Search results for: accelerator implementation ideas
5639 Implementation of Achterbahn-128 for Images Encryption and Decryption
Authors: Aissa Belmeguenai, Khaled Mansouri
Abstract:
In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.Keywords: Achterbahn-128, stream cipher, image encryption, security analysis
Procedia PDF Downloads 5365638 Gamma Irradiation Effects on the Magnetic Properties of Hard Ferrites
Authors: F. Abbas Pour Khotbehsara, B. Salehpour, A. Kianvash
Abstract:
Many industrial materials like magnets need to be tested for the radiation environment expected at linear colliders (LC) where the accelerator and detectors will be subjected to large influences of beta, neutron and gamma’s over their life Gamma irradiation of the permanent sample magnets using a 60Co source was investigated up to an absorbed dose of 700Mrad shows a negligible effect on some magnetic properties of Nd-Fe-B. In this work, it has been tried to investigate the change of some important properties of Barium hexa ferrite. Results showed little decreases of magnetic properties at doses rang of 0.5 to 2.5 Mrad. But at the gamma irradiation dose up to 10 Mrad it is showed a few increase of properties. Also study of gamma irradiation of Nd-Fe-B showed considerably increase of magnetic properties.Keywords: gamma ray irradiation, hard ferrite, magnetic coefficient, magnetic material, radiation dose
Procedia PDF Downloads 2455637 Software Engineering Inspired Cost Estimation for Process Modelling
Authors: Felix Baumann, Aleksandar Milutinovic, Dieter Roller
Abstract:
Up to this point business process management projects in general and business process modelling projects in particular could not rely on a practical and scientifically validated method to estimate cost and effort. Especially the model development phase is not covered by a cost estimation method or model. Further phases of business process modelling starting with implementation are covered by initial solutions which are discussed in the literature. This article proposes a method of filling this gap by deriving a cost estimation method from available methods in similar domains namely software development or software engineering. Software development is regarded as closely similar to process modelling as we show. After the proposition of this method different ideas for further analysis and validation of the method are proposed. We derive this method from COCOMO II and Function Point which are established methods of effort estimation in the domain of software development. For this we lay out similarities of the software development rocess and the process of process modelling which is a phase of the Business Process Management life-cycle.Keywords: COCOMO II, busines process modeling, cost estimation method, BPM COCOMO
Procedia PDF Downloads 4475636 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030
Authors: Ruby A. L. Espineli
Abstract:
The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.Keywords: community perspectives, learning and growth, process excellence, resource management
Procedia PDF Downloads 2375635 Work Ability Program Produces Short-Term Productivity Improvements
Authors: Jukka Surakka, Risto Tuominen, Jukka Piippo
Abstract:
The aim of this work was to study the development of sick leaves and presenteeism during a work ability program. Productivity losses were determined for 70 employees from four organizations and for 42 controls. Numbers of sick leave days (SLD) were collected from employers’ records for three months before the program started and each subsequent three months for one year after the initiation. Presenteeism was determined for four weeks before and after one year of the program implementation. In the first three months of implementation SLD reduced among project members by 55% and increased by 27% among controls (p<0.001). However, during the last two measurement periods, the project subjects had more SLD than they had before the program started (p<0.001), and also more than the controls (p<0.001). Overall, during the one year implementation the program subjects had on average 23% increase in SLD, whereas the controls had 35% decrease in their SLD (p<0.001). Program participants experienced per month 3.6 hours more presenteeism after the one-year implementation and among the controls presenteeism increased by 2.5 hours. Work ability program produced short-term productivity benefits, but with longer program duration the benefits disappeared.Keywords: work ability, absenteeism, presenteeism, productivity, sick leave
Procedia PDF Downloads 2905634 The Implementation of Organizational Ecoinnovativeness as an Expression of a Strategic Approach of an Organization
Authors: Marzena Hajduk-Stelmachowicz
Abstract:
This paper presents the reasons why the implementation of the organizational eco-innovation (based on requirements of the International Standard ISO 14001) can be an expression of a strategic organization approach. An elaboration about different issues associated with the Environmental Management Systems are given.Keywords: envionmental management system, ISO 14001, organizational ecoinnovativeness, ecoinnovation
Procedia PDF Downloads 3185633 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields
Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen
Abstract:
A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.Keywords: white-box, block cipher, composite field, threshold implementation
Procedia PDF Downloads 1785632 Information Technology Governance Implementation and Its Determinants in the Egyptian Market
Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb
Abstract:
Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.Keywords: effective IT governance, Egyptian market, information security, risk controls
Procedia PDF Downloads 1735631 The Place of Instructional Materials in Quality Education at Primary School Level in Katsina State, Nigeria
Authors: Murtala Sale
Abstract:
The use of instructional materials is an indispensable tool that enhances qualitative teaching and learning especially at the primary level. Instructional materials are used to facilitate comprehension of ideas in the learners as well as ensure long term retention of ideas and topics taught to pupils. This study examined the relevance of using instructional materials in primary schools in Katsina State, Nigeria. It employed survey design using cluster sampling technique. The questionnaire was used to gather data for analysis, and statistical and frequency tables were used to analyze the data gathered. The results show that teachers and students alike have realized the effectiveness of modern instructional materials in teaching and learning for the attainment of set objectives in the basic primary education policy. It also discovered that reluctance in the use of instructional materials will hamper the achievement of qualitative primary education. The study therefore suggests that there should be the provision of adequate and up-to-date instructional materials to all primary schools in Katsina State for effective teaching and learning process.Keywords: instructional materials, effective teaching, learning quality, indispensable aspect
Procedia PDF Downloads 2555630 A Scoping Review to Explore the Policies and Procedures Addressing the Implementation of Inclusive Education in BRICS Countries
Authors: Bronwyn S. Mthimunye, Athena S. Pedro, Nicolette V. Roman
Abstract:
Inclusive education is a global concern, in the context of Brazil, Russia, India, China, and South Africa. These countries are all striving for inclusive education, as there are many children excluded from formal schooling. The need for inclusive education is imperative, given the increase in special needs diagnoses. Many children confronted with special needs are still not able to exercise their basic right to education. The aim of conducting this scoping review was to explore the policies and procedures addressing the implementation of inclusive education in Brazil, Russia, India, China, and South Africa. The studies included were published between 2006-2016 and located in Academic Search Complete, ERIC, Medline, PsycARTICLES, JSTOR, and SAGE Journals. Seven articles were included in which all of the articles reported on inclusive education and the status of implementation. The findings identified many challenges faced by Brazil, Russia, India, China, and South Africa that affect the implementation of policies and programmes. Challenges such as poor planning, resource-constrained communities, lack of professionals in schools, and the need for adequate teacher training were identified. Brazil, Russia, India, China, and South Africa are faced with many social and economic challenges, which serves as a barrier to the implementation of inclusive education.Keywords: special needs, inclusion, education, scoping review
Procedia PDF Downloads 3045629 Factors Affecting the Effectiveness of Management Creativity Using Theory Planned Behavior
Authors: Basheer Ahmad Al-Alwan, Ali Ratib Al-Awamreh, Badar Saif Alhatmi
Abstract:
The success of organizations in today's rapidly changing business landscape greatly hinges on the effectiveness of management creativity. This research aimed to uncover the elements influencing the effectiveness of management creativity by employing the Theory of Planned Behavior. The study's findings indicate that two significant predictors of management creativity effectiveness are one's attitude towards it and the subjective norms within the organization. Such results are rather important for the organizations and their leaders who would want to increase management creativity. The attitudes of subordinates towards management creativity should be positive if managers wish to cultivate management creativity among their employees, and the organizational culture must also be one that enhances and supports creative thinking. They should also make available all the requisite resources and support required for the implementation of their creative ideas and let employees participate in the decision-making processes in order to increase their sense of control over their creative activities. This research contributes to the literature on managerial creativity by presenting evidence about the effectiveness of managerial creativity and the strategies aimed at increasing the level of creativity in organizations through empirical insights.Keywords: management creativity, attitudes, subjective norms, perceived behavioral control
