Search results for: semantics of business vocabulary and rules
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4501

Search results for: semantics of business vocabulary and rules

1891 The Contemporary Issues of Quality Management: Relationship between Total Quality Management and Knowledge Management

Authors: Mehrnoosh Askarizadeh

Abstract:

To meet the challenges of the new global environment, companies have started paying great attention towards quality management as an integral part of their strategic business plans. The purpose of this article is to investigate the relationship between total quality management (TQM) and knowledge management (KM). Successful total quality management implementation throughout the organizations requires major changes in the main four aspects of knowledge management, namely: Creating, storage, sharing and application. Skill, knowledge and productivity are important factors in organization’s success and have important role. Therefore, TQM management system pays special attention to it. However, knowledge as the source is essential for organization’s survival. Our study points out how the quality management and knowledge management have been incorporated into each other for the development of the quality culture within the organization.

Keywords: knowledge management (KM), total quality management (TQM), organizational performance (OP), deming cycle

Procedia PDF Downloads 481
1890 Implementation of 'Bay Al-Salam' in Agricultural Banking of Bangladesh: An Islamic Banking Perspective

Authors: M. Obydul Haque Kamaly

Abstract:

This paper aims to provide a brief discussion on bay al-salam as a method of implementing Islamic Banking in the agricultural arena of Bangladesh. For this purpose, the nature and conditions of bay al-salam contracts will be first discussed. Next, the paper will focus on the comparison between conventional banks and Islamic banks and should answer how bay al-salam can be used as a popular method in agricultural transactions in the country. The paper is based on secondary data which is to describe bay al-salam as future proceedings for Islamic banking. Evidence suggests Islamic banking is very much practiced like modern conventional banking with certain restrictions imposed by Sharia and addresses a large number of business requirements successfully. Thus, it’s time for us to implement Islamic banking (bay al-salam) on our agricultural arena and to get most benefits from them.

Keywords: bay al-salam, agricultural banking, Islamic banking, implementation

Procedia PDF Downloads 263
1889 Generative Design Method for Cooled Additively Manufactured Gas Turbine Parts

Authors: Thomas Wimmer, Bernhard Weigand

Abstract:

The improvement of gas turbine efficiency is one of the main drivers of research and development in the gas turbine market. This has led to elevated gas turbine inlet temperatures beyond the melting point of the utilized materials. The turbine parts need to be actively cooled in order to withstand these harsh environments. However, the usage of compressor air as coolant decreases the overall gas turbine efficiency. Thus, coolant consumption needs to be minimized in order to gain the maximum advantage from higher turbine inlet temperatures. Therefore, sophisticated cooling designs for gas turbine parts aim to minimize coolant mass flow. New design space is accessible as additive manufacturing is maturing to industrial usage for the creation of hot gas flow path parts. By making use of this technology more efficient cooling schemes can be manufacture. In order to find such cooling schemes a generative design method is being developed. It generates cooling schemes randomly which adhere to a set of rules. These assure the sanity of the design. A huge amount of different cooling schemes are generated and implemented in a simulation environment where it is validated. Criteria for the fitness of the cooling schemes are coolant mass flow, maximum temperature and temperature gradients. This way the whole design space is sampled and a Pareto optimum front can be identified. This approach is applied to a flat plate, which resembles a simplified section of a hot gas flow path part. Realistic boundary conditions are applied and thermal barrier coating is accounted for in the simulation environment. The resulting cooling schemes are presented and compared to representative conventional cooling schemes. Further development of this method can give access to cooling schemes with an even better performance having higher complexity, which makes use of the available design space.

Keywords: additive manufacturing, cooling, gas turbine, heat transfer, heat transfer design, optimization

Procedia PDF Downloads 352
1888 Neuropsychological Disabilities in Executive Functions and Visuospatial Skills of Juvenile Offenders in a Half-Open Program in Santiago De Chile

Authors: Gabriel Sepulveda Navarro

Abstract:

Traditional interventions for young offenders are necessary but not sufficient to tackle the multiple causes of juvenile crime. For instance, interventions offered to young offenders often are verbally mediated and dialogue based, requiring important metacognitive abilities as well as abstract thinking, assuming average performance in a wide variety of skills. It seems necessary to assess a broader set of abilities and functions in order to increase the efficiency of interventions while addressing offending. In order to clarify these assumptions, Stroop Test, as well as Rey-Osterrieth Complex Figure Test were applied to juvenile offenders tried and sentenced for violent crimes in Santiago de Chile. A random sample was drawn from La Cisterna Half-Open Program, consisting of 50 young males between 18 and 24 years old, residing in different districts of Santiago de Chile. The analysis of results suggests a disproportionately elevated incidence of impairments in executive functions and visuospatial skills. As an outcome, over 40% of the sample shows a significant low performance in both assessments, exceeding four times the same prevalence rates among young people in the general population. While executive functions entail working memory (being able to keep information and use it in some way), cognitive flexibility (to think about something in more than one way) and inhibitory control (being able to self-control, ignore distractions and delay immediate gratification), visuospatial skills permit to orientate and organize a planned conduct. All of these abilities are fundamental to the skill of avoiding violent behaviour and abiding by social rules. Understanding the relevance of neurodevelopmental impairments in the onset of violent and criminal behaviour, as well as recidivism, eventually may guide the deployment of a more comprehensive assessment and treatment for juvenile offenders.

