Search results for: access gain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4907

Search results for: access gain

2657 A Questionnaire Survey Reviewing Radiographers' Knowledge of Computed Tomography Exposure Parameters

Authors: Mohammad Rawashdeh, Mark McEntee, Maha Zaitoun, Mostafa Abdelrahman, Patrick Brennan, Haytham Alewaidat, Sarah Lewis, Charbel Saade

Abstract:

Despite the tremendous advancements that have been generated by Computed Tomography (CT) in the field of diagnosis, concerns have been raised about the potential cancer induction risk from CT because of the exponentially increased use of it in medicine. This study aims at investigating the application and knowledge of practicing radiographers in Jordan about CT radiation. In order to collect the primary data of this study, a questionnaire was designed and distributed by social media using a snow-balling sampling method. The respondents (n=54) have answered 36 questions including the questions about their demographic information, knowledge about Diagnostic Reference Levels (DRLs), CT exposure and adaptation of pediatric patients exposure. The educational level of the respondents was either at a diploma degree (35.2%) or bachelor (64.8%). The results of this study have indicated a good level of general knowledge between radiographers about the relationship between image quality, exposure parameters, and patient dose. The level of knowledge related to DRL was poor where less than 7.4 percent of the sample members were able to give specific values for a number of common anatomical fields, including abdomen, brain, and chest. Overall, Jordanian radiographers need to gain more knowledge about the expected levels of the dose when applying good practice. Additional education on DRL or DRL inclusion in educational programs is highlighted.

Keywords: computed tomography, CT scan, DRLs, exposure parameters, image quality, radiation dose

Procedia PDF Downloads 126
2656 Role of Islamic Economic System for Sustainabe Development

Authors: Yahaya Sulaiman, Ibrahim Muhammad Yakuba, Abubakar Usman

Abstract:

In this paper, we discuss that Sustainable Development Goals are in consonance with Islamic ethos and philosophy. Islam made emphasize on human well-being from spiritual, physiological, intellectual and economic perspectives. Islamic worldview and values framework strengthens moral consciousness, urge pro-social behaviour and engender environmental ethics which can help in influencing our attitudes towards meeting sustainable development challenges. Islamic social finance institutions like Zakat and Waqf can contribute towards scaling up efforts in commercially non-viable, but socially vital projects and programs. There is much potential for Islamic finance to promote sustainable economic development through such approaches as widening access to finance, financing infrastructure projects, and expanding the reach of Takaful. Real sector based productive enterprise in Islamic finance has positive implications for the ecosystem. Risk-sharing shifts the emphasis from credit-worthiness of the borrower to be placed on the value creation and economic viability of investments that create new wealth. Islamic social finance package can cater to the financially excluded households.

Keywords: assessment, Islamic, economic, sustainable, development

Procedia PDF Downloads 50
2655 Dietary Effect of Probiotic Bacteria, Bacillus amyloliquefaciens JFP-2 Isolate from Jeju Island`s Traditional Fermented Food, on Innate Immune Response of Oplegnathus fasciatus Challenged with Vibrio anguillarum

Authors: Dong Hwi Kim, Dharaneedharan Subramanian, So Hyun Park, Ha-Ri Choi, Ji-Hyung Kim, Dong-Hoon Lee, Moon Soo Heo

Abstract:

The present study was performed to evaluate the use of Bacillus amyloliquefaciens JFP-2 isolated from a traditional fermented sea food, as probiotic bacteria in the diets for Rock-bream, Oplegnathus faciatus. A total of 180 fish (187.4 ± 2.7 g) were divided into two groups, control (C) and probiotic (P) group (90 fish per group) in triplicate. C group was fed with basal diet without probiotic, while P group was fed with B. amyloliquefaciens spores at concentration of 1.4 x 106 colony forming units per gram (CFU/g) of feed. After two months of feeding experiments, P group fish showed significant improvements in body weight (BW), weight gain (WG), specific growth rate (SGR) and food conversion ratio (FCR) compared with C group. Also, bi-weekly assessment of serum protein, glucose, fatty acid profile showed a significant increase in probiotic fed fish than that of control fish group. Similar increase in serum antioxidant and lysozyme activity was found in probiotic fed fish group. Twenty days challenge experiment shows decrease mortality in probiotic fed fish group when compared with that of control group. Hence, these results indicate that the use of B. amyloliquefaciens JFP-2 as a feed supplement, is beneficial to improve the health status of Oplegnathus fasciatus challenged with Vibrio anguillarum.

