Search results for: long-term services and supports
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4725

Search results for: long-term services and supports

2085 Moderating Role of Fast Food Restaurants Employees Prior Job Experience on the Relationship between Customer Satisfaction and Loyalty

Authors: Mohammed Bala Banki

Abstract:

This paper examines the relationship between employee satisfaction, customer satisfaction and loyalty in fast food restaurants in Nigeria and ascertains if prior job experience of employees before their present job moderate the relationship between customer satisfaction and loyalty. Data for this study were collected from matched pairs of employees and customers of fast restaurants in four Nigerian cities. A Structural Equation Modelling (SEM) was used for the analysis to test the proposed relationships and hierarchical multiple regression was performed in SPSS 22 to test moderating effect. Findings suggest that there is a direct positive and significant relationship between employee satisfaction and customer satisfaction and customer satisfaction and loyalty while the path between employee satisfaction and customer loyalty is insignificant. Results also reveal that employee’s prior job experience significantly moderate the relationship between customer satisfaction and loyalty. Further analysis indicates that employees with more years of experience provide more fulfilling services to restaurants customers. This paper provides some theoretical and managerial implications for academia and practitioners.

Keywords: employee’s satisfaction, customer’s satisfaction, loyalty, employee’s prior job experience, fast food industry

Procedia PDF Downloads 155
2084 Identification of Lean Implementation Hurdles in Indian Industries

Authors: Bhim Singh

Abstract:

Due to increased pressure from global competitors, manufacturing organizations are switching over to lean philosophies from traditional mass production. Lean manufacturing is a manufacturing philosophy which focuses on elimination of various types of wastes and creates maximum value for the end customers. Lean thinking aims to produce high quality products and services at the lowest possible cost with maximum customer responsiveness. Indian Industry is facing lot of problems in this transformation from traditional mass production to lean production. Through this paper an attempt has been made to identify various lean implementation hurdles in Indian industries with the help of a structured survey. Identified hurdles are grouped with the help of factor analysis and rated by calculating descriptive statistics. To show the effect of lean implementation hurdles a hypothesis “Organizations having higher level of lean implementation hurdles will have poor (negative) performance” has been postulated and tested using correlation matrix between performance parameters of the organizations and identified hurdles. The findings of the paper will be helpful to prepare road map to identify and eradicate the lean implementation hurdles.

Keywords: factor analysis, global competition, lean implementation, lean hurdles

Procedia PDF Downloads 237
2083 Risk Assessment for Aerial Package Delivery

Authors: Haluk Eren, Ümit Çelik

Abstract:

Recent developments in unmanned aerial vehicles (UAVs) have begun to attract intense interest. UAVs started to use for many different applications from military to civilian use. Some online retailer and logistics companies are testing the UAV delivery. UAVs have great potentials to reduce cost and time of deliveries and responding to emergencies in a short time. Despite these great positive sides, just a few works have been done for routing of UAVs for package deliveries. As known, transportation of goods from one place to another may have many hazards on delivery route due to falling hazards that can be exemplified as ground objects or air obstacles. This situation refers to wide-range insurance concept. For this reason, deliveries that are made with drones get into the scope of shipping insurance. On the other hand, air traffic was taken into account in the absence of unmanned aerial vehicle. But now, it has been a reality for aerial fields. In this study, the main goal is to conduct risk analysis of package delivery services using drone, based on delivery routes.

Keywords: aerial package delivery, insurance estimation, territory risk map, unmanned aerial vehicle, route risk estimation, drone risk assessment, drone package delivery

Procedia PDF Downloads 318
2082 Coordinated Community Response to Intimate Partner Violence on College Campuses

Authors: Robert D. Hanser, Gina M. Hanser

Abstract:

This paper provides an overview of Coordinated Community Response Teams (CCRT) to Intimate Partner Violence (IPV). The CCRT, as a partnership and collaborative effort between multiple agencies is highlighted. This paper is a legal analysis that showcases new legislation and legal requirements in the United States for investigating, processing, and reporting to acts of victimization have transformed the role of the university’s CCRT on campus, making its mission all the more important, both internal and external to the campus. As a specific example, discussion of the CCRT in Northeast Louisiana at the University of Louisiana at Monroe is provided as an example of involvement in this initiative, where federal grant funding has allowed a micro version of the region’s CCRT to be implemented on that campus. Simultaneously, university personnel also work with external agencies throughout the community in intimate partner violence response. Amidst this, the result is a genuine partnership between practitioners and researchers who work together to provide public awareness, prevention, first-responder, and intervention services in a comprehensive manner throughout Northeast Louisiana.