Keywords: executive functions, half-open program, juvenile offenders, neurodisabilities, visuospatial skills

Procedia PDF Downloads 148
1887 Relation of Consumer Satisfaction on Organization by Focusing on the Different Aspects of Buying Behavior

Authors: I. Gupta, N. Setia

Abstract:

Introduction. Buyer conduct is a progression of practices or examples that buyers pursue before making a buy. It begins when the shopper ends up mindful of a need or wish for an item, at that point finishes up with the buying exchange. Business visionaries can't generally simply shake hands with their intended interest group people and become more acquainted with them. Research is often necessary, so every organization primarily involves doing continuous research to understand and satisfy consumer needs pattern. Aims and Objectives: The aim of the present study is to examine the different behaviors of the consumer, including pre-purchase, purchase, and post-purchase behavior. Materials and Methods: In order to get results, face to face interview held with 80 people which comprise a larger part of female individuals having upper as well as middle-class status. The prime source of data collection was primary. However, the study has also used the theoretical contribution of many researchers in their respective field. Results: Majority of the respondents were females (70%) from the age group of 20-50. The collected data was analyzed through hypothesis testing statistical techniques such as correlation analysis, single regression analysis, and ANOVA which has rejected the null hypothesis that there is no relation between researching the consumer behavior at different stages and organizational performance. The real finding of this study is that simply focusing on the buying part isn't enough to gain profits and fame, however, understanding the pre, buy and post-buy behavior of consumer performs a huge role in organization success. The outcomes demonstrated that the organization, which deals with the three phases of research of purchasing conduct is able to establish a great brand image as compare to their competitors. Alongside, enterprises can observe customer conduct in a considerably more proficient manner. Conclusion: The analyses of consumer behavior presented in this study is an attempt to understand the factors affecting consumer purchasing behavior. This study has revealed that those corporations are more successful, which work on understanding buying behavior instead to just focus on the selling products. As a result, organizations perform good and grow rapidly because consumers are the one who can make or break the company. The interviews that were conducted face to face, clearly revealed that those organizations become at top-notch whom consumers are satisfied, not just with product but also with services of the company. The study is not targeting the particular class of audience; however, it brings out benefits to the masses, in particular to business organizations.

Keywords: consumer behavior, pre purchase, post purchase, consumer satisfaction

Procedia PDF Downloads 112
1886 Challenges of Implementing Participatory Irrigation Management for Food Security in Semi Arid Areas of Tanzania

Authors: Pilly Joseph Kagosi

Abstract:

The study aims at assessing challenges observed during the implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation, and literature review. Data collected from the questionnaire was analysed using SPSS while PRA data was analysed with the help of local communities during PRA exercise. Data from other methods were analysed using content analysis. The study revealed that PIM approach has a contribution in improved food security at household level due to the involvement of communities in water management activities and decision making which enhanced the availability of water for irrigation and increased crop production. However, there were challenges observed during the implementation of the approach including; minimum participation of beneficiaries in decision-making during planning and designing stages, meaning inadequate devolution of power among scheme owners. Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However, it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.

Keywords: challenges, participatory approach, irrigation management, food security, semi arid areas

Procedia PDF Downloads 324
1885 Internet Protocol Television: A Research Study of Undergraduate Students Analyze the Effects

Authors: Sabri Serkan Gulluoglu

Abstract:

The study is aimed at examining the effects of internet marketing with IPTV on human beings. Internet marketing with IPTV is emerging as an integral part of business strategies in today’s technologically advanced world and the business activities all over the world are influences with the emergence of this modern marketing tool. As the population of the Internet and on-line users’ increases, new research issues have arisen concerning the demographics and psychographics of the on-line user and the opportunities for a product or service. In recent years, we have seen a tendency of various services converging to the ubiquitous Internet Protocol based networks. Besides traditional Internet applications such as web browsing, email, file transferring, and so forth, new applications have been developed to replace old communication networks. IPTV is one of the solutions. In the future, we expect a single network, the IP network, to provide services that have been carried by different networks today. For finding some important effects of a video based technology market web site on internet, we determine to apply a questionnaire on university students. Recently some researches shows that in Turkey the age of people 20 to 24 use internet when they buy some electronic devices such as cell phones, computers, etc. In questionnaire there are ten categorized questions to evaluate the effects of IPTV when shopping. There were selected 30 students who are filling the question form after watching an IPTV channel video for 10 minutes. This sample IPTV channel is “buy.com”, it look like an e-commerce site with an integrated IPTV channel on. The questionnaire for the survey is constructed by using the Likert scale that is a bipolar scaling method used to measure either positive or negative response to a statement (Likert, R) it is a common system that is used is the surveys. By following the Likert Scale “the respondents are asked to indicate their degree of agreement with the statement or any kind of subjective or objective evaluation of the statement. Traditionally a five-point scale is used under this methodology”. For this study also the five point scale system is used and the respondents were asked to express their opinions about the given statement by picking the answer from the given 5 options: “Strongly disagree, Disagree, Neither agree Nor disagree, Agree and Strongly agree”. These points were also rates from 1-5 (Strongly disagree, Disagree, Neither disagree Nor agree, Agree, Strongly agree). On the basis of the data gathered from the questionnaire some results are drawn in order to get the figures and graphical representation of the study results that can demonstrate the outcomes of the research clearly.