Keywords: Bacillus amyloliquefaciens, Oplegnathus fasciatus, probiotic feed, rock bream

Procedia PDF Downloads 244
2654 Marketing Mixed Factors Affecting on Commercial Transactions Expectations through Social Networks

Authors: Ladaporn Pithuk

Abstract:

This study aims to investigate the marketing mixed factors that affecting on expectations about commercial transactions through social networks. The research method will using quantitative research, data was collected by questionnaires to person have experience access to trading over the internet for 400 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and using quality function deployment for hypothesis testing. Finding the most significant interrelationship between marketing mixed factors and commercial transactions expectations through social networks are product and place the relationship of five ties product and place (location) is involved in almost all will make the site a model that meets the needs of the user visit. In terms of price, the promotion, privacy, personalization and providing a process technical. This will make operations more efficient, reduce confusion, duplication, delays in data transmission, including the creation of different elements in products and services.

Keywords: commercial transactions expectations, marketing mixed factors, social networks, consumer behavior

Procedia PDF Downloads 221
2653 Economic and Social Well-Being for Migrant Workers: Asian Experiences

Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam

Abstract:

In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.

Keywords: Asia, economic well-being, social well-being, migrant workers, human rights

Procedia PDF Downloads 302
2652 Restoring Sagging Neck with Minimal Scar Face Lifting

Authors: Alessandro Marano

Abstract:

The author describes the use of deep plane face lifting and platysmaplasty to treat sagging neck with minimal scars. Series of case study. The author uses a selective deep plane face lift with a minimal access scar that not extend behind the ear lobe, neck liposuction and platysmaplasty to restore the sagging neck; the scars are minimal and no require drainage post-op. The deep plane face lifting can achieve a good result restoring vertical vectors in aging and sagging face, neck district can be treated without cutting the skin behind the ear lobe combining the SMAS vertical suspension and platysmaplasty; surgery can be performed in local anesthesia with sedation in day surgery and fast recovery. Restoring neck sagging without extend scars behind ear lobe is possible in selected patients, procedure is fast, safe, no drainage required, patients are satisfied and healing time is fast and comfortable.

Keywords: face lifting, aesthetic, face, neck, platysmaplasty, deep plane

Procedia PDF Downloads 85
2651 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays

Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal

Abstract:

Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).

Keywords: fault tolerance, FPGA, single event upset, approximate computing

Procedia PDF Downloads 178
2650 Islamic Perception of Modern Democratic System

Authors: Muhammad Khubaib

Abstract:

The Holy Quran purport is to establish a democratic system in which Allah has the right to special authority and He who has the supreme power or sovereignty. The supreme leader, Allah ceded the right to govern to his prophet and whoever would ever rule he would have to govern as a deputy of Prophet of Allah and he will not have the right to deviate from the basic rules of law and constitution. Centuries before the birth of prevailing democracy, Muslim scholars and researchers continuously keep using the term of “Jamhür” (majority) in their books. Islam gives the basic importance to the public opinion to establish a government and make the public confidence necessary for the government. The most effective way to gain the trust of the people in the present to build national institutions is through the vote. Vote testifies in favor of the candidate and majority tells us who is more honest and talented. Each voter stands at the position of trustworthy. To vote a cruel person would be tantamount to treason and even not to vote would be considered as a national offence. After transparent process, the selected member of government would be seemed a fine example of the saying of Muhammad (S.A.W) in which he said; the majority of my people will never be agreed at misleading. In short in this article, there would be discussed democracy in the Islamic perception, while elaborating the western democracy so that it can be cleared that in which way the Holy Quran supported the democracy and what gestures Muhammad (S.A.W) made to spread the democracy and on the basis of those gestures, and how come those gestures are being followed to choose the sacred caliphate. It's hoped that this research would be helpful to refine the democratic system and support to meet the challenges Muslim world are facing.