Keywords: interperaonal violence, sexual assault, dating violence, campus violence

Procedia PDF Downloads 294
2081 The Relations Between Hans Kelsen’s Concept of Law and the Theory of Democracy

Authors: Monika Zalewska

Abstract:

Hans Kelsen was a versatile legal thinker whose achievements in the fields of legal theory, international law, and the theory of democracy are remarkable. All of the fields tackled by Kelsen are regarded as part of his “pure theory of law.” While the link between international law and Kelsen’s pure theory of law is apparent, the same cannot be said about the link between the theory of democracy and his pure theory of law. On the contrary, the general thinking concerning Kelsen’s thought is that it can be used to legitimize authoritarian regimes. The aim of this presentation is to address this concern by identifying the common ground between Kelsen’s pure theory of law and his theory of democracy and to show that they are compatible in a way that his pure theory of law and authoritarianism cannot be. The conceptual analysis of the purity of Kelsen’s theory and his goal of creating ideology-free legal science hints at how Kelsen’s pure theory of law and the theory of democracy are brought together. The presentation will first demonstrate that these two conceptions have common underlying values and meta-ethical convictions. Both are founded on relativism and a rational worldview, and the aim of both is peaceful co-existence. Second, it will be demonstrated that the separation of law and morality provides the maximum space for deliberation within democratic processes. The conclusion of this analysis is that striking similarities exist between Kelsen’s legal theory and his theory of democracy. These similarities are grounded in the Enlightenment tradition and its values, including rationality, a scientific worldview, tolerance, and equality. This observation supports the claim that, for Kelsen, legal positivism and the theory of democracy are not two separate theories but rather stem from the same set of values and from Kelsen’s relativistic worldview. Furthermore, three main issues determine Kelsen’s orientation toward a positivistic and democratic outlook. The first, which is associated with personality type, is the distinction between absolutism and relativism. The second, which is associated with the values that Kelsen favors in the social order, is peace. The third is legality, which creates the necessary condition for democracy to thrive and reveals that democracy is capable of fulfilling Kelsen’s ideal of law at its fullest. The first two categories exist in the background of Kelsen’s pure theory of law, while the latter is an inherent part of Kelsen’s concept of law. The analysis of the text concerning natural law doctrine and democracy indicates that behind the technical language of Kelsen’s pure theory of law is a strong concern with the trends that appeared after World War I. Despite his rigorous scientific mind, Kelsen was deeply humanistic. He tried to create a powerful intellectual weapon to provide strong arguments for peaceful coexistence and a rational outlook in Europe. The analysis provided by this presentation facilitates a broad theoretical, philosophical, and political understanding of Kelsen’s perspectives and, consequently, urges a strong endorsement of Kelsen’s approach to constitutional democracy.

Keywords: hans kelsen, democracy, legal positivism, pure theory of law

Procedia PDF Downloads 88
2080 Identification of Igneous Intrusions in South Zallah Trough-Sirt Basin

Authors: Mohamed A. Saleem

Abstract:

Using mostly seismic data, this study intends to show some examples of igneous intrusions found in some areas of the Sirt Basin and explore the period of their emplacement as well as the interrelationships between these sills. The study area is located in the south of the Zallah Trough, south-west Sirt basin, Libya. It is precisely between the longitudes 18.35ᵒ E and 19.35ᵒ E, and the latitudes 27.8ᵒ N and 28.0ᵒ N. Based on a variety of criteria that are usually used as marks on the igneous intrusions, twelve igneous intrusions (Sills), have been detected and analysed using 3D seismic data. One or more of the following were used as identification criteria: the high amplitude reflectors paired with abrupt reflector terminations, vertical offsets, or what is described as a dike-like connection, the violation, the saucer form, and the roughness. Because of their laying between the hosting layers, the majority of these intrusions are classified as sills. Another distinguishing feature is the intersection geometry link between some of these sills. Every single sill has given a name just to distinguish the sills from each other such as S-1, S-2, and …S-12. To avoid the repetition of description, the common characteristics and some statistics of these sills are shown in summary tables, while the specific characters that are not common and have been noticed for each sill are shown individually. The sills, S-1, S-2, and S-3, are approximately parallel to one other, with the shape of these sills being governed by the syncline structure of their host layers. The faults that dominated the strata (pre-upper Cretaceous strata) have a significant impact on the sills; they caused their discontinuity, while the upper layers have a shape of anticlines. S-1 and S-10 are the group's deepest and highest sills, respectively, with S-1 seated near the basement's top and S-10 extending into the sequence of the upper cretaceous. The dramatic escalation of sill S-4 can be seen in N-S profiles. The majority of the interpreted sills are influenced and impacted by a large number of normal faults that strike in various directions and propagate vertically from the surface to the basement's top. This indicates that the sediment sequences were existed before the sill’s intrusion, were deposited, and that the younger faults occurred more recently. The pre-upper cretaceous unit is the current geological depth for the Sills S-1, S-2 … S-9, while Sills S-10, S-11, and S-12 are hosted by the Cretaceous unit. Over the sills S-1, S-2, and S-3, which are the deepest sills, the pre-upper cretaceous surface has a slightly forced folding, these forced folding is also noticed above the right and left tips of sill S-8 and S-6, respectively, while the absence of these marks on the above sequences of layers supports the idea that the aforementioned sills were emplaced during the early upper cretaceous period.