Keywords: IPTV, internet marketing, online, e-commerce, video based technology

Procedia PDF Downloads 240
1884 Disclosure Extension of Oil and Gas Reserve Quantum

Authors: Ali Alsawayeh, Ibrahim Eldanfour

Abstract:

This paper examines the extent of disclosure of oil and gas reserve quantum in annual reports of international oil and gas exploration and production companies, particularly companies in untested international markets, such as Canada, the UK and the US, and seeks to determine the underlying factors that affect the level of disclosure on oil reserve quantum. The study is concerned with the usefulness of disclosure of oil and gas reserves quantum to investors and other users. Given the primacy of the annual report (10-k) as a source of supplemental reserves data about the company and as the channel through which companies disseminate information about their performance, the annual reports for one year (2009) were the central focus of the study. This comparative study seeks to establish whether differences exist between the sample companies, based on new disclosure requirements by the Securities and Exchange Commission (SEC) in respect of reserves classification and definition. The extent of disclosure of reserve is provided and compared among the selected companies. Statistical analysis is performed to determine whether any differences exist in the extent of disclosure of reserve under the determinant variables. This study shows that some factors would affect the extent of disclosure of reserve quantum in the above-mentioned countries, namely: company’s size, leverage and quality of auditor. Companies that provide reserves quantum in detail appear to display higher size. The findings also show that the level of leverage has affected companies’ reserves quantum disclosure. Indeed, companies that provide detailed reserves quantum disclosure tend to employ a ‘high-quality auditor’. In addition, the study found significant independent variable such as Profit Sharing Contracts (PSC). This factor could explain variations in the level of disclosure of oil reserve quantum between the contractor and host governments. The implementation of SEC oil and gas reporting requirements do not enhance companies’ valuation because the new rules are based only on past and present reserves information (proven reserves); hence, future valuation of oil and gas companies is missing for the market.

Keywords: comparison, company characteristics, disclosure, reserve quantum, regulation

Procedia PDF Downloads 405
1883 Adaption to Climate Change as a Challenge for the Manufacturing Industry: Finding Business Strategies by Game-Based Learning

Authors: Jan Schmitt, Sophie Fischer

Abstract:

After the Corona pandemic, climate change is a further, long-lasting challenge the society must deal with. An ongoing climate change need to be prevented. Nevertheless, the adoption tothe already changed climate conditionshas to be focused in many sectors. Recently, the decisive role of the economic sector with high value added can be seen in the Corona crisis. Hence, manufacturing industry as such a sector, needs to be prepared for climate change and adaption. Several examples from the manufacturing industry show the importance of a strategic effort in this field: The outsourcing of a major parts of the value chain to suppliers in other countries and optimizing procurement logistics in a time-, storage- and cost-efficient manner within a network of global value creation, can lead vulnerable impacts due to climate-related disruptions. E.g. the total damage costs after the 2011 flood disaster in Thailand, including costs for delivery failures, were estimated at 45 billion US dollars worldwide. German car manufacturers were also affected by supply bottlenecks andhave close its plant in Thailand for a short time. Another OEM must reduce the production output. In this contribution, a game-based learning approach is presented, which should enable manufacturing companies to derive their own strategies for climate adaption out of a mix of different actions. Based on data from a regional study of small, medium and large manufacturing companies in Mainfranken, a strongly industrialized region of northern Bavaria (Germany) the game-based learning approach is designed. Out of this, the actual state of efforts due to climate adaption is evaluated. First, the results are used to collect single actions for manufacturing companies and second, further actions can be identified. Then, a variety of climate adaption activities can be clustered according to the scope of activity of the company. The combination of different actions e.g. the renewal of the building envelope with regard to thermal insulation, its benefits and drawbacks leads to a specific strategy for climate adaption for each company. Within the game-based approach, the players take on different roles in a fictionalcompany and discuss the order and the characteristics of each action taken into their climate adaption strategy. Different indicators such as economic, ecologic and stakeholder satisfaction compare the success of the respective measures in a competitive format with other virtual companies deriving their own strategy. A "play through" climate change scenarios with targeted adaptation actions illustrate the impact of different actions and their combination onthefictional company.

Keywords: business strategy, climate change, climate adaption, game-based learning

Procedia PDF Downloads 207
1882 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156
1881 Intelligent IT Infrastructure in the Gas and Oil Industry

Authors: Ahmad Fahad Alotaibi, Khalid Hamed Hajri, Humoud Hudiban Rashidi

Abstract:

Intelligent information technology infrastructure is considered one of the enablers to enhance digital transformation in the gas and oil fields to optimize IT infrastructure reliability by supporting operations and maintenance in a safe and secure method to optimize resources. Smart IT buildings, communication rooms and shelters with intelligent technologies can strengthen the performance and profitability of gas and oil companies by ensuring business continuity. This paper describes the advantages of deploying intelligent IT infrastructure in the oil and gas industry by illustrating its positive impacts on some development aspects, for instance, operations, maintenance, safety, security and resource optimization. Moreover, it highlights the challenges and difficulties of providing smart IT services in a remote area and proposes solutions to overcome such difficulties.

