also demonstrate that the most widely used configurations to construe the metaphors was the pictorial source–verbal target in line with Lan and Zuo (2016); the motivation was probably the greater conceptual density and concreteness of visual representation since the target is better captured verbally because of its abstractness. The use of cross-modal mappings of this type was attributed to the abstractness of the target domain, THE DEAL OF THE CENTURY, which makes it more construable via verbal cues rather than visual ones. In contrast, the source domains used were mainly concrete and thus perceivable pictorially rather than verbally.Keywords: semiotics, cognitive semantics, metaphor, culture, blending, cartoon
Procedia PDF Downloads 1833115 Aligning Organizational Culture and Compensation Strategies
Authors: Giuseppe Maria Russo, Patrícia Amélia Tomei, Antônio Linhares, André Moreira Santos
Abstract:
Alignment between management strategies, policies and practices with organizational cultures holds great potential to meet the challenges of retaining professionals and maintaining their commitment. In this article, authors consider that when it is aligned with company strategy, compensation acts as an incentive for developing common visions within the organizational culture. This article verified the correlation between types of culture and compensation’s strategic components and provided inputs for the definition of strategies aligned with cultural typologies. We conclude that the impact of compensation variables varies according to the type of organizational culture. This result reinforces the theory that different cultures define different organizational strategies. Thus, compensation strategies may explain types of organizational culture.Keywords: compensation, Handy’s cultural typology, organizational culture, rewards
Procedia PDF Downloads 6633114 Coupling Concept of Two Parallel Research Codes for Two and Three Dimensional Fluid Structure Interaction Analysis
Authors: Luciano Garelli, Marco Schauer, Jorge D’Elia, Mario A. Storti, Sabine C. Langer
Abstract:
This paper discuss a coupling strategy of two different software packages to provide fluid structure interaction (FSI) analysis. The basic idea is to combine the advantages of the two codes to create a powerful FSI solver for two and three dimensional analysis. The fluid part is computed by a program called PETSc-FEM, a software developed at Centro de Investigación de Métodos Computacionales (CIMEC). The structural part of the coupled process is computed by the research code elementary Parallel Solver (elPaSo) of the Technische Universität Braunschweig, Institut für Konstruktionstechnik (IK).Keywords: computational fluid dynamics (CFD), fluid structure interaction (FSI), finite element method (FEM), software
Procedia PDF Downloads 5543113 Capitalizing on Differential Network Ties: Unpacking Individual Creativity from Social Capital Perspective
Authors: Yuanyuan Wang, Chun Hui
Abstract:
Drawing on social capital theory, this article discusses how individuals may utilize network ties to come up with creativity. Social capital theory elaborates how network ties enhances individual creativity from three dimensions: structural access, and relational and cognitive mechanisms. We categorize network ties into strong and weak in terms of tie strength. With less structural constraints, weak ties allow diverse and heterogeneous knowledge to prosper, further facilitating individuals to build up connections among diverse even distant ideas. On the other hand, strong ties with the relational mechanism of cooperation and trust may benefit the accumulation of psychological capital, ultimately to motivate and sustain creativity. We suggest that differential ties play different roles for individual creativity: Weak ties deliver informational benefit directly rifling individual creativity from informational resource aspect; strong ties offer solidarity benefits to reinforce psychological capital, which further inspires individual creativity engagement from a psychological viewpoint. Social capital embedded in network ties influence individuals’ informational acquisition, motivation, as well as cognitive ability to be creative. Besides, we also consider the moderating effects constraining the relatedness between network ties and creativity, such as knowledge articulability. We hypothesize that when the extent of knowledge articulability is low, that is, with low knowledge codifiability, and high dependency and ambiguity, weak ties previous serving as knowledge reservoir will not become ineffective on individual creativity. Two-wave survey will be employed in Mainland China to empirically test mentioned propositions.Keywords: network ties, social capital, psychological capital, knowledge articulability, individual creativity
Procedia PDF Downloads 4063112 Transition Pathways of Commercial-Urban Fleet Electrification
Authors: Emily Gould, Walter Wehremeyer, David Greaves, Rodney Turtle
Abstract:
This paper considers current thinking on the pathway for electric vehicles, identifying the development blocks of alternative innovation within the market and analyse technological lock-in. The relationship between transition pathways and technological lock-in is largely under-researched particularly in the field of e-mobility. This paper is based on a study with three commercial-urban fleets that examines strategic decisions in new technology adaption alongside vehicle procurement and driver perspective. The paper will analyse the fleet’s decision matrix upon electric vehicles and seek to understand the influence of company culture, strategy and technology applicability, within the context of transition pathways.Keywords: electric vehicles, fleets, path dependencies, transition pathways
Procedia PDF Downloads 5693111 Integrated Management System Applied in Dismantling and Waste Management of the Primary Cooling System from the VVR-S Nuclear Reactor Magurele, Bucharest
Authors: Radu Deju, Carmen Mustata
Abstract:
The VVR-S nuclear research reactor owned by Horia Hubulei National Institute of Physics and Nuclear Engineering (IFIN-HH) was designed for research and radioisotope production, being permanently shut-down in 2002, after 40 years of operation. All amount of the nuclear spent fuel S-36 and EK-10 type was returned to Russian Federation (first in 2009 and last in 2012), and the radioactive waste resulted from the reprocessing of it will remain permanently in the Russian Federation. The decommissioning strategy chosen is immediate dismantling. At this moment, the radionuclides with half-life shorter than 1 year have a minor contribution to the contamination of materials and equipment used in reactor department. The decommissioning of the reactor has started in 2010 and is planned to be finalized in 2020, being the first nuclear research reactor that has started the decommissioning project from the South-East of Europe. The management system applied in the decommissioning of the VVR-S research reactor integrates all common elements of management: nuclear safety, occupational health and safety, environment, quality- compliance with the requirements for decommissioning activities, physical protection and economic elements. This paper presents the application of integrated management system in decommissioning of systems, structures, equipment and components (SSEC) from pumps room, including the management of the resulted radioactive waste. The primary cooling system of this type of reactor includes circulation pumps, heat exchangers, degasser, filter ion exchangers, piping connection, drainage system and radioactive leaks. All the decommissioning activities of primary circuit were performed in stage 2 (year 2014), and they were developed and recorded according to the applicable documents, within the requirements of the Regulatory Body Licenses. In the presentation there will be emphasized how the integrated management system provisions are applied in the dismantling of the primary cooling system, for elaboration, approval, application of necessary documentation, records keeping before, during and after the dismantling activities. Radiation protection and economics are the key factors for the selection of the proper technology. Dedicated and advanced technologies were chosen to perform specific tasks. Safety aspects have been taken into consideration. Resource constraints have also been an important issue considered in defining the decommissioning strategy. Important aspects like radiological monitoring of the personnel and areas, decontamination, waste management and final characterization of the released site are demonstrated and documented.Keywords: decommissioning, integrated management system, nuclear reactor, waste management
Procedia PDF Downloads 2923110 Joint Replenishment and Heterogeneous Vehicle Routing Problem with Cyclical Schedule
Authors: Ming-Jong Yao, Chin-Sum Shui, Chih-Han Wang
Abstract:
This paper is developed based on a real-world decision scenario that an industrial gas company that applies the Vendor Managed Inventory model and supplies liquid oxygen with a self-operated heterogeneous vehicle fleet to hospitals in nearby cities. We name it as a Joint Replenishment and Heterogeneous Vehicle Routing Problem with Cyclical Schedule and formulate it as a non-linear mixed-integer linear programming problem which simultaneously determines the length of the planning cycle (PC), the length of the replenishment cycle and the dates of replenishment for each customer and the vehicle routes of each day within PC, such that the average daily operation cost within PC, including inventory holding cost, setup cost, transportation cost, and overtime labor cost, is minimized. A solution method based on genetic algorithm, embedded with an encoding and decoding mechanism and local search operators, is then proposed, and the hash function is adopted to avoid repetitive fitness evaluation for identical solutions. Numerical experiments demonstrate that the proposed solution method can effectively solve the problem under different lengths of PC and number of customers. The method is also shown to be effective in determining whether the company should expand the storage capacity of a customer whose demand increases. Sensitivity analysis of the vehicle fleet composition shows that deploying a mixed fleet can reduce the daily operating cost.Keywords: cyclic inventory routing problem, joint replenishment, heterogeneous vehicle, genetic algorithm