Keywords: Sirt Basin, Zallah Trough, igneous intrusions, seismic data

Procedia PDF Downloads 93
2079 Consumer Behavior and Marketing Mixed Factor Effect on Consumer Decision Making for Independent Movies Presented in Lido Cinema

Authors: Pongsawee Supanonth

Abstract:

This study aims to investigate the consumer behavior and marketing mixed factor affect on consumer decision making for independent movies presented in Lido cinema. The research method will use quantitative research, data was collected by questionnaires distributed to the audience in the Lido cinema for 400 sample by accidental sampling technique. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and inferential statistic including independent t-test for hypothesis testing. The results showed that marketing mixed factors affecting consumer decision-making for Independent movies presented in Lido cinema by gender as different as less than the 0.05 significance level, it was found that the kind of movie ,quality of theater ,price of ticket, facility of watching movies, staff services and promotion of Lido cinema respectively had a vital influence on their attention and response which makes the advertisement more attractive is in harmony with the research hypotheses also.

Keywords: consumer behavior, marketing mixed factor, resonance, consumer decision making, Lido cinema

Procedia PDF Downloads 294
2078 Application of Lean Manufacturing Tools in Hot Asphalt Production

Authors: S. Bayona, J. Nunez, D. Paez, C. Diaz

Abstract:

The application of Lean manufacturing tools continues to be an effective solution for increasing productivity, reducing costs and eliminating waste in the manufacture of goods and services. This article analyzes the production process of a hot asphalt manufacturing company from an administrative and technical perspective. Three main phases were analyzed, the first phase was related to the determination of the risk priority number of the main operations in asphalt mix production process by an FMEA (Failure Mode Effects Analysis), in the second phase the Value Stream Mapping (VSM) of the production line was performed and in the third phase a SWOT (Strengths, Weaknesses Opportunities, Threats) matrix was constructed. Among the most valued failure modes were the lack training of workers in occupational safety and health issues, the lack of signaling and classification of granulated material, and the overweight of vehicles loaded. The analysis of the results in the three phases agree on the importance of training operational workers, improve communication with external actors in order to minimize delays in material orders and strengthen control suppliers.

Keywords: asphalt, lean manufacturing, productivity, process

Procedia PDF Downloads 103
2077 Cases of Violence against Women: Towards a Proposed Plan of Action

Authors: Murphy P. Mohammed, Rita E. Pulmano

Abstract:

This study determined the cases of violence against women in selected barangays of Tarlac City. In this research, the following questions were answered: what is the description of the cases on violence against women?; what are the causes of violence against women?; what support/assistance is provided by the LGUs?; and what plan of action can be proposed to improve the VAW services of the barangays? The methodologies used in the present study are qualitative and descriptive researches. The researchers used documentary analysis and interview to gather data. The subjects of the study are violence against women survivors from the selected ten (10) populous barangays of Tarlac City. Physical abuse, mental abuse, threatening, abandonment of children, child support issues, child custody, psychological abuse, economic abuse, and rape are the other recorded cases among the evaluated barangays. Based on the information, the researchers found out that a VAW desk was established in every respondent barangay. This in compliance with Section 12 D, Rule IV of the Rules and Regulations Implementing the Magna Carta of Women, which provides for the establishment of a VAW desk in every barangay to ensure that violence against women cases are fully addressed in a gender-responsive manner.

Keywords: Barangay VAW desk, cases of violence against women, violence against women, women's studies

Procedia PDF Downloads 311
2076 Performance Analysis of a Hybrid Channel for Foglet Assisted Smart Asset Reporting

Authors: Hasan Farahneh

Abstract:

Smart asset management along roadsides and in deserted areas is a topic of deprived attention. We find most of the work in emergency reporting services in intelligent transportation systems (ITS) and rural areas but not much in asset reporting. Currently, available asset management mechanisms are based on scheduled maintenance and do not effectively report any emergency situation in a timely manner. This paper is the continuation of our previous work, in which we proposed the usage of Foglets and VLC link between smart vehicles and road side assets. In this paper, we propose a hybrid communication system for asset management and emergency reporting architecture for smart transportation. We incorporate Foglets along with visible light communication (VLC) and radio frequency (RF) communication. We present the channel model and parameters of a hybrid model to support an intelligent transportation system (ITS) system. Simulations show high improvement in the system performance in terms of communication range and received data. We present a comparative analysis of a hybrid ITS system.

Keywords: Internet of Things, Foglets, VLC, RF, smart vehicle, roadside asset management

Procedia PDF Downloads 115
2075 The Role of Community Activism in Promoting Social Justice around Housing Issues: A Case Study of the Western Cape

Authors: Mapule Maema

Abstract:

The paper aims to highlight the role that community activism has played in promoting social justice around housing issues in the Western Cape. The Western Cape is one of the largest spatially segregated provinces in South Africa which continues to exhibit grave inequalities between cities, townships and farms. These inequalities cut across intersectional issues such as, race, class, gender, and politics. The main challenges facing marginalized communities in the Western Cape include access to housing, land and basic services. This is not peculiar to only the Western Cape, the entire country is facing similar challenges however the Western Cape is seen as a fasted urbanizing province in the country due to tourism. Various social movements have been formed across the country to counter these challenges, however, this paper focuses on the resilience communities have fostered despite the myriad housing and spatial crisis they are faced with. The paper focuses on the Legal Resource’s Centre’s clients from an informal settlement called Imizamo Yethu based in Hout Bay Valley area. The 18 hectare settlement houses approximately 33600 people. On the 21st July 2017, Hout Bay experienced violent protests following an eviction order passed by the City of Cape Town. The protest was characterized by tensions within the community regarding the super-blocking initiative which aims to establish roads in informal settlements to ensure basic services. Residents against the process argued that there were no proper consultations done to educate them on what this process entailed. Public participation is one of the objectives the municipalities aim to promote however it remains a great challenge. In order to highlight the experiences of the LRC clients in relation to what motivated their involvement in the movement, how it felt their participation, and aspirations, the paper will employ qualitative research methods. Qualitative research methods enable the researcher to get a deeper and nuanced understanding of the social world in the eyes of those who experienced it. It is a flexible methodology that enables one to also understand social processes and the significance they generate. Data will be collected through the use of the World Cafe as a focus group method. The World Café is a simple, effective and flexible format for hosting group dialogue. The steps taken when setting up a World Café includes the following: setting the context (why you are bringing people together and what you want to achieve), create hospitality space (make participants feel at home and free to discuss issues), explore questions that matter, connect diverse perspectives (the opportunity to actively contribute your thinking), listen together for patterns and insights, share collective discoveries and learnings. Secondary data will be used to augment the data collected. Stories of impact will be drawn from the exercises. This paper will contribute to the discourse of sustainable housing and urban development and the research outputs will be disseminated to the public for learning.

Keywords: community activism, influence, social justice, development

Procedia PDF Downloads 120
2074 Conducting Computational Physics Laboratory Course Using Cloud Storage Space

Authors: Ajay Wadhwa

Abstract:

A Laboratory course on computational physics is different from the conventional lab course on other topics of physics like Mechanics, Heat, Optics, etc. because it involves active participation of the teacher as well as one-to-one interaction between teacher and the student. The course content requires the teacher to teach programming language as well as numerical methods along with their applications in physics. The task becomes more daunting when about 90% of the students in the class have no previous experience of any programming language. In the presented work, we have described a methodology for conducting the computational physics course by using the Google Drive and Dropitto.me cloud storage services. We have evaluated the performance in a class of sixty students by dividing them equally into four groups. One of the groups was made the peer group on whom the presented methodology was tested. The other groups were taught by using conventional method of classroom lectures. In order to assess our methodology, we analyzed the performance of students in four class tests. A study of certain statistical parameters like the mean, standard deviation, and Z-test hypothesis revealed that the cyber methodology based on cloud storage is more efficient than the conventional method of teaching.

Keywords: computational Physics, Z-test hypothesis, cloud storage, Google drive

Procedia PDF Downloads 289
2073 Architectural Identity in Manifestation of Tall-buildings' Design

Authors: Huda Arshadlamphon

Abstract:

Advancing frontiers of technology and industry is moving rapidly fast influenced by the economic and political phenomena. One vital phenomenon,which has had consolidated the world to a one single village, is Globalization. In response, architecture and the built-environment have faced numerous changes, adjustments, and developments. Tall-buildings, as a product of globalization, represent prestigious icons, symbols, and landmarks for highly economics and advanced countries. Despite the fact, this trend has been encountering several design challenges incorporating architectural identity, traditions, and characteristics that enhance the built-environments' sociocultural values and traditions. The necessity of these values and traditionsform self-solitarily, leading to visual and spatial creativity, independency, and individuality. In other words, they maintain the inherited identity and avoid replications in all means and aspects. This paper, firstly, defines globalization phenomenon, architectural identity, and the concerns of sociocultural values in relation to the traditional characteristics of the built-environment. Secondly, through three case-studies of tall-buildings located in Jeddah city, Saudi Arabia, the Queen's Building, the National Commercial Bank Building (NCB), and the Islamic Development Bank Building; design strategies and methodologies in acclimating architectural identity and characteristics in tall-buildings are discussed. The case-studies highlight buildings' sites and surroundings, concepts and inspirations, design elements, architectural forms and compositions, characteristics, issues, barriers, and trammels facing the designs' decisions, representation of facades, and selection of materials and colors. Furthermore, the research will elucidate briefs of the dominant factors that shape the architectural identity of Jeddah city. In conclusion, the study manifests four tall-buildings' design standards guideline in preserving and developing architectural identity in Jeddah city; the scale of urban and natural environment, the scale of architectural design elements, the integration of visual images, and the creation of spatial scenes and scenarios. The prosed guideline will encourage the development of architectural identity aligned with zeitgeist demands and requirements, supports the contemporary architectural movement toward tall-buildings, and shoresself-solitarily in representing sociocultural values and traditions of the built-environment.