Keywords: intelligent IT infrastructure, remote areas, oil and gas field, digitalization

Procedia PDF Downloads 60
1880 Effect of Temperature on the Binary Mixture of Imidazolium Ionic Liquid with Pyrrolidin-2-One: Volumetric and Ultrasonic Study

Authors: T. Srinivasa Krishna, K. Narendra, K. Thomas, S. S. Raju, B. Munibhadrayya

Abstract:

The densities, speeds of sound and refractive index of the binary mixture of ionic liquid (IL) 1-Butyl-3-methylimidazolium bis(trifluoromethylsulfonyl)imide ([BMIM][Imide]) and Pyrrolidin-2-one(PY) was measured at atmospheric pressure, and over the range of temperatures T= (298.15 -323.15)K. The excess molar volume, excess isentropic compressibility, excess speed of sound, partial molar volumes, and isentropic partial molar compressibility were calculated from the values of the experimental density and speed of sound. From the experimental data excess thermal expansion coefficients and isothermal pressure coefficient of excess molar enthalpy at 298.15K were calculated. The results were analyzed and were discussed from the point of view of structural changes. Excess properties were calculated and correlated by the Redlich–Kister and the Legendre polynomial equation and binary coefficients were obtained. Values of excess partial volumes at infinite dilution for the binary system at different temperatures were calculated from the adjustable parameters obtained from Legendre polynomial and Redlich–Kister smoothing equation. Deviation in refractive indices ΔnD and deviation in molar refraction, ΔRm were calculated from the measured refractive index values. Equations of state and several mixing rules were used to predict refractive indices of the binary mixtures and compared with the experimental values by means of the standard deviation and found to be in excellent agreement. By using Prigogine–Flory–Patterson (PFP) theory, the above thermodynamic mixing functions have been calculated and the results obtained from this theory were compared with experimental results.

Keywords: density, refractive index, speeds of sound, Prigogine-Flory-Patterson theory

Procedia PDF Downloads 408
1879 Development of a Fuzzy Logic Based Model for Monitoring Child Pornography

Authors: Mariam Ismail, Kazeem Rufai, Jeremiah Balogun

Abstract:

A study was conducted to apply fuzzy logic to the development of a monitoring model for child pornography based on associated risk factors, which can be used by forensic experts or integrated into forensic systems for the early detection of child pornographic activities. A number of methods were adopted in the study, which includes an extensive review of related works was done in order to identify the factors that are associated with child pornography following which they were validated by an expert sex psychologist and guidance counselor, and relevant data was collected. Fuzzy membership functions were used to fuzzify the associated variables identified alongside the risk of the occurrence of child pornography based on the inference rules that were provided by the experts consulted, and the fuzzy logic expert system was simulated using the Fuzzy Logic Toolbox available in the MATLAB Software Release 2016. The results of the study showed that there were 4 categories of risk factors required for assessing the risk of a suspect committing child pornography offenses. The results of the study showed that 2 and 3 triangular membership functions were used to formulate the risk factors based on the 2 and 3 number of labels assigned, respectively. The results of the study showed that 5 fuzzy logic models were formulated such that the first 4 was used to assess the impact of each category on child pornography while the last one takes the 4 outputs from the 4 fuzzy logic models as inputs required for assessing the risk of child pornography. The following conclusion was made; there were factors that were related to personal traits, social traits, history of child pornography crimes, and self-regulatory deficiency traits by the suspects required for the assessment of the risk of child pornography crimes committed by a suspect. Using the values of the identified risk factors selected for this study, the risk of child pornography can be easily assessed from their values in order to determine the likelihood of a suspect perpetuating the crime.

Keywords: fuzzy, membership functions, pornography, risk factors

Procedia PDF Downloads 129
1878 Gender Discrimination and Pay Gap on Tourism Labor Market

Authors: Alka Obadić

Abstract:

The research concentrates on the role of tourism in generating female employment and on impact of gender discrimination in tourism sector. Unfortunately, in many countries there are still some barriers to the inclusion of women at all hierarchical levels of tourism labor market. Research analysis focuses on EU countries where tourism is a main employer of women. The analysis shows that women represent over third persons employed in the non-financial business economy and almost two thirds in core tourism activities. Women's gross hourly earnings in accommodation and food services were below those of men in the European Union and only countries who recorded increase of gender pay gap from the beginning of crisis are Bulgaria and Croatia. Women in tourism industry are still overrepresented in lower status jobs with fewer opportunities for career progression and are often treated unequally.

Keywords: employment, gender discrimination, tourism, women’s participation

Procedia PDF Downloads 769
1877 Human Trafficking and Prostitution in Amsterdam

Authors: Isabel Roiz, Alejandra Cossio

Abstract:

This essay will talk about the problems of forced prostitution, human trafficking, and sexual exploitation in the Netherlands. This work conveys information from different sources stating the numbers and statistics of human trafficking throughout Europe and the different types of sexual exploitation as well as the means used for coercing victims into this illegal net. The research aims to inform and compare the way this business is handled and the ways used by criminals to lure and retain victims in spite of the law. It also tries to compare the laws in the Netherlands and Sweden regarding prostitution affects the illegal migration problems and how they change the ways those who work as prostitutes are treated. The aim of the paper is to take all of these aspects into consideration and reach a decision of what laws would most beneficiate the victims.