Keywords: democracy, modern democratic system, respect of majority opinion, vote casting

Procedia PDF Downloads 171
2649 A Review of Effective Gene Selection Methods for Cancer Classification Using Microarray Gene Expression Profile

Authors: Hala Alshamlan, Ghada Badr, Yousef Alohali

Abstract:

Cancer is one of the dreadful diseases, which causes considerable death rate in humans. DNA microarray-based gene expression profiling has been emerged as an efficient technique for cancer classification, as well as for diagnosis, prognosis, and treatment purposes. In recent years, a DNA microarray technique has gained more attraction in both scientific and in industrial fields. It is important to determine the informative genes that cause cancer to improve early cancer diagnosis and to give effective chemotherapy treatment. In order to gain deep insight into the cancer classification problem, it is necessary to take a closer look at the proposed gene selection methods. We believe that they should be an integral preprocessing step for cancer classification. Furthermore, finding an accurate gene selection method is a very significant issue in a cancer classification area because it reduces the dimensionality of microarray dataset and selects informative genes. In this paper, we classify and review the state-of-art gene selection methods. We proceed by evaluating the performance of each gene selection approach based on their classification accuracy and number of informative genes. In our evaluation, we will use four benchmark microarray datasets for the cancer diagnosis (leukemia, colon, lung, and prostate). In addition, we compare the performance of gene selection method to investigate the effective gene selection method that has the ability to identify a small set of marker genes, and ensure high cancer classification accuracy. To the best of our knowledge, this is the first attempt to compare gene selection approaches for cancer classification using microarray gene expression profile.

Keywords: gene selection, feature selection, cancer classification, microarray, gene expression profile

Procedia PDF Downloads 433
2648 Critical Evaluation of the Effects of Conditionalities and Structural Adjustments on the Poor and Developing Countries

Authors: Kazi Rafikoddin

Abstract:

Conditionality refers to a precondition for getting external funds from IMF or WB by giving consent for implementation of the program of economic or political reforms especially relating to open economies. These are put forth under the label of structural adjustment. It is a kind of challenge on the part of borrowing government to exercise balance between the domestic obligations and the expectations of external funding agencies. Countries have to take loans under certain criteria and regulations because better loans are often not readily available. Therefore taking loans and renewing them to pay the same with new interest rates and conditions makes the governments entangled in the circle of debt. They are forced to compete with well-established multinational companies. If their access to industrialized countries' markets is impaired through protectionism, the developed world will be condemning the indebted nations to perpetual financial crisis. On the other hand, the ability to sell their goods free in the world market is reduced through the introduction of Structural Adjustment Programmes. Although there are examples of positive effects on certain economies like India, some Third World, and poor countries have experienced the ire of these remedies. This paper tries to find out the effects of SAPs on some borrowing countries.

Keywords: IMF, world bank, conditionalities, SAPs, Third World Countries

Procedia PDF Downloads 183
2647 Study of Complex (CO) 3Ti (PHND) and CpV (PHND) (PHND = Phénanthridine)

Authors: Akila Tayeb-Benmachiche, Saber-Mustapha Zendaoui, Salah-Eddine Bouaoud, Bachir Zouchoune

Abstract:

The variation of the metal coordination site in π-coordinated polycyclic aromatic hydrocarbons (PAH) corresponds to the haptotropic rearrangement or haptotropic migration in which the metal fragment MLn is considered as the moveable moiety that is shifted between two rings of polycyclic or heteropolycyclic ligands. These structural characteristics and dynamical properties give to this category of transition metal complexes a considerable interest. We have investigated the coordination and the haptotropic shifts of (CO)3Ti and CpV moieties over the phenanthridine aromatic system and according to the metal atom nature. The optimization of (CO)3Ti(PHND) and CpV(PHND), using the Amsterdam Density Functional (ADF) program, without a symmetrical restriction of geometry gives an η6 coordination mode of the C6 and C5N rings, which in turn give rise to a six low-lying deficient 16-MVE of each (CO)3Ti(PHND) and CpV(PHND) structure (three singlet and three triplet state structures for Ti complexes and three triplet and three quintet state structures for V complexes). Thus, the η6–η6 haptotropic migration of the metal fragment MLn from the terminal C6 ring to the central C5N ring has been achieved by a loss of energy. However, its η6–η6 haptotropic migration from central C5N ring to the terminal C6 rings has been accomplished by a gain of energy. These results show the capability of the phenanthridine ligand to adapt itself to the electronic demand of the metal in agreement with the nature of the metal–ligand bonding and demonstrate that this theoretical study can also be applied to large fused π-systems.