Keywords: architectural identity, built-environment, globalization, sociocultural values and traditions, tall-buildings

Procedia PDF Downloads 153
2072 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 552
2071 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 39
2070 Concurrent Engineering Challenges and Resolution Mechanisms from Quality Perspectives

Authors: Grmanesh Gidey Kahsay

Abstract:

In modern technical engineering applications, quality is defined in two ways. The first one is that quality is the parameter that measures a product or service’s characteristics to meet and satisfy the pre-stated or fundamental needs (reliability, durability, serviceability). The second one is the quality of a product or service free of any defect or deficiencies. The American Society for Quality (ASQ) describes quality as a pursuit of optimal solutions to confirm successes and fulfillment to be accountable for the product or service's requirements and expectations. This article focuses on quality engineering tools in modern industrial applications. Quality engineering is a field of engineering that deals with the principles, techniques, models, and applications of the product or service to guarantee quality. Including the entire activities to analyze the product’s design and development, quality engineering emphasizes how to make sure that products and services are designed and developed to meet consumers’ requirements. This episode acquaints with quality tools such as quality systems, auditing, product design, and process control. The finding presents thoughts that aim to improve quality engineering proficiency and effectiveness by introducing essential quality techniques and tools in some selected industries.

Keywords: essential quality tools, quality systems and models, quality management systems, and quality assurance

Procedia PDF Downloads 138
2069 Understanding the Impact of Consumers’ Perceptions and Attitudes toward Eco-Friendly Hotel Recommended Advertisements on Tourist Buying Behavior

Authors: Cherouk Amr Yassin

Abstract:

This study aims to provide insight into consumer decision-making, which has become very complicated to understand and predict in the existing world of sustainable development. The deficiency of a good understanding of the tourist's perception and attitude toward sustainable development in the tourism industry may impede the ability of organizations to build a sustainable marketing orientation and may negatively influence predicted consumer response. Therefore, this research paper adds further insights into the attitude toward recommended eco-friendly hotel advertisements and their effect on the purchase intention of eco-friendly services. Structural equational modeling was completed to realize the effects of the variables under investigation. The findings revealed that consumer decision-making in choosing eco-friendly hotels is affected by the positive attitude toward sustainable development ads, influenced by informativeness and credibility as values perceived by eco-friendly hotels. This study provides practical implications for tourism, marketers, hotel managers, promoters, and consumers.

Keywords: attitude, consumer behavior, consumer decision making, eco-friendly hotels, perception, the tourism industry

Procedia PDF Downloads 95
2068 Awareness, Use and Searching Behavior of 'Virtua' Online Public Access Catalog Users

Authors: Saira Soroya, Khalid Mahmood

Abstract:

Library catalogs open the door to the library collection. OPAC (Online Public Access Catalog) are one of the services offered by automated libraries. The present study aims to explore user’s awareness, the level of use and their searching behavior of OPAC with a purpose to give suggestions and ways to improve user-friendly features of library OPAC. The population consisted of OPAC users of Lahore University of Management Sciences (LUMS). Convenient sampling technique was carried out. Total sample size was 100 OPAC users. Quantitative research design, based on survey method used to carry out the study. The data collection instrument was adopted. Data was analyzed using SPSS. Results revealed that a considerable number of users were not aware of OPAC i.e. (30%); however, those who were aware were using basic features of the OPAC. It was found that lack of knowledge was considered the frequent reason for not using all features of OPAC. In this regard, it is strongly recommended that compulsory information literacy programme should be established.

Keywords: catalog, OPAC, library automation, usability study, university library

Procedia PDF Downloads 315
2067 A Review of the Agroecological Farming System as a Viable Alternative Food Production Approach in South Africa

Authors: Michael Rudolph, Evans Muchesa, Katiya Yassim, Venkatesha Prasad

Abstract:

Input-intensive production systems characterise industrial agriculture as an unsustainable means to address food and nutrition security and sustainable livelihoods. There is extensive empirical evidence that supports the diversification and reorientation of industrial agriculture and that incorporates ecological practices viewed as essential for achieving balanced and productive farming systems. An agroecological farming system is a viable alternative approach that can improve food production, especially for the most vulnerable communities and households. Furthermore, substantial proof and supporting evidence show that such a system holds the key to increasing dietary diversity at the local level and reducing the multiple health and environmental risks stemming from industrial agriculture. This paper, therefore, aims to demonstrate the benefits of the agroecology food system through an evidenced-based approach that shows how the broader agricultural network structures can play a meaningful role, particularly for impoverished households in today’s reality. The methodology is centered on a structured literature review that analyses urban agriculture, agroecology, and food insecurity. Notably, ground-truthing, practical experiences, and field observation of agroecological farming were deployed. This paper places particular emphasis on the practical application of the agroecological approach in urban and peri-urban settings. Several evaluation reports on local and provincial initiatives clearly show that very few households engage in food gardens and urban agriculture. These households do not make use of their backyards or nearby open spaces for a number of reasons, such as stringent city by-laws, restricted access to land, little or no knowledge of innovative or alternative farming practices, and a general lack of interest. Furthermore, limited resources such as water and energy and lack of capacity building and training implementation are additional constraints that are hampering small scale food gardens and farms in other settings. The Agroecology systems approach is viewed as one of the key solutions to tackling these problems.