Keywords: human trafficking, prostitution, laws of migration, Amsterdam

Procedia PDF Downloads 348
1876 Extension and Closure of a Field for Engineering Purpose

Authors: Shouji Yujiro, Memei Dukovic, Mist Yakubu

Abstract:

Fields are important objects of study in algebra since they provide a useful generalization of many number systems, such as the rational numbers, real numbers, and complex numbers. In particular, the usual rules of associativity, commutativity and distributivity hold. Fields also appear in many other areas of mathematics; see the examples below. When abstract algebra was first being developed, the definition of a field usually did not include commutativity of multiplication, and what we today call a field would have been called either a commutative field or a rational domain. In contemporary usage, a field is always commutative. A structure which satisfies all the properties of a field except possibly for commutativity, is today called a division ring ordivision algebra or sometimes a skew field. Also non-commutative field is still widely used. In French, fields are called corps (literally, body), generally regardless of their commutativity. When necessary, a (commutative) field is called corps commutative and a skew field-corps gauche. The German word for body is Körper and this word is used to denote fields; hence the use of the blackboard bold to denote a field. The concept of fields was first (implicitly) used to prove that there is no general formula expressing in terms of radicals the roots of a polynomial with rational coefficients of degree 5 or higher. An extension of a field k is just a field K containing k as a subfield. One distinguishes between extensions having various qualities. For example, an extension K of a field k is called algebraic, if every element of K is a root of some polynomial with coefficients in k. Otherwise, the extension is called transcendental. The aim of Galois Theory is the study of algebraic extensions of a field. Given a field k, various kinds of closures of k may be introduced. For example, the algebraic closure, the separable closure, the cyclic closure et cetera. The idea is always the same: If P is a property of fields, then a P-closure of k is a field K containing k, having property, and which is minimal in the sense that no proper subfield of K that contains k has property P. For example if we take P (K) to be the property ‘every non-constant polynomial f in K[t] has a root in K’, then a P-closure of k is just an algebraic closure of k. In general, if P-closures exist for some property P and field k, they are all isomorphic. However, there is in general no preferable isomorphism between two closures.

Keywords: field theory, mechanic maths, supertech, rolltech

Procedia PDF Downloads 373
1875 Awareness and Access to Rapid Diagnostic Tests of HIV, Malaria and Tuberculosis among Rural Pregnant Women of Savannakhet Province, Lao PDR

Authors: Vanphanom Sychareun, Viengnakhone Vongxay, Kongmany Chaleunvong, Pascale Hancart Petitet

Abstract:

Background: Lao PDR still has challenges in preventing and managing health against risk of emerging and re-emerging diseases, particularly HIV/AIDS, tuberculosis and malaria among pregnant women. Community-based intervention for mothers requires more evidences on awareness of such diseases and access to rapid diagnostic tests. The study aims to determine the awareness of pregnant women regarding HIV, TB and Malaria, the access to rapid diagnostic test of such diseases among pregnant women of local community and their factors related. Method: This is a cross sectional study using quantitative approach to explore the awareness of pregnant women on HIV/AIDS/TB and Malaria in Savannakhet province, Lao PDR in three remote districts (Phin, Thapangthong and Atsaphone) of Savannakhet province. The study targeted group was pregnant women at the community level. Sample size for primary data collection of pregnant women was 189. Face-to-face administered questionnaires were applied. Descriptive and inferential statistics were applied to determine the associated factors with awareness of pregnant women on HIV/AIDS/TB and Malaria. This study is under the HEALTH project/ Expertise France. Result: Most of our participants were pregnant at 28 – 42 weeks (50.3%); ranged 4 – 38 weeks. Mean age of pregnant women was 24.3 years old (range: 14 - 48 years old); 15.9% of whom were at age below 19 years. Around 94.2% of respondents works were farming, 54.5% were illiterate, 74.0% were Mon-Kmer ethnic, and 60% had income lower than average. Only 56.6% that have access to ANC, 39.1% started the access to ANC during the first trimester and only 19.6% had visited the ANC for at least four times. Almost pregnant women (and 92.1% and 93.1%) had low to moderate knowledge of HIV and TB respectively, while three-fourth of pregnant women (74.6%) had low to moderate knowledge of malaria. Slightly higher than half of participants (53.4% and 52.9%) had easy access to HIV and TB respectively ; while 72.5% had easy access to malaria. Majority of participants knew where to get tested for malaria (73.5%) and TB (54.5%), but 73.5% did not know where to get tested for HIV. Very few pregnant women (1.6%, 2.1% and 8.5%) experienced having tested for HIV/TB/malaria. respectively. Factors associated with awareness on HIV were occupation as staff, business (OR:5.9; 95% CI:1.2-28.1), upper secondary education (OR: 14.6; 95% CI:3.1-69.2); Mone-Khmer ethnic (OR: 0.4, 95% CI: 0.2-0.8); and attending ANC more than 4 times (OR:4.1, 95%:1.7-9.7). Factors associated with awareness on TB were occupation as staff, business (OR:2.4; 95% CI: 0.7-8.0), upper secondary education (OR: 6.2; 95% CI: 1.9-20.5); Mone-Khmer ethnic (OR: 0.5, 95% CI:0.3-0.9); attending ANC more than 4 times (OR:2.8, 95%:1.2-6.4). Factors associated with awareness on malaria were upper secondary education (OR: 18.1; 95% CI: 2.3-142.9); Mone-Khmer ethnic (OR: 0.2, 95% CI:0.1-0.4); attending ANC more than 4 times (OR:3.6, 95%:1.5-8.8). Conclusion: A very low awareness on HIV, TB and malaria among pregnant women in rural community of Savannakhet triggers the requirement of comprehensive public health intervention on awareness and access to prevention against emerging diseases for all pregnant women. Future intervention should focus on providing more knowledge to pregnant women during ANC and encouraging them to attend ANC more than 4 times.