Procedia PDF Downloads 175628 Low Frequency Ultrasonic Degassing to Reduce Void Formation in Epoxy Resin and Its Effect on the Thermo-Mechanical Properties of the Cured Polymer
Authors: A. J. Cobley, L. Krishnan
Abstract:
The demand for multi-functional lightweight materials in sectors such as automotive, aerospace, electronics is growing, and for this reason fibre-reinforced, epoxy polymer composites are being widely utilized. The fibre reinforcing material is mainly responsible for the strength and stiffness of the composites whilst the main role of the epoxy polymer matrix is to enhance the load distribution applied on the fibres as well as to protect the fibres from the effect of harmful environmental conditions. The superior properties of the fibre-reinforced composites are achieved by the best properties of both of the constituents. Although factors such as the chemical nature of the epoxy and how it is cured will have a strong influence on the properties of the epoxy matrix, the method of mixing and degassing of the resin can also have a significant impact. The production of a fibre-reinforced epoxy polymer composite will usually begin with the mixing of the epoxy pre-polymer with a hardener and accelerator. Mechanical methods of mixing are often employed for this stage but such processes naturally introduce air into the mixture, which, if it becomes entrapped, will lead to voids in the subsequent cured polymer. Therefore, degassing is normally utilised after mixing and this is often achieved by placing the epoxy resin mixture in a vacuum chamber. Although this is reasonably effective, it is another process stage and if a method of mixing could be found that, at the same time, degassed the resin mixture this would lead to shorter production times, more effective degassing and less voids in the final polymer. In this study the effect of four different methods for mixing and degassing of the pre-polymer with hardener and accelerator were investigated. The first two methods were manual stirring and magnetic stirring which were both followed by vacuum degassing. The other two techniques were ultrasonic mixing/degassing using a 40 kHz ultrasonic bath and a 20 kHz ultrasonic probe. The cured cast resin samples were examined under scanning electron microscope (SEM), optical microscope, and Image J analysis software to study morphological changes, void content and void distribution. Three point bending test and differential scanning calorimetry (DSC) were also performed to determine the thermal and mechanical properties of the cured resin. It was found that the use of the 20 kHz ultrasonic probe for mixing/degassing gave the lowest percentage voids of all the mixing methods in the study. In addition, the percentage voids found when employing a 40 kHz ultrasonic bath to mix/degas the epoxy polymer mixture was only slightly higher than when magnetic stirrer mixing followed by vacuum degassing was utilized. The effect of ultrasonic mixing/degassing on the thermal and mechanical properties of the cured resin will also be reported. The results suggest that low frequency ultrasound is an effective means of mixing/degassing a pre-polymer mixture and could enable a significant reduction in production times.Keywords: degassing, low frequency ultrasound, polymer composites, voids
Procedia PDF Downloads 2975627 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies
Authors: Widhi Hanantyo Suryadinata
Abstract:
Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China
Procedia PDF Downloads 765626 Limits and Barriers of Value Creation and Projects Development: The Case of Tunisian SMEs
Authors: Samira Boussema, Ben Hamed Salah
Abstract:
Entrepreneurship was always considered to be the most appropriate remedy for various economies’ symptoms. It is presented as a complex process that faces several barriers thereby inhibiting a project’s implementation phase. In fact, after a careful review of the literature, we noticed that empirical researches on reasons behind non-developing entrepreneurial projects are very rare, suggesting a lack in modeling the process in general and the pre-start phase in particular. Therefore, in this study we try to identify the main environmental barriers to developing business projects in Tunisia through the study of a representative sample of undeveloped projects. To this end, we used a quantitative approach which allowed us to examine the various barriers encountered by young entrepreneurs during their projects’ implementation. Indeed, by modeling the phenomenon we found that these managers face barriers of legal, financial, educational and government support dimensions.Keywords: entrepreneurship, environmental barriers, non-implementation of projects, structural modeling
Procedia PDF Downloads 3875625 Barriers to the Implementation of Peace Education in Secondary Schools, South Africa
Authors: Ntokozo Dennis Ndwandwe
Abstract:
The aim of the study was to explore the barriers facing the implementation of peace education as a strategy to combat violence in selected secondary schools in the Western Cape Province of South Africa. The problem that motivated this enquiry was the absence of stable peace and the increase of incidents of violence in schools. A qualitative approach was followed when conducting the study, and small samples of three case studies of secondary schools were used. Method used in collecting data consisted of semi-structured interviews; focus group interviews and observation. The participants consisted of the program manager for Quaker for Peace Centre (QPC), three principals, nine teachers, and fifteen learners. Data were analysed by transcribing, organising, marking by hand and coding that produced labels that allowed key points to be highlighted. Findings revealed that the effective implementation of peace education was being constrained by factors such as financial constraints, inadequate time allocated, lack of parental involvement, over work-loaded teachers, negative attitude and other societal influences. It is recommended that teachers should receive an ongoing training for peace education. Therefore, the government should prioritise and provide funds for peace education. In addition, parental involvement should be improved in order to enhance the implementation of peace education in selected secondary schools.Keywords: barriers, implementation, conflict, peace, peace education, conflict resolution, violence
Procedia PDF Downloads 2045624 Customer Relationship Management - “Is It a Myth or a Reality in Indian Consumer Context”
Authors: Manish Manohar Hingorani
Abstract:
The purpose of the research is to find out the level of understanding, adoption, and implementation of CRM in Indian Businesses, either product/ service and the processes which should be followed to ensure minimal to no customer churn and further enhance loyalty. The study used comprehensive qualitative interviews of 36 respondents across mid and senior-level management in product and services organizations of Indian origin. The findings of the study exhibit a gap between the understanding, adoption and implementation of CRM in the Indian context. Different Industries have attributed different levels of understanding, adoption, and limited implementation studies on CRM to the Indian context exists in different industries, but studies related to the consequences of not understanding the true meaning of CRM at the grass root level and further than on non-adoption and non-implementation will have an adverse effect on the customer loyalty, and customer satisfaction leading to customer churn. As this was a qualitative approach, the analysis was content-based and discourse based. The responses were taken from mid to very-senior management decision-makers in organizations of Indian origin.Keywords: customer relationship management, Indian consumer, customer loyalty, customer experience, customer satisfaction
Procedia PDF Downloads 995623 The Study of the Concept of Aesthetics in Architecture Derived from the Ideas of Jörg Kurt Greuther
Authors: Mana Pirhadi, Maryam Pirhadi, Fatemeh Tavakoli
Abstract:
As there are several styles and attitudes among the practitioners of the present time, it is difficult to achieve a definition of beauty for contemporary architecture and aesthetic concepts has different frameworks in various disciplines. Beauty can be regarded as one of the most important elements of architecture; therefore, having a clear understanding of beauty can help architects and audiences to create or analyze an architectural work. This paper investigates the assumption that we can have a clearer understanding of the concept of aesthetics in architecture by analyzing the ideas of the contemporary analyst of architectural aesthetics, Jörg Greuther. Thus, the question is how the concept of aesthetics in architecture will be analyzed in their thoughts. In general, the paper aims to examine aesthetic concepts in the contemporary era that are expressed relying on Greuther's views. The paper adopts a descriptive-analytic approach in terms of methodology. Finally, through the study of the viewpoints of various scholars and specifically considering Greuther's definition that focuses on the effect of psychological-social factors on human perception and formation of the schema, it could be said that aesthetics means to have a good knowledge of truth and understand it.Keywords: aesthetics, beauty perception, contemporary architecture, Jörg Greuther
Procedia PDF Downloads 3375622 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment
Authors: Dengpan Wu, Dan Liu
Abstract:
In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.Keywords: cloud security, memory isolation, xen, virtual machine
Procedia PDF Downloads 4125621 Remedying Students' Misconceptions in Learning of Chemical Bonding and Spontaneity through Intervention Discussion Learning Model (IDLM)
Authors: Ihuarulam A. Ikenna
Abstract:
In the past few decades, the field of chemistry education has grown tremendously and researches indicated that after traditional chemistry instruction students often lacked deep conceptual understanding and failed to integrate their ideas into coherent conceptual framework. For several concepts in chemistry, students at all levels have demonstrated difficulty in changing their initial perceptions. Their perceptions are most often wrong and do not agree with correct scientific concepts. This study explored the effectiveness of intervention discussion sections for a college general chemistry course designed to apply research on students preconceptions, knowledge integration and student explanation. Three interventions discussions lasting three hours on bond energy and spontaneity were done tested and intervention (treatment) students’ performances were compared with that of control group which did not use the experimental pedagogy. Results indicated that this instruction which was capable of identifying students' misconceptions, initial conceptions and integrating those ideas into class discussion led to enhanced conceptual understanding and better achievement for the experimental group.Keywords: remedying, students’ misconceptions, learning, intervention discussion, learning model
Procedia PDF Downloads 4235620 Principle of Progressive Implementation and Education Policy for Former Combatants in Colombia
Authors: Ximena Rincon Castellanos
Abstract:
The research target was analyzed the education public policy of Colombia according to the content of the right to education. One problematic element of that content is the principle of progressive implementation of economic, social and cultural rights. The research included a complete study of public documents and other papers; as well as, one focus group with former combatants in a city where is located one of some 'hogares de paz', which hosts these people after leaving the illegal group. This paper presents a critical approach to the public policy strategies to guarantee education to former combatants and its tension with the right to a progressive implementation. Firstly, education is understood as a technology level without considering higher education. Former combatant attends to SENA and private institutions, which offer technology education and it is counted by the Colombian Government as higher education. Therefore, statistics report a high level of attendance of excombatant to that education level, but actually, they do not expect to study a university carrier. Secondly, the budget approved has been invested in private institutions, despite public institutions are able to include this population and they need more money to strengthen the public offer, which has been considered as a better strategy to ensure education as a human right but not a good, by the special rapporteur on the right to education. As a consequence, the progressive implementation should be a guide to change and improve current strategies, invest the budget available into the public system of education in order to give former combatants the chance to access to universities.Keywords: higher education, progressive implementation, public service, private offering and technology education
Procedia PDF Downloads 1755619 Exploring the Implementation of Building Information Modelling Level 2 in the UK Construction Industry: The Case of Small and Medium-Sized Enterprises
Authors: Khaled Abu Awwad, Abdussalam Shibani, Michel Ghostin
Abstract:
In the last few years, building information modelling (BIM) has been acknowledged as a new technology capable of transforming the construction sector to a collaborated industry. The implementation of BIM in the United Kingdom (UK) construction sector has increased significantly in the last decade, particularly after the UK government mandated the use of BIM in all public projects by 2016. Despite this, there are many indicators that BIM implementation is the main concern for large companies, while small and medium-sized enterprises (SMEs) are lagging behind in adopting and implementing this new technology. This slow adoption of BIM leads to an uncompetitive disadvantage in public projects and possible private projects. On the other hand, there is limited research focusing on the implementation of BIM Level 2 within SMEs. Therefore, the aim of this study is to bridge this gap and provide a conceptual framework to aid SMEs in implementing BIM Level 2. This framework is a result of interpreting qualitative data obtained by conducting semi-structured interviews with BIM experts in the UK construction industry.Keywords: building information modelling, critical success factors, small and medium-sized enterprises, United Kingdom
Procedia PDF Downloads 2125618 Implementation of Modern Information Technologies in Business to Customer Marketing Activity and the Implementation of Pro-Environmental Goals of Enterprises
Authors: M. Łęgowik-Małolepsza
Abstract:
The article discusses the problem related to the use of modern information technologies to achieve pro-environmental marketing goals in business-to-customer (B2C) relationships. The topic is important and topical due to the strong social need to implement the concept of sustainable development. The aim of the article is to understand and evaluate the possibilities of implementing modern information technologies, such as Customer Relationship Management platforms (CRM), in the area of implementing marketing activities of companies operating in the Business to Customer model. In B2C relations, marketing departments struggle with problems resulting from the need for quick customer segmentation and the fragmentation of data existing in many systems, which significantly hinders the achievement of the assumed marketing goals. Therefore, the article proposes the use of modern information technology solutions in the area of marketing activities of enterprises, taking into account their pro-environmental goals. The most important results of the research carried out include an in-depth understanding of the possibilities of implementing modern information technologies to achieve marketing goals in B2C relationships. Moreover, a better understanding of the coexistence of opportunities and threats related to the implementation of marketing activities, taking into account pro-environmental goals and modern technologies, allows for more effective implementation of sustainable development management in enterprises. The methods used to achieve the goal are literature studies, descriptive analysis, and case studies. The study contributes to the discussion on the scope of application of modern information technologies in the area of B2C marketing activity, taking into account the implementation of pro-environmental goals of enterprises.Keywords: B2C marketing activity, implementation of technologies, modern information technologies, pro-environmental activities
Procedia PDF Downloads 1085617 Understanding the Roots of Third World Problems: A Historical and Philosophical Sociology
Authors: Yaser Riki
Abstract:
There are plenty of considerations about the Third World and developing countries, but one of the main issues regarding these areas is how we can study them. This article makes attention to a fundamental way of approaching this subject through the convergence of history, philosophy, and sociology in order to understand the complexity of the Third World countries. These three disciplines are naturally connected and integrated, but they have gradually separated. While sociology has originated from philosophy, this work is an attempt to generate a sociology that incorporates philosophy as well as history at its heart. This is descriptive-analytical research that searches the history of sociology to find works and theories that provide ideas for this purpose, including the sociology of knowledge and science, The German Ideology (Karl Marx and Friedrich Engels), The Protestant Ethic (Max Weber), Ideology and Utopia (Karl Mannheim) and Dialectic of Enlightenment (Horkheimer and Adorno) provide ideas needed for this purpose. The paper offers a methodological and theoretical vision (historical-philosophical sociology) to identify a few factors, such as the system of thought, that are usually invisible and cause problems in societies, especially third-world counties. This is similar to what some of the founders of sociology did in the first world.Keywords: the third world, methodology, sociology, philosophy, history, social change, development, social movements
Procedia PDF Downloads 1095616 Muhammad`s Vision of Interaction with Supernatural Beings According to the Hadith in Comparison to Parallels of Other Cultures
Authors: Vladimir A. Rozov
Abstract:
Comparative studies of religion and ritual could contribute better understanding of human culture universalities. Belief in supernatural beings seems to be a common feature of the religion. A significant part of the Islamic concepts that concern supernatural beings is based on a tradition based on the Hadiths. They reflect, among other things, his ideas about a proper way to interact with supernatural beings. These ideas to a large extent follow from the pre-Islamic religious experience of the Arabs and had been reflected in a number of ritual actions. Some of those beliefs concern a particular function of clothing. For example, it is known that Muhammad was wrapped in clothes during the revelation of the Quran. The same thing was performed by pre-Islamic soothsayers (kāhin) and by rival opponents of Muhammad during their trances. Muhammad also turned the clothes inside out during religious rituals (prayer for rain). Besides these specific ways of clothing which prove the external similarity of Muhammad with the soothsayers and other people who claimed the connection with supernatural forces, the pre-Islamic soothsayers had another characteristic feature which is physical flaws. In this regard, it is worth to note Muhammad's so-called "Seal the Prophecy" (h̠ ātam an- nubūwwa) -protrusion or outgrowth on his back. Another interesting feature of Muhammad's behavior was his attitude to eating onion and garlic. In particular, the Prophet didn`t eat them and forbade people who had tasted these vegetables to enter mosques, until the smell ceases to be felt. The reason for this ban on eating onion and garlic is caused by a belief that the smell of these products prevents communication with otherworldly forces. The materials of the Hadith also suggest that Muhammad shared faith in the apotropical properties of water. Both of these ideas have parallels in other cultures of the world. Muhammad's actions supposed to provide an interaction with the supernatural beings are not accidental. They have parallels in the culture of pre-Islamic Arabia as well as in many past and present world cultures. The latter fact can be explained by the similarity of the universal human beliefs in supernatural beings and how they should be interacted with. Later a number of similar ideas shared by the Prophet Muhammad was legitimized by the Islamic tradition and formed the basis of popular Islamic rituals. Thus, these parallels emphasize the commonality of human notions of supernatural beings and also demonstrate the significance of the pre-Islamic cultural context in analyzing the genesis of Islamic religious beliefs.Keywords: hadith, Prophet Muhammad, ritual, supernatural beings