Keywords: electronic structure, bonding analysis, density functional theory, coordination chemistry haptotropic migration

Procedia PDF Downloads 285
2646 Awarness the Effect of Quality Food and Nutrition on Health Will Help Develop a Healthy Lifestyle

Authors: Hamnah Nisar

Abstract:

As food is something which is particularly important for survival, in fact, it improves the quality of life and promotes health. Quality food is a key to a healthy life. Consumption of food depends on the knowledge we have regarding the nutrients it contains. Moreover, the awareness and knowledge about something is an initial stage for its improvement. We cannot work on anything unless we have knowledge about it. The pros and cons, effects, causes, dos, and don'ts, especially for an important things like food, are a necessity to learn. That is why my research would be all about analyzing what difference awareness makes on people and how making people more aware about a certain thing can help them improve their lifestyles and bring a positive change for them. The research would be done through questionnaires and interviews among two classes, one would be the upper class and the other would-be lower class. Because the upper class can easily access learning facilities and can know about the new things than the lower class. The questions would be related to what kind of food do they consume, what health issues they face, or what health issues are common among their regions. The results of the research would be helpful to know firstly the effects of awareness and education regarding food on health, how a basic thing like knowledge can have a significant effect on health and can be the cause of several diseases.

Keywords: nutrition, awareness, quality food, knowledge

Procedia PDF Downloads 63
2645 Power and Representation in Female Autobiographies

Authors: Shafag Dadashova

Abstract:

The study discusses relativity of perception and interpretation of power, its interdependence with conformity level of an individual. It describes an autobiography as a form of epiphany. It is suggested that life-writing helps the author analyze the past and define the borders of his personal power and sources of empowerment. As all life-writings deal with behaviors, values, attitudes, relationships and emotions, their investigation requires qualitative methods to understand social norms, gender roles, religion, and their role in empowerment and disempowerment of the author. The study consists of two parts. The first part is theoretical and interrogates the notion of personal power and how writing the own life can bring to conscious empowerment. The second part presents two autobiographies by female authors from two different Muslim cultures who negotiate between the larger nationalist agenda and their own personal concerns. These autobiographies (Tehmina Durrani, Pakistani author ‘My Feudal Lord’, Banine, Azerbaijani writer 'Caucasian days' and 'Parisian days') are the end of their authors’ long silence, their revolt against the conventional norms, their decision to have an agency to confess and protest. These autobiographies are the authors’ attempts to break the established matrix of perceptions, imposed norms, and gain power to build the real picture of their identity. The study sums up with the conclusion that in spite of very similar motifs of female authors to get empowered through self-analysis, different cultures and time create specific subjectivities associated with particular historical events and geographical location.

Keywords: conformity level, empowerment, female autobiography, self-identity

Procedia PDF Downloads 243
2644 Ways for Improving Citation of the Cyrillic Publications

Authors: Victoria Y. Garnova, Vladimir G. Merzlikin, Denis G. Yakovlev, Andrei А. Amelenkov, Sergey V. Khudyakov

Abstract:

Assessment of novelty of studies submitted in Russian publications is given by the method citation analysis to identify scientific research with a high degree of innovation. This may be the basis of recommendations for subjects new joint projects setting of the RF and the EU. Apart from not the best rating of Russian publications (may even its lack) current IT ensure open access to the WEB-sites of these journals that make possible own expertise selective rapid assessment of the advanced developments in Russia by interested foreign investors. Cited foreign literature in Russian journals can become the subject of study to determine the innovative attractiveness of scientific research on the background a specific future-proof abroad. Authors introduced: (1) linguistic impact factor Li-f of journals for describing the share of publications in the majority language; (2) linguistic citation index Lact characterizing the significance of scientific research and linguistic top ones Ltop for evaluation of the spectral width of citing of foreign journals.

Keywords: citation analysis, linguistic citation indexes, linguistic impact factor, innovative projects

Procedia PDF Downloads 302
2643 The Development of an Automated Computational Workflow to Prioritize Potential Resistance Variants in HIV Integrase Subtype C

Authors: Keaghan Brown

Abstract:

The prioritization of drug resistance mutations impacting protein folding or protein-drug and protein-DNA interactions within macromolecular systems is critical to the success of treatment regimens. With a continual increase in computational tools to assess these impacts, the need for scalability and reproducibility became an essential component of computational analysis and experimental research. Here it introduce a bioinformatics pipeline that combines several structural analysis tools in a simplified workflow, by optimizing the present computational hardware and software to automatically ease the flow of data transformations. Utilizing preestablished software tools, it was possible to develop a pipeline with a set of pre-defined functions that will automate mutation introduction into the HIV-1 Integrase protein structure, calculate the gain and loss of polar interactions and calculate the change in energy of protein fold. Additionally, an automated molecular dynamics analysis was implemented which reduces the constant need for user input and output management. The resulting pipeline, Automated Mutation Introduction and Analysis (AMIA) is an open source set of scripts designed to introduce and analyse the effects of mutations on the static protein structure as well as the results of the multi-conformational states from molecular dynamic simulations. The workflow allows the user to visualize all outputs in a user friendly manner thereby successfully enabling the prioritization of variant systems for experimental validation.