Keywords: pregnant women, HIV, tuberculosis, malaria, awareness, Laos

Procedia PDF Downloads 87
1874 Development and Preliminary Testing of the Dutch Version of the Program for the Education and Enrichment of Relational Skills

Authors: Sakinah Idris, Gabrine Jagersma, Bjorn Jaime Van Pelt, Kirstin Greaves-Lord

Abstract:

Background: The PEERS (Program for the Education and Enrichment of Relational Skills) intervention can be considered a well-established, evidence-based intervention in the USA. However, testing the efficacy of cultural adaptations of PEERS is still ongoing. More and more, the involvement of all stakeholders in the development and evaluation of interventions is acknowledged as crucial for the longer term implementation of interventions across settings. Therefore, in the current project, teens with ASD (Autism Spectrum Disorder), their neurotypical peers, parents, teachers, as well as clinicians were involved in the development and evaluation of the Dutch version of PEERS. Objectives: The current presentation covers (1) the formative phase and (2) the preliminary adaptation test phase of the cultural adaptation of evidence-based interventions. In the formative phase, we aim to describe the process of adaptation of the PEERS program to the Dutch culture and care system. In the preliminary adaptation phase, we will present results from the preliminary adaptation test among 32 adolescents with ASD. Methods: In phase 1, a group discussion on common vocabulary was conducted among 70 teenagers (and their teachers) from special and regular education aged 12-18 years old. This inventory concerned 14 key constructs from PEERS, e.g., areas of interests, locations for making friends, common peer groups and crowds inside and outside of school, activities with friends, commonly used ways for electronic communication, ways for handling disagreements, and common teasing comebacks. Also, 15 clinicians were involved in the translation and cultural adaptation process. The translation and cultural adaptation process were guided by the research team, and who included input and feedback from all stakeholders through an iterative feedback incorporation procedure. In phase 2, The parent-reported Social Responsiveness Scale (SRS), the Test of Adolescent Social Skills Knowledge (TASSK), and the Quality of Socialization Questionnaire (QSQ) were assessed pre- and post-intervention to evaluate potential treatment outcome. Results: The most striking cultural adaptation - reflecting the standpoints of all stakeholders - concerned the strategies for handling rumors and gossip, which were suggested to be taught using a similar approach as the teasing comebacks, more in line with ‘down-to-earth’ Dutch standards. The preliminary testing of this adapted version indicated that the adolescents with ASD significantly improved their social knowledge (TASSK; t₃₁ = -10.9, p < .01), social experience (QSQ-Parent; t₃₁ = -4.2, p < .01 and QSQ-Adolescent; t₃₂ = -3.8, p < .01), and in parent-reported social responsiveness (SRS; t₃₃ = 3.9, p < .01). In addition, subjective evaluations of teens with ASD, their parents and clinicians were positive. Conclusions: In order to further scrutinize the effectiveness of the Dutch version of the PEERS intervention, we recommended performing a larger scale randomized control trial (RCT) design, for which we provide several methodological considerations.

Keywords: cultural adaptation, PEERS, preliminary testing, translation

Procedia PDF Downloads 168
1873 Studying the Implementation of 5S System in Egyptian Garment Enterprises

Authors: K. M. Seddik

Abstract:

This paper explores the implementation of 5S elements in the Egyptian garment enterprises. The paper depended on a survey questionnaire (established from Summit Business Solutions, New York) and observations to collect data from the respondents. The observations are based on the on-site visits and interviews with the managers, supervisors and labors. The enterprises divided into three groups according to the nature activity. The first group of enterprises encompassed 49.52% of the total samples, the second and third group of enterprises represented 50.48% The results of this research indicated to the influence of the nature activity in implementing 5S systems and conclude that sustain is a difficult element which involve encourage workers for developing and practicing a highly discipline. In addition the results demonstrate that although the enterprises may achieve a higher executing of 5S elements but it may realize a low coherence in implementation.

Keywords: 5S elements, garment enterprises, implementation, lean manufacturing

Procedia PDF Downloads 258
1872 Knowledge and Skills Requirements for Software Developer Students

Authors: J. Liebenberg, M. Huisman, E. Mentz

Abstract:

It is widely acknowledged that there is a shortage of software developers, not only in South Africa, but also worldwide. Despite reports on a gap between industry needs and software education, the gap has mostly been explored in quantitative studies. This paper reports on the qualitative data of a mixed method study of the perceptions of professional software developers regarding what topics they learned from their formal education and the importance of these topics to their actual work. The analysis suggests that there is a gap between industry’s needs and software development education and the following recommendations are made: 1) Real-life projects must be included in students’ education; 2) Soft skills and business skills must be included in curricula; 3) Universities must keep the curriculum up to date; 4) Software development education must be made accessible to a diverse range of students.