Procedia PDF Downloads 3915615 Liberal Thoughts in the Modern Centuries
Authors: Siavash Soltani Hemmat
Abstract:
Although 21st-century humanity is at the height of technology and has stepped toward the endless boundaries of knowledge, there are still people in many parts of the world who are deprived of even the most fundamental freedoms. Whereas without freedom, no possible meaning can be imagined for human life, none of the human talents will have the chance to flourish, and that man will be reduced to the level of an animal, removing the obstacles to human freedom, especially from the viewpoint of thoughts, is of utmost importance, in which the liberal ideas of the modern centuries have played an incomparable role. The aim of the present study is to introduce and explain the liberal ideas in the modern centuries and their role in the expansion of human freedoms in order to weaken and discredit the ideological and intellectual barriers to restricting the freedom of individuals and to pave the way for the liberation of humanity. A descriptive method has been employed in order to achieve the objectives of the research. Besides, for data collection, a library method has been conducted. In this study, three ideological teachings of the social contract , resistance against unjust governance and natural law were recognized as the foundations of the realization of fundamental freedoms of the people in the modern centuries and their content was explained and examined.Keywords: freedom, natural law, social contract, resistance
Procedia PDF Downloads 2175614 An Evaluation of the Implementation of Training and Development in a South African Municipality
Authors: Granny K. Lobega, Ntsako Idrs Makamu
Abstract:
The envisaged paper was to evaluate the implementation of training and development in a South African Municipality. The paper adopted a qualitative research approach. Primary data were collected from 20 participants which were sampled from the municipality, and data were collected by using semi-structured interviews. The main objective of the study was to assess the reason for the implementation of training and development program by the municipality. The study revealed that workers are helped to focus, and priority is placed on empowering employees, productivity is increased and contributing to better team morale. The study recommended that the municipality must establish proper procedures to be followed when selecting qualifying employees to attend the training and further use the training audit to establish the necessary training to be offered to qualifying employees.Keywords: training, development, municipality, evaluation, human resource management
Procedia PDF Downloads 1505613 Females’ Usage Patterns of Information and Communication Technologies (ICTs) in the Vhembe District, South Africa
Authors: Fulufhelo Oscar Maphiri-Makananise
Abstract:
The main purpose of this paper is to explore and provide substantiated evidence based on the usage patterns of Information and Communication Technologies (ICTs) by females in the Vhembe District in Limpopo-Province, South Africa. The study presents a broader picture and understanding about the usage of ICTs from female’s perspective. The significance of this study stems from the need to discover the role, relevance and usage patterns of ICTs such as smartphones, computers, laptops, and iPods, internet and social networking sites among females following the trends of new media technologies in the society. The main objective of the study was to investigate the usability and accessibility of ICTs to empower the Vhembe District females in South Africa. The study used quantitative research method together with elements of qualitative research to determine the major ideas, perceptions and usage patterns of ICTs by females in the District. Data collection involved structured and self-administered questionnaire with both closed-ended and open-ended questions. Two groups of respondents participated in this study. Media Studies female students (n=50) at the University of Venda provided their ideas and perceptions about the usefulness and usage patterns of ICTs such as smartphones, internet and computers at the university level, while the second group were (n=50) Makhado comprehensive school learners who also provided their perceptions and ideas about the use of ICTs at the high school level. Also, the study provides a more balanced, accurate and rational results on the pertinent issues that concern the use of ICTs by females in the Vhembe District. The researcher also believes that the findings of the study are useful as a guideline and model for ICT