Keywords: agroecology, water-energy-food nexus, sutainable development goals, social, environmental and economc impact

Procedia PDF Downloads 93
2066 Effects of Thermal Properties of Aggregate Materials on Energy Consumption and Ghg Emissions of Transportation Infrastructure Assets Construction: Case Study for Japan

Authors: Ali Jamshidi, Kiyofumi Kurumisawa, Toyoharu Nawa

Abstract:

Transportation infrastructure assets can be considered as backbone of transportation system. They are routinely developed and or maintained which can be used effectively for movement of passengers, commodities and providing vital services. However, the infrastructure assets construction, maintenance and rehabilitation significantly depend on non-renewable natural resources, such as carbon-based energy carriers and aggregate materials. In this study, effects of thermal properties of aggregate materials were characterized for production of hot-mix asphalt in Japan, as a case study. The results indicated that incorporation of the aggregate with lower required heat energy significantly reduces fuel consumption greenhouse gas emission, irrespective of physical property of aggregate. The results also clearly showed that as 75% high-energy limestone is replaced with low-energy limestone in producing an asphalt mixture at 180 °C, 97,879 Japanese households would be energized per annum using the saved energy without any modification in the current asphalt mixing plants.

Keywords: zero energy infrastructure, sustainable development, greenhouse gas emission, asphalt pavement

Procedia PDF Downloads 224
2065 Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud

Authors: Maha Shamseddine, Amjad Nusayr, Wassim Itani

Abstract:

In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform.

Keywords: privacy enforcement, platform-as-a-service privacy awareness, cloud computing privacy

Procedia PDF Downloads 207
2064 The Mediation Effect of PTSD and Aggression on the Relationship of Childhood Physical Abuse and Suicidal Behavior in Homeless People

Authors: Jina Hong, Seongeun Ryu, Sungeun You

Abstract:

Suicide rate among homeless people are much higher than one in the general population. The purpose of this study was to examine the mediating effect of PTSD and aggression in the relationship between childhood physical abuse and suicidal behavior among homeless people. One hundred one homeless were recruited from street and shelters in Korea. Face-to-face interviews were conducted by master’s level graduate students or facility employees of shelters. All participants completed the Suicidal Behaviors Questionnaire-Revised (SBQ-R), Life History of Aggression Questionnaire (LHAQ), Primary Care PTSD (PC-PTSD), and Traumatic Life Events Questionnaire (TLEQ). The average age of homeless people participated in the study was 55.2 years (SD = 10.7) with the age range of 30 to 87. Results indicated that PTSD symptoms and aggression fully mediated the relationship between childhood physical abuse and suicidal behavior among the homeless. These findings suggest the need for trauma-informed care for the homeless, and warrant the need for psychological services for PTSD and aggression in order to reduce suicide risk among homeless people.

Keywords: aggression, homeless, PTSD, suicidal behavior

Procedia PDF Downloads 364
2063 Correlation of Empathy with Job Satisfaction and Stress of Social Workers

Authors: Theodosios Paralikas, Evangelia Kotrotsiou, Mairy Gouva, Manolis Mentis, Stiliani Stavrotheodorou, Stiliani Kotrotsiou, Maria Malliarou

Abstract:

There is a big discussion in the international literature on empathy, job satisfaction and job occupational among various of disciplines, including social workers. Νevertheless these parameters have not been specifically studied in the Greek territory. This paper aims to study empathy of social workers, to produce results related to whether empathy is influenced by demographic factors such as gender, age, marital status, level of education and study their perceived stress levels and also the satisfaction they derive from their work. For the first time, an attempt is made to link the empathy of these professionals to their job satisfaction and their anxiety. The sample of this survey consists of 165 social workers working on providers of public and private social services. The results showed that social workers have high levels of empathy contrary to the perceived stress levels which were low to moderate. Regarding the field of the job satisfaction, the survey showed that social workers are very satisfied with their workpiece and workplace. The survey shows no significant relationship between empathy and demographic factors, but there is a significant relationship between empathy and the workpiece/job satisfaction and the feeling of success.

Keywords: empathy, stress, job satisfaction, social workers

Procedia PDF Downloads 150
2062 Detecting Potential Geothermal Sites by Using Well Logging, Geophysical and Remote Sensing Data at Siwa Oasis, Western Desert, Egypt

Authors: Amr S. Fahil, Eman Ghoneim

Abstract:

Egypt made significant efforts during the past few years to discover significant renewable energy sources. Regions in Egypt that have been identified for geothermal potential investigation include the Gulf of Suez and the Western Desert. One of the most promising sites for the development of Egypt's Northern Western Desert is Siwa Oasis. The geological setting of the oasis, a tectonically generated depression situated in the northernmost region of the Western desert, supports the potential for substantial geothermal resources. Field data obtained from 27 deep oil wells along the Western Desert included bottom-hole temperature (BHT) depth to basement measurements, and geological maps; data were utilized in this study. The major lithological units, elevation, surface gradient, lineaments density, and remote sensing multispectral and topographic were mapped together to generate the related physiographic variables. Eleven thematic layers were integrated in a geographic information system (GIS) to create geothermal maps to aid in the detection of significant potential geothermal spots along the Siwa Oasis and its vicinity. The contribution of total magnetic intensity data with reduction to the pole (RTP) to the first investigation of the geothermal potential in Siwa Oasis is applied in this work. The integration of geospatial data with magnetic field measurements showed a clear correlation between areas of high heat flow and magnetic anomalies. Such anomalies can be interpreted as related to the existence of high geothermal energy and dense rock, which also have high magnetic susceptibility. The outcomes indicated that the study area has a geothermal gradient ranging from 18 to 42 °C/km, a heat flow ranging from 24.7 to 111.3 m.W. k−1, a thermal conductivity of 1.3–2.65 W.m−1.k−1 and a measured amplitude temperature maximum of 100.7 °C. The southeastern part of the Siwa Oasis, and some sporadic locations on the eastern section of the oasis were found to have significant geothermal potential; consequently, this location is suitable for future geothermal investigation. The adopted method might be applied to identify significant prospective geothermal energy locations in other regions of Egypt and East Africa.

Keywords: magnetic data, SRTM, depth to basement, remote sensing, GIS, geothermal gradient, heat flow, thermal conductivity

Procedia PDF Downloads 91
2061 Neurophysiology of Domain Specific Execution Costs of Grasping in Working Memory Phases

Authors: Rumeysa Gunduz, Dirk Koester, Thomas Schack

Abstract:

Previous behavioral studies have shown that working memory (WM) and manual actions share limited capacity cognitive resources, which in turn results in execution costs of manual actions in WM. However, to the best of our knowledge, there is no study investigating the neurophysiology of execution costs. The current study aims to fill this research gap investigating the neurophysiology of execution costs of grasping in WM phases (encoding, maintenance, retrieval) considering verbal and visuospatial domains of WM. A WM-grasping dual task paradigm was implemented to examine execution costs. Baseline single task required performing verbal or visuospatial version of a WM task. Dual task required performing the WM task embedded in a high precision grasp to place task. 30 participants were tested in a 2 (single vs. dual task) x 2 (visuo-spatial vs. verbal WM) within subject design. Event related potentials (ERPs) were extracted for each WM phase separately in the single and dual tasks. Memory performance for visuospatial WM, but not for verbal WM, was significantly lower in the dual task compared to the single task. Encoding related ERPs in the single task revealed different ERPs of verbal WM and visuospatial WM at bilateral anterior sites and right posterior site. In the dual task, bilateral anterior difference disappeared due to bilaterally increased anterior negativities for visuospatial WM. Maintenance related ERPs in the dual task revealed different ERPs of verbal WM and visuospatial WM at bilateral posterior sites. There was also anterior negativity for visuospatial WM. Retrieval related ERPs in the single task revealed different ERPs of verbal WM and visuospatial WM at bilateral posterior sites. In the dual task, there was no difference between verbal WM and visuospatial WM. Behavioral and ERP findings suggest that execution of grasping shares cognitive resources only with visuospatial WM, which in turn results in domain specific execution costs. Moreover, ERP findings suggest unique patterns of costs in each WM phase, which supports the idea that each WM phase reflects a separate cognitive process. This study not only contributes to the understanding of cognitive principles of manual action control, but also contributes to the understanding of WM as an entity consisting of separate modalities and cognitive processes.

Keywords: dual task, grasping execution, neurophysiology, working memory domains, working memory phases

Procedia PDF Downloads 410
2060 Silviculture for Climate Change: Future Scenarios for Nigeria Forests

Authors: Azeez O. Ganiyu

Abstract:

Climate change is expected to lead to substantial changes in rainfall patterns in southwest Nigeria, and this may have substantial consequence for forest management and for conservation outcomes throughout the region. We examine three different forest types across an environmental spectrum from semi-arid to humid subtropical and consider their response to water shortages and other environmental stresses; we also explore the potential consequence for conservation and timber production by considering impacts on forest structure and limiting stand density. Analysis of a series of scenarios provides the basis for a critique of existing management practices and suggests practical alternatives to develop resilient forests with minimal diminution of production and environmental services. We specifically discuss practical silviculture interventions that are feasible at the landscape-scale, that are economically viable, and that have the potential to enhance resilience of forest stands. We also discuss incentives to encourage adoption of these approaches by private forest owners. We draw on these case studies in southwestern Nigeria to offer generic principle to assist forest researchers and managers faced with similar challenges elsewhere.