Keywords: software development education, software industry, IT workforce, computing curricula

Procedia PDF Downloads 466
1871 Critical Success Factors of Information Technology Projects

Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: critical success factors, CSF, IT projects, IS projects, software development projects

Procedia PDF Downloads 400
1870 Unlocking Synergy: Exploring the Impact of Integrating Knowledge Management and Competitive Intelligence for Synergistic Advantage for Efficient, Inclusive and Optimum Organizational Performance

Authors: Godian Asami Mabindah

Abstract:

The convergence of knowledge management (KM) and competitive intelligence (CI) has gained significant attention in recent years as organizations seek to enhance their competitive advantage in an increasingly complex and dynamic business environment. This research study aims to explore and understand the synergistic relationship between KM and CI and its impact on organizational performance. By investigating how the integration of KM and CI practices can contribute to decision-making, innovation, and competitive advantage, this study seeks to unlock the potential benefits and challenges associated with this integration. The research employs a mixed-methods approach to gather comprehensive data. A quantitative analysis is conducted using survey data collected from a diverse sample of organizations across different industries. The survey measures the extent of integration between KM and CI practices and examines the perceived benefits and challenges associated with this integration. Additionally, qualitative interviews are conducted with key organizational stakeholders to gain deeper insights into their experiences, perspectives, and best practices regarding the synergistic relationship. The findings of this study are expected to reveal several significant outcomes. Firstly, it is anticipated that organizations that effectively integrate KM and CI practices will outperform those that treat them as independent functions. The study aims to highlight the positive impact of this integration on decision-making, innovation, organizational learning, and competitive advantage. Furthermore, the research aims to identify critical success factors and enablers for achieving constructive interaction between KM and CI, such as leadership support, culture, technology infrastructure, and knowledge-sharing mechanisms. The implications of this research are far-reaching. Organizations can leverage the findings to develop strategies and practices that facilitate the integration of KM and CI, leading to enhanced competitive intelligence capabilities and improved knowledge management processes. Additionally, the research contributes to the academic literature by providing a comprehensive understanding of the synergistic relationship between KM and CI and proposing a conceptual framework that can guide future research in this area. By exploring the synergies between KM and CI, this study seeks to help organizations harness their collective power to gain a competitive edge in today's dynamic business landscape. The research provides practical insights and guidelines for organizations to effectively integrate KM and CI practices, leading to improved decision-making, innovation, and overall organizational performance.

Keywords: Competitive Intelligence, Knowledge Management, Organizational Performance, Incusivity, Optimum Performance

Procedia PDF Downloads 91
1869 The Role of Institutions in Community Wildlife Conservation in Zimbabwe

Authors: Herbert Ntuli, Edwin Muchapondwa

Abstract:

This study used a sample of 336 households and community level data from 30 communities around the Gonarezhou National Park in Zimbabwe to analyse the association between ability to self-organize or cooperation and institutions on one hand and the relationship between success of biodiversity outcomes and cooperation on the other hand. Using both the ordinary least squares and instrumental variables estimation with heteroskedasticity-based instruments, our results confirmed that sound institutions are indeed an important ingredient for cooperation in the respective communities and cooperation positively and significantly affects biodiversity outcomes. Group size, community level trust, the number of stakeholders and punishment were found to be important variables explaining cooperation. From a policy perspective, our results show that external enforcement of rules and regulations does not necessarily translate into sound ecological outcomes but better outcomes are attainable when punishment is rather endogenized by local communities. This seems to suggest that communities should rather be supported in such a way that robust institutions that are tailor made to suit the needs of local condition will emerge that will in turn facilitate good environmental husbandry. Cooperation, training, benefits, distance from the nearest urban canter, distance from the fence, social capital average age of household head, fence and information sharing were found to be very important variables explaining the success of biodiversity outcomes ceteris paribus. Government programmes should target capacity building in terms of institutional capacity and skills development in order to have a positive impact on biodiversity. Hence, the role of stakeholders (e.g., NGOs) in capacity building and government effort should complement each other to ensure that the necessary resources are mobilized and all communities receive the necessary training and resources.

Keywords: institutions, self-organize, common pool resources, wildlife, conservation, Zimbabwe

Procedia PDF Downloads 281
1868 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 166
1867 The Debate over Dutch Universities: An Analysis of Stakeholder Perspectives

Authors: B. Bernabela, P. Bles, A. Bloecker, D. DeRock, M. van Es, M. Gerritse, T. de Jongh, W. Lansing, M. Martinot, J. van de Wetering

Abstract:

A heated debate has been taking place concerning research and teaching at Dutch universities for the last few years. The ministry of science and education has published reports on its strategy to improve university curricula and position the Netherlands as a globally competitive knowledge economy. These reports have provoked an uproar of responses from think tanks, concerned academics, and the media. At the center of the debate is disagreement over who should determine the Dutch university curricula and how these curricula should look. Many stakeholders in the higher education system have voiced their opinion, and some have not been heard. The result is that the diversity of visions is ignored or taken for granted in the official reports. Recognizing this gap in stakeholder analysis, the aim of this paper is to bring attention to the wide range of perspectives on who should be responsible for designing higher education curricula. Based on a previous analysis by the Rathenau Institute, we distinguish five different groups of stakeholders: government, business sector, university faculty and administration, students, and the societal sector. We conducted semi-structured, in-depth interviews with representatives from each stakeholder group, and distributed quantitative questionnaires to people in the societal sector (i.e. people not directly affiliated with universities or graduates). Preliminary data suggests that the stakeholders have different target points concerning the university curricula. Representatives from the governmental sector tend to place special emphasis on the link between research and education, while representatives from the business sector rather focus on greater opportunities for students to obtain practical experience in the job market. Responses from students reflect a belief that they should be able to influence the curriculum in order to compete with other students on the international job market. On the other hand, university faculty expresses concern that focusing on the labor market puts undue pressure on students and compromises the quality of education. Interestingly, the opinions of members of ‘society’ seem to be relatively unchanged by political and economic shifts. Following a comprehensive analysis of the data, we believe that our results will make a significant contribution to the debate on university education in the Netherlands. These results should be regarded as a foundation for further research concerning the direction of Dutch higher education, for only if we take into account the different opinions and views of the various stakeholders can we decide which steps to take. Moreover, the Dutch experience offers lessons to other countries as well. As the internationalization of higher education is occurring faster than ever before, universities throughout Europe and globally are experiencing many of the same pressures.