Procedia PDF Downloads 893109 Towards a Common Architecture for Cloud Computing Interoperability
Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey
Abstract:
Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.Keywords: cloud computing, reference architecture, interoperability, standard
Procedia PDF Downloads 1743108 A Metacognitive Strategy to Improve Saudi EFL Learners’ Lecture Comprehension
Authors: Abdul Wahed Al Zumor
Abstract:
Saudi EFL Students majoring in English face difficulties in academic lectures listening comprehension in content courses like linguistics, applied linguistics or literature theories. To validate this assumption, a questionnaire assessing students' lecture comprehension experience was administered. The findings have shown that Saudi EFL learners face a great challenge in lecture comprehension at advanced levels. Literature has suggested a myriad of techniques which can enhance academic lecture comprehension. This study has used "reciprocal peer-questioning and responding technique" as an integral part of the academic lecture occupying the last ten minutes. Improvement in experimental students' scores in these courses has been noticed.Keywords: EFL learners, lecture comprehension, content courses, peer questioning
Procedia PDF Downloads 5973107 Magnetic Navigation of Nanoparticles inside a 3D Carotid Model
Authors: E. G. Karvelas, C. Liosis, A. Theodorakakos, T. E. Karakasidis
Abstract:
Magnetic navigation of the drug inside the human vessels is a very important concept since the drug is delivered to the desired area. Consequently, the quantity of the drug required to reach therapeutic levels is being reduced while the drug concentration at targeted sites is increased. Magnetic navigation of drug agents can be achieved with the use of magnetic nanoparticles where anti-tumor agents are loaded on the surface of the nanoparticles. The magnetic field that is required to navigate the particles inside the human arteries is produced by a magnetic resonance imaging (MRI) device. The main factors which influence the efficiency of the usage of magnetic nanoparticles for biomedical applications in magnetic driving are the size and the magnetization of the biocompatible nanoparticles. In this study, a computational platform for the simulation of the optimal gradient magnetic fields for the navigation of magnetic nanoparticles inside a carotid artery is presented. For the propulsion model of the particles, seven major forces are considered, i.e., the magnetic force from MRIs main magnet static field as well as the magnetic field gradient force from the special propulsion gradient coils. The static field is responsible for the aggregation of nanoparticles, while the magnetic gradient contributes to the navigation of the agglomerates that are formed. Moreover, the contact forces among the aggregated nanoparticles and the wall and the Stokes drag force for each particle are considered, while only spherical particles are used in this study. In addition, gravitational forces due to gravity and the force due to buoyancy are included. Finally, Van der Walls force and Brownian motion are taken into account in the simulation. The OpenFoam platform is used for the calculation of the flow field and the uncoupled equations of particles' motion. To verify the optimal gradient magnetic fields, a covariance matrix adaptation evolution strategy (CMAES) is used in order to navigate the particles into the desired area. A desired trajectory is inserted into the computational geometry, which the particles are going to be navigated in. Initially, the CMAES optimization strategy provides the OpenFOAM program with random values of the gradient magnetic field. At the end of each simulation, the computational platform evaluates the distance between the particles and the desired trajectory. The present model can simulate the motion of particles when they are navigated by the magnetic field that is produced by the MRI device. Under the influence of fluid flow, the model investigates the effect of different gradient magnetic fields in order to minimize the distance of particles from the desired trajectory. In addition, the platform can navigate the particles into the desired trajectory with an efficiency between 80-90%. On the other hand, a small number of particles are stuck to the walls and remains there for the rest of the simulation.Keywords: artery, drug, nanoparticles, navigation
Procedia PDF Downloads 1083106 Gentrification and Its Impact on Urbanization in India
Authors: Swapnil Vidhate, Anupama Sharma
Abstract:
At present the world is experiencing an extraordinary rate of urbanization. India is also in a major phase of urbanization. Gentrification is being practiced in India much later compared to western countries as a strategy for urban renewal. The urban fabric in Indian context is composed of multiple layers in it. Thus, the process of gentrification has different typologies, views and impacts in Indian context. It is a curative concept to restructure the declined areas of the city. But it has more negative views compared to positive due to the concerns in the process in India. The paper brings out the impacts of gentrification and concerns related with the process in Indian context with a case example of core city.Keywords: urbanization, urban renewal, gentrification, restructure, core city
Procedia PDF Downloads 7573105 A Study on Big Data Analytics, Applications and Challenges
Authors: Chhavi Rana
Abstract:
The aim of the paper is to highlight the existing development in the field of big data analytics. Applications like bioinformatics, smart infrastructure projects, Healthcare, and business intelligence contain voluminous and incremental data, which is hard to organise and analyse and can be dealt with using the framework and model in this field of study. An organization's decision-making strategy can be enhanced using big data analytics and applying different machine learning techniques and statistical tools on such complex data sets that will consequently make better things for society. This paper reviews the current state of the art in this field of study as well as different application domains of big data analytics. It also elaborates on various frameworks in the process of Analysis using different machine-learning techniques. Finally, the paper concludes by stating different challenges and issues raised in existing research.Keywords: big data, big data analytics, machine learning, review
Procedia PDF Downloads 883104 A Study on Big Data Analytics, Applications, and Challenges
Authors: Chhavi Rana
Abstract:
The aim of the paper is to highlight the existing development in the field of big data analytics. Applications like bioinformatics, smart infrastructure projects, healthcare, and business intelligence contain voluminous and incremental data which is hard to organise and analyse and can be dealt with using the framework and model in this field of study. An organisation decision-making strategy can be enhanced by using big data analytics and applying different machine learning techniques and statistical tools to such complex data sets that will consequently make better things for society. This paper reviews the current state of the art in this field of study as well as different application domains of big data analytics. It also elaborates various frameworks in the process of analysis using different machine learning techniques. Finally, the paper concludes by stating different challenges and issues raised in existing research.Keywords: big data, big data analytics, machine learning, review
Procedia PDF Downloads 963103 Bangladeshi English Teachers’ Understanding of Teacher Autonomy
Authors: Rubaiyat Jahan
Abstract:
This paper reports some findings of a study on the issues related to teacher autonomy in the Bangladeshi school contexts, and data of this research was collected from fourteen practicing English teachers of Bangladesh through semi structured interviews. The theoretical underpinning of teacher autonomy, on an apparent note, focuses on the behavioral aspects of teacher autonomy hence emphasizing mostly on the teachers’ capacity for self-directed acts of teaching and self-directed acts of professional development. Yet, a contemporary literature survey of teacher autonomy seems to be concerned more on the political interpretations of teacher autonomy. Thus, autonomous teachers are expected to generate their personal theories of teaching from their practices. The idea of personal theories of practice upholds the view that along with the teaching, teachers need to engage themselves in various classroom based research with a view to theorising from their practices. The findings of this research indicate enormous evidence of behavioral aspects of teacher autonomy. As the data of this research suggests, the participant teachers’ understanding of classroom situations, their reflections on the situational realities and opting for classroom decisions on the basis of those realizations are some good examples of teacher autonomy. Also, a few teachers’ stated teaching practices seem to reflect, though in a subtle way, their effort of outlining context embedded personal theories of teaching. This paper has got one significant pedagogical implication for the teacher education. Any teacher education must promote the conditions and capabilities for the present and prospective teachers for the role of theorisers in addition to develop their professional, procedural, and personal knowledge base.Keywords: personal theories of practice, self-directed acts of professional development, self-directed acts of teaching, teacher autonomy
Procedia PDF Downloads 349