Keywords: automated workflow, variant prioritization, drug resistance, HIV Integrase

Procedia PDF Downloads 60
2642 Banking and Accounting Analysis Researches Effect on Environment

Authors: Marina Magdy Naguib Karas

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 29
2641 The Impact of Cognitive Behavioral Therapy in the Management of Perinatal Anxiety

Authors: Kelsey Kimball

Abstract:

Generalized anxiety disorder (GAD) is a common mental health illness affecting approximately 10% of the perinatal population. Research examining cognitive behavioral therapy in this population has only recently become more prevalent though exploring this subject is long overdue. This research examines the impact of cognitive behavioral therapy (CBT) on GAD during the perinatal period. The aim of this project was to identify the most effective way to manage GAD during the perinatal period to provide clinicians with evidence-based methods of caring for this population’s mental health. The research was conducted using several databases to identify ten primary research articles involving anxiety management. A critique and a systematic review of the literature was done. The results of the systematic literature review suggested that CBT had a significant positive impact on perinatal anxiety. Three main themes were derived from the literature: CBT for managing GAD in the general population, CBT for managing GAD in the perinatal population, and CBT’s effect on worry and problematic behaviors in both populations. Nurse practitioners are central in improving access to and treatment of perinatal anxiety disorders.

Keywords: anxiety, cognitive behavioral therapy, nurse practitioner, perinatal

Procedia PDF Downloads 77
2640 A 5G Architecture Based to Dynamic Vehicular Clustering Enhancing VoD Services Over Vehicular Ad hoc Networks

Authors: Lamaa Sellami, Bechir Alaya

Abstract:

Nowadays, video-on-demand (VoD) applications are becoming one of the tendencies driving vehicular network users. In this paper, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different cars included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over VANET. The proposed algorithm takes advantage of the concept of small cells and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)- Advanced network. The proposed clustering algorithm considers multiple characteristics such as the vehicle’s position and acceleration to reduce latency and packet loss. Therefore, each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.

Keywords: video-on-demand, vehicular ad-hoc network, mobility, vehicular traffic load, small cell, wireless backhaul, LTE-advanced, latency, packet loss

Procedia PDF Downloads 122
2639 Social Action for Strengthening Craftsmen's Bargaining Position in Marketing of Product of Tourism Souvenir

Authors: Dumasari, Pujiati Utami

Abstract:

The bargaining position is important for a craftsman in every transaction. A strong bargaining position to encourage craftsmen to gain feasible prices on souvenirs tourism products are sold in several market segments. Some social actions of craftsmen turned out to also determine the conditions bargaining. The main goal of this study is to assess the range of social action to strengthen the bargaining position of craftsmen in marketing various products of tourism souvenir. Location of the study is set intentionally in the Sub-District of Baturaden, Banyumas Regency and also the Sub-District of Purbalingga Wetan, Purbalingga Regency. Both of them are located in the Central Java Province, Indonesia. The research method is the descriptive case study. The results showed that the craftsmen not only carry out one or two type of social action. They do all of the social action: the first is rational based instrumental, the second is rational based on the values, the third is affective, and the fourth is traditional. However, craftsmen also develop other social actions namely: collective, productive and creative action. At respondents in Baturaden dominant type of social action that is instrumentally rational, productive and creative. Meanwhile, respondents in Purbalingga more dominant social action collective, productive and creative. Some social actions implemented simultaneously by the respondents. Because of this, they concluded that the rational action that modified by themselves is more easily for strengthening the bargaining position when facing the craftsmen traders collectors. Collective and rationality social action has the highest sensitivity value for strengthening the bargaining position of craftsmen.