Keywords: Dutch University curriculum, higher education, participants’ opinions, stakeholder perspectives

Procedia PDF Downloads 343
1866 Financial Market Turmoil and Performance of Islamic Equity Indices

Authors: Abul Shamsuddin

Abstract:

The Islamic stock market indices are constructed by screening out stocks that are incompatible with Islam’s prohibition of interest and certain lines of business. This study examines the effects of Islamic screening on the risk-return characteristics of Islamic vis-a-vis mainstream equity portfolios. We use data on Dow Jones Islamic market indices and FTSE Global Islamic indices over 1993-2013. We observe that Islamic equity indices outperform their mainstream counterparts in both raw and risk-adjusted returns. In addition, Islamic equity indices are more resilient to turbulence in international markets than that of their mainstream counterparts. The findings are robust across a variety of portfolio performance measures.

Keywords: Dow Jones Islamic market index, FTSE global Islamic index, ethical investment, finance

Procedia PDF Downloads 354
1865 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 75
1864 1/Sigma Term Weighting Scheme for Sentiment Analysis

Authors: Hanan Alshaher, Jinsheng Xu

Abstract:

Large amounts of data on the web can provide valuable information. For example, product reviews help business owners measure customer satisfaction. Sentiment analysis classifies texts into two polarities: positive and negative. This paper examines movie reviews and tweets using a new term weighting scheme, called one-over-sigma (1/sigma), on benchmark datasets for sentiment classification. The proposed method aims to improve the performance of sentiment classification. The results show that 1/sigma is more accurate than the popular term weighting schemes. In order to verify if the entropy reflects the discriminating power of terms, we report a comparison of entropy values for different term weighting schemes.

Keywords: 1/sigma, natural language processing, sentiment analysis, term weighting scheme, text classification

Procedia PDF Downloads 203
1863 Developing Index of Democratic Institutions' Vulnerability

Authors: Kamil Jonski

Abstract:

Last year vividly demonstrated, that populism and political instability can endanger democratic institutions in countries regarded as democratic transition champions (Poland) or cornerstones of liberal order (UK, US). So called ‘illiberal democracy’ is winning hearts and minds of voters, keen to believe that rule of strongman is a viable alternative to perceived decay of western values and institutions. These developments pose a serious threat to the democratic institutions (including rule of law), proven critical for both personal freedom and economic development. Although scholars proposed some structural explanations of the illiberal wave (notably focusing on inequality, stagnant incomes and drawbacks of globalization), they seem to have little predictive value. Indeed, events like Trump’s victory, Brexit or Polish shift towards populist nationalism always came as a surprise. Intriguingly, in the case of US election, simple rules like ‘Bread and Peace model’ gauged prospects of Trump’s victory better than pundits and pollsters. This paper attempts to compile set of indicators, in order to gauge various democracies’ vulnerability to populism, instability and pursuance of ‘illiberal’ projects. Among them, it identifies the gap between consensus assessment of institutional performance (as measured by WGI indicators) and citizens’ subjective assessment (survey based confidence in institutions). Plotting these variables against each other, reveals three clusters of countries – ‘predictable’ (good institutions and high confidence, poor institutions and low confidence), ‘blind’ (poor institutions, high confidence e.g. Uzbekistan or Azerbaijan) and ‘disillusioned’ (good institutions, low confidence e.g. Spain, Chile, Poland and US). It seems that this clustering – carried out separately for various institutions (like legislature, executive and courts) and blended with economic indicators like inequality and living standards (using PCA) – offers reasonably good watchlist of countries, that should ‘expect the unexpected’.

Keywords: illiberal democracy, populism, political instability, political risk measurement

Procedia PDF Downloads 204
1862 Teaching Method in Situational Crisis Communication Theory: A Literature Review

Authors: Proud Arunrangsiwed

Abstract:

Crisis management strategies could be found in various curriculums, not only in schools of business, but also schools of communication. Young students, such as freshmen and sophomores of undergraduate schools, may not care about learning crisis management strategies. Moreover, crisis management strategies are not a topic art students are familiar with. The current paper discusses a way to adapt entertainment media into a crisis management lesson, and the importance of learning crisis management strategies in the school of animation. Students could learn crisis management strategies by watching movies with content about a crisis and responding to crisis responding. The students should then participate in follow up discussions related to the strategies that were used to address the crisis, as well as their success in solving the crisis.

Keywords: situational crisis communication theory, crisis response strategies, media effect, unintentional effect

Procedia PDF Downloads 323