Keywords: climate change, forest, future, silviculture, Nigeria

Procedia PDF Downloads 98
2059 Investigation on Behaviour of Reinforced Concrete Beam-Column Joints Retrofitted with CFRP

Authors: Ehsan Mohseni

Abstract:

The aim of this thesis is to provide numerical analyses of reinforced concrete beams-column joints with/without CFRP (Carbon Fiber Reinforced Polymer) in order to achieve a better understanding of the behaviour of strengthened beamcolumn joints. A comprehensive literature survey prior to this study revealed that published studies are limited to a handful only; the results are inconclusive and some are even contradictory. Therefore in order to improve on this situation, following that review, a numerical study was designed and performed as presented in this thesis. For the numerical study, dimensions, end supports, and characteristics of the beam and column models were the same as those chosen in an experimental investigation performed previously where ten beamcolumn joint were tested tofailure. Finite element analysis is a useful tool in cases where analytical methods are not capable of solving the problem due to the complexities associated with the problem. The cyclic behaviour of FRP strengthened reinforced concrete beam-columns joints is such a case. Interaction of steel (longitudinal and stirrups), concrete and FRP, yielding of steel bars and stirrups, cracking of concrete, the redistribution of stresses as some elements unload due to crushing or yielding and the confinement of concrete due to the presence of FRP are some of the issues that introduce the complexities into the problem.Numerical solutions, however, can provide further in formation about the behaviour in lieu of the costly experiments or complex closed form solutions. This thesis presents the results of a numerical study on beam-column joints subjected to cyclic loads that are strengthened with CFRP wraps or strrips in a variety of configurations. The analyses are performed by Abaqus finite element program and are calibrated with the experiments. A range of issues in beam-column joints including the cracking load, the ultimate load, lateral load-displacement curves of joints, are investigated.The numerical results for different configurations of strengthening are compared. Finally, the computed numerical results are compared with those obtained from experiments. the cracking load, the ultimate load, lateral load-displacement curves obtained from numerical analysis for all joints were in very good agreement with the corresponding experimental ones.The results obtained from the numerical analysis in most cases implies that this method is conservative and therefore can be used in design applications with confidence.

Keywords: numerical analysis, strengthening, CFRP, reinforced concrete joints

Procedia PDF Downloads 331
2058 The Antecedents of Brand Loyalty on Female Cosmetics Buying Behavior

Authors: Velly Anatasia

Abstract:

The worldwide annual expenditure for cosmetics is estimated at U.S. $18 billion and many players in the field are competing aggressively to capture more and more markets. Players in the cosmetics industry strive to be the foremost by establish customer loyalty. Furthermore, customer loyalty is portrayed by brand loyalty. Therefore, brand loyalty is the key determine of winning the competition in tight market. This study examines the influence of brand loyalty on cosmetics buying behavior of female consumers in Jakarta as capital of Indonesia. The seven factors of brand loyalty are brand name, Product quality, price, design, promotion, servicesquality and store environment. The paper adopted descriptive analysis, factor loading and multiple regression approach to test the hypotheses. The data has been collected by using questionnaires which were distributed and self-administered to 125female respondents accustomed using cosmetics. The findings of this study indicated that promotion has shown strong correlation with brand loyalty. The research results showed that there is positive and significant relationship between factors of brand loyalty (brand name, product quality, price, design, promotion, services quality and store environment) with cosmetics brand loyalty.

Keywords: brand loyalty, brand name, product quality, service quality, promotion

Procedia PDF Downloads 373
2057 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 384
2056 Multiperson Drone Control with Seamless Pilot Switching Using Onboard Camera and Openpose Real-Time Keypoint Detection

Authors: Evan Lowhorn, Rocio Alba-Flores

Abstract:

Traditional classification Convolutional Neural Networks (CNN) attempt to classify an image in its entirety. This becomes problematic when trying to perform classification with a drone’s camera in real-time due to unpredictable backgrounds. Object detectors with bounding boxes can be used to isolate individuals and other items, but the original backgrounds remain within these boxes. These basic detectors have been regularly used to determine what type of object an item is, such as “person” or “dog.” Recent advancement in computer vision, particularly with human imaging, is keypoint detection. Human keypoint detection goes beyond bounding boxes to fully isolate humans and plot points, or Regions of Interest (ROI), on their bodies within an image. ROIs can include shoulders, elbows, knees, heads, etc. These points can then be related to each other and used in deep learning methods such as pose estimation. For drone control based on human motions, poses, or signals using the onboard camera, it is important to have a simple method for pilot identification among multiple individuals while also giving the pilot fine control options for the drone. To achieve this, the OpenPose keypoint detection network was used with body and hand keypoint detection enabled. OpenPose supports the ability to combine multiple keypoint detection methods in real-time with a single network. Body keypoint detection allows simple poses to act as the pilot identifier. The hand keypoint detection with ROIs for each finger can then offer a greater variety of signal options for the pilot once identified. For this work, the individual must raise their non-control arm to be identified as the operator and send commands with the hand on their other arm. The drone ignores all other individuals in the onboard camera feed until the current operator lowers their non-control arm. When another individual wish to operate the drone, they simply raise their arm once the current operator relinquishes control, and then they can begin controlling the drone with their other hand. This is all performed mid-flight with no landing or script editing required. When using a desktop with a discrete NVIDIA GPU, the drone’s 2.4 GHz Wi-Fi connection combined with OpenPose restrictions to only body and hand allows this control method to perform as intended while maintaining the responsiveness required for practical use.

Keywords: computer vision, drone control, keypoint detection, openpose

Procedia PDF Downloads 171