Keywords: bargaining position, craftsmen, strengthen, social actions, marketing of tourism souvenir

Procedia PDF Downloads 280
2638 Identifying Business Opportunities Based on Patent and Trademark Portfolios: a Technology-Based Service Industry Case

Authors: Mingook Lee, Sungjoo Lee

Abstract:

As technology-based service industries grow drastically worldwide; companies are recognizing the importance of market preoccupancy and have made an effort to capture a large market to gain the upper hand. To this end, a focus on patents can be used to determine the properties of a technology, as well as to capture advantages in technical skills, in comparison with the firm’s competitors. However, technology-based services largely depend not only on their technological value but also their economic value, due to the recognized worth that is passed to a plurality of users. Thus, it is important to determine whether there are any competitors in the target areas and what services they provide in any field. Despite this importance, little effort has been made to systematically benchmark competitors in order to identify business opportunities. Thus, this study aims to not only identify each position of technology-centered service companies in complex market dynamics, but also to discover new business opportunities. For this, we try to consider both technology and market environments simultaneously by utilizing patent data as a representative proxy for technology and trademark dates as an index for a firm’s target goods and services. Theoretically, this is one of the earliest attempts to combine patent data and trademark data to analyze corporate strategies. In practice, the research results are expected to be used as a decision criterion to diagnose the economic value that companies can obtain by entering the market, as well as the technological value to be passed onto their customers. Thus, the proposed approach can be useful to support effective technology and business strategies in a firm.

Keywords: business opportunity, patent, Portfolio analysis, trademark

Procedia PDF Downloads 278
2637 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 73
2636 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 55
2635 Population Dynamics and Land Use/Land Cover Change on the Chilalo-Galama Mountain Range, Ethiopia

Authors: Yusuf Jundi Sado

Abstract:

Changes in land use are mostly credited to human actions that result in negative impacts on biodiversity and ecosystem functions. This study aims to analyze the dynamics of land use and land cover changes for sustainable natural resources planning and management. Chilalo-Galama Mountain Range, Ethiopia. This study used Thematic Mapper 05 (TM) for 1986, 2001 and Landsat 8 (OLI) data 2017. Additionally, data from the Central Statistics Agency on human population growth were analyzed. Semi-Automatic classification plugin (SCP) in QGIS 3.2.3 software was used for image classification. Global positioning system, field observations and focus group discussions were used for ground verification. Land Use Land Cover (LU/LC) change analysis was using maximum likelihood supervised classification and changes were calculated for the 1986–2001 and the 2001–2017 and 1986-2017 periods. The results show that agricultural land increased from 27.85% (1986) to 44.43% and 51.32% in 2001 and 2017, respectively with the overall accuracies of 92% (1986), 90.36% (2001), and 88% (2017). On the other hand, forests decreased from 8.51% (1986) to 7.64 (2001) and 4.46% (2017), and grassland decreased from 37.47% (1986) to 15.22%, and 15.01% in 2001 and 2017, respectively. It indicates for the years 1986–2017 the largest area cover gain of agricultural land was obtained from grassland. The matrix also shows that shrubland gained land from agricultural land, afro-alpine, and forest land. Population dynamics is found to be one of the major driving forces for the LU/LU changes in the study area.

Keywords: Landsat, LU/LC change, Semi-Automatic classification plugin, population dynamics, Ethiopia

Procedia PDF Downloads 67
2634 Perceived Influence of Information Communication Technology on Empowerment Amongst the College of Education Physical and Health Education Students in Oyo State

Authors: I. O. Oladipo, Olusegun Adewale Ajayi, Omoniyi Oladipupo Adigun

Abstract:

Information Communication Technology (ICT) have the potential to contribute to different facets of educational development and effective learning; expanding access, promoting efficiency, improve the quality of learning, enhancing the quality of teaching and provide important mechanism for the economic crisis. Considering the prevalence of unemployment among the higher institution graduates in this nation, in which much seems not to have been achieved in this direction. In view of this, the purpose of this study is to create an awareness and enlightenment of ICT for empowerment opportunities after school. A self-developed modified 4-likert scale questionnaire was used for data collection among Colleges of Education, Physical and Health Education students in Oyo State. Inferential statistical analysis of chi-square set at 0.05 alpha levels was used to analyze the stated hypotheses. The study concludes that awareness and enlightenment of ICT significantly influence empowerment opportunities and recommended that college of education students should be encouraged on the application of ICT for job opportunity after school.