intervention that work as an empowerment to women in South Africa. The study showed that the main purpose of using ICTs by females was to search information for writing assignments, conducting research, dating, exchanging ideas and networking with friends and relatives that are also members of social networking sites and maintaining existing friends in real life. The study further revealed that most females were using ICTs for social purposes and accessing the internet than entertaining themselves. The finding also indicated a high number of females that used ICTs for e-learning (62%) and social purposes (85%). Moreover, the study centred on providing strong insightful information on the females’ usage patterns and their perceptions of ICTs in the Vhembe district of Limpopo province.Keywords: female users, information and communication technologies, internet, usage patterns
Procedia PDF Downloads 2205612 Evaluation of Hospital Antibiotic Policy Implementation at the Oncosurgery Ward: A Six Years' Experience
Authors: Aneta Nitsch-Osuch, Damian Okrucinski, Magdalena Dawgialło, Izabela Gołębiak, Ernest Kuchar
Abstract:
The Hospital Antibiotic Policy (HAP) should be implemented to rationalize the antibiotic use and to decrease the risk of spreading of spreading of resistant bacteria. The aim of our study was to describe the antibiotic consumption patterns at the single oncosurgery ward before and after implementation of the HAP. We conducted a retrospective analysis of the antibiotic use at the Oncosurgery Ward in Warsaw (Poland) in years 2011-2016. Calculations were based on daily defined doses (DDDs), DDDs/100 hospitalizations and DDDs/100 person-days, drug utilization rates (DU 90% and DU 100%) were also analysed. After implementation of the HAP, the total antibiotic consumption increased (365.35 DDD in 2011 vs. 1359,22 DDD in 2016). The significant change was observed in antibiotic consumption patterns: the use of amoxicillin clavulanate and carbapenems or glycopeptides decreased significantly (p < 0,05), while the use of ciprofloxacin and aminoglycosides increased (p < 0,05). The DU100% rate varied from 6 in 2011 to 12 in 2016; while DU 90% rate varied from 2 in 2011 to 3-5 in 2013-2016. Although the implementation of the HAP did not result in the decreased total antibiotic consumption, it provided favorable changes in the antibiotic consumption patterns.Keywords: antibiotics, hospital, policy, stewardship
Procedia PDF Downloads 2495611 Evidence-Based Practice Attributes across Nursing Roles at a Children’s Hospital
Authors: Rose Chapman Rodriguez
Abstract:
Problem: Evidence-based practice (EBP) attributes are significantly associated with EBP implementation science, which improves patient care outcomes. Nurses influence EBP, yet little is known of the specific EBP attributes of pediatric nurses in their clinical sub-specialties. Aim: This study aims to investigate the relationship between nursing academic degree, years of experience, and clinical specialty, with mean survey scores on EBP belief, organizational culture, and implementation scales across all levels of nursing in a Children’s Hospital. Methods: A convenience sample of nurses (n=185) participated in a descriptive, cross-sectional, correlational study in May 2023. The electronic surveys comprised 11 demographic questions and nine survey items from the short-version EBP Beliefs Scale (Cronbach α = 0.81), Organizational Culture and Readiness Scale for System-wide Integration Scale (Cronbach α = 0.87), and EBP Implementation Scale (Cronbach α = 0.89). Findings: EBP belief scores were notably higher in nurses working in neonatology (m=4.33), critical care (m=4.47), and among nurse leaders (m=4.50). There was a statistically significant difference in EBP organizational culture among nurse leaders (m = 3.95, p=0.039) compared to clinical nurses (m = 3.34) and advanced practice nurses (m = 3.34). EBP implementation was favorable in neonatology (m=4.20), acute care (m=4.05), and nurse leaders (m=4.33). No significant difference or correlation was found in EBP belief, organizational culture, or implementation mean scores related to nurses' age, academic nursing degree, or years of experience in our cohort (EBP beliefs (r = -.06, p = .400), organizational readiness (r = .02, p = .770), and implementation scales (r = .01, p = .867). Conclusions: This study identified nurse’s EBP attributes in a Children’s Hospital using key variables studied in EBP social cognitive theory and learning theory. Magnet status, shared governance structure, specialty certification, and nurse leaders play a significant role in favorable EBP culture and implementation. Nurses’ unit level ‘group culture’ may vary depending on the EBP attributes and collaborative efforts of local teams. Opportunities for mentoring were identified, which may continue to enhance EBP implementation science across all nursing roles in our pediatric organization.Keywords: evidence-based practice, peditrics, nursing roles, implementation
Procedia PDF Downloads 735610 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems
Authors: Yong-Kyu Jung
Abstract:
The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity
Procedia PDF Downloads 81