Keywords: employment, empowerment, information communication technology, physical education

Procedia PDF Downloads 370
2633 Analyzing the Factors That Influence Students' Professional Identity Using Hierarchical Regression Analysis to Ease Higher Education Transition

Authors: Alba Barbara-i-Molinero, Rosalia Cascon Pereira, Ana Beatriz Hernandez Lara

Abstract:

Our general motivation in undertaking this study is to propose alternative measures to lighten students experienced tensions during the transitions from high school to higher education based on the concept of professional identity strength. In order to do so, we measured the influence that three different factors external motivational conditionals, educational experience conditionals and personal motivation conditionals exerted over students’ professional identity strength and proposed the measures considering the obtained results. By using hierarchical regression analysis we addressed this issue, across disciplines and bachelor degrees, allowing us to gain also deeper insight into first-year university students PID. Our findings suggest that students’ from the different disciplines are influenced by personal motivational conditionals; while students from sciences are also influenced by external motivational conditionals. Based on the obtained results we propose three different alternative educational and recruitment strategies which aim to increase students’ professional identity strength and reduce the tensions generated during high school-university transitions. From this study theoretical contributions regarding the differences in the influence of these factors on students from different bachelor degrees arise; and practical implications for universities, derived from the proposed strategies.

Keywords: professional identity, transitions, higher education, strategies

Procedia PDF Downloads 162
2632 Beyond the Jingoism of “Infodemic” in the Use of Language: Prospects for a Better Nigeria

Authors: Anacletus Ogbunkwu

Abstract:

It is very disheartening that fake news or inaccurate information spread like wide fire and even with greater speed than fact based news/information. The peak of this anomaly is manifest in information management on the Corona virus pandemic, political/leadership based information, ethnic bigotry, unwarranted panics, false alarms, religious fanaticism, and business moguls in their advertorials, comedies, etc. This ugly situation has left Nigeria and her citizens with emotional trauma, unguided agitations, incessant tribal wars, lost of life and property, widened disunity among Nigerian ethnic and religious groups, amplified insecurity, aided election violence, etc. Unfortunately, among the major driving factors to this misinformation and conspiracy are the official/government and private news agencies, gossip, comedians, and social media handles such as; facebook, twitter, whatsapp, instagram, and online news agencies, etc. Thus this paper examines the impact of misinformation here referred to as infodemic. Also, it studies the epistemic effect of misinformation on the citizens of Nigeria in order to find ways of abating this anomaly for a better society. The methods of exposition and hermeneutics will be used in order to gain in-depth study of the details of infodemic in Nigeria and to offer philosophical analysis/interpretation of data as gathered, respectively. This paper concludes that misinformation or fake news has a perilous effect of epistemic mistrust to Nigeria and her citizens; hence infodemic is a cog in the wheel of National progress.

Keywords: nigeria, infodemic, language, media, news, progress

Procedia PDF Downloads 103
2631 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 173
2630 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund

Authors: Chutikarn Sriviboon

Abstract:

The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.

Keywords: effectiveness, quality, labor funds, service

Procedia PDF Downloads 338
2629 Exploring Open Innovation Practice in Start-Ups within an Innovation Ecosystem

Authors: Yassine Mehros, Jean-Michel Degeorge, Abdelaziz Elabjani

Abstract:

Innovation has long been considered the key to the survival, development, and growth of companies. It is a process in which start-ups play a key role, but they suffer from a structural lack of resources, which hinders the development of new innovations and their commercialization. The use of alternative channels to access resources is therefore becoming a necessity to overcome this constraint and identify opportunities. This is why they can be part of large communities of interdependent actors, namely innovation ecosystems that are part of a logic of sharing and open innovation. This research aims to explore and better understand OI in start-ups within an innovation ecosystem. We offer an exploratory qualitative study with start-ups and other actors in the Saint-Étienne innovation ecosystem. Our paper explored the characteristics and main actors of the Saint-Etienne innovation ecosystem, focusing on start-ups. We have identified the motivations of start-up’s adopting OI, its difficulties, its risks, and its impact on their growth. Also, our results show the existence of strong links between the different actors in the ecosystem. In addition, a strong trust has been established between these actors thanks to the geographical proximity; the start-ups manage to get in touch with the different actors of their innovation ecosystem by practicing OI. The actors collaborate on projects involving companies and, in particular, start-ups.

Keywords: open innovation, start-ups, Innovation ecosystem, actors

Procedia PDF Downloads 62
2628 Design and Development of Data Mining Application for Medical Centers in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: data mining, medical record system, systems programming, computing

Procedia PDF Downloads 191