Search results for: office computer users
4973 Risk-Based Computer Auditing and Measures of Prevention
Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Seyd Mohammad Reza Mashhoori
Abstract:
the technology of Computer audit played a major role in the progress and prospects of a proper application to improve the quality and efficiency of audit work. But due to the technical complexity and the specific risks of computer audit, it should be shown effective in audit and preventive action. Mainly through research in this paper, we proposes the causes of audit risk in a computer environment and the risk of further proposals for measures to control, to some extent reduce the risk of computer audit and improve the audit quality.Keywords: computer auditing, risk, measures to prevent, information technology
Procedia PDF Downloads 4904972 Service Users’ Opinions and Experiences of Health Care Practitioners’ Right to Conscientiously Object to Abortion: A Liberal Feminist Approach
Authors: B. Self, V. Fleming, C. Maxwell
Abstract:
The fourth clause of the UK 1967 Abortion Act allows individuals (including health care practitioners) to conscientiously object to participating in an abortion. Individuals are able to object if they consider that participating is incompatible with their religious, moral, philosophical, ethical, or personal beliefs. Currently, there is no research on service users’ opinions and understandings of conscientious objection or the impact of conscientious objection from the UK service users’ perspective. This perspective is imperative in understanding the real-world consequences and impact of conscientious objection and essential when creating policy and guidelines. This qualitative research took a liberal feminist approach. It provided a platform for service users to share their experiences of abortion and conscientious objection, as well as their opinions and understandings of conscientious objection. The method employed was semi-structured interviews. Findings indicated that conscientious objection could work in practice. However, it is currently failing some individuals, as health care practitioners are not always referring and informing service users. Participants didn’t experience burdens such as long waiting times and were still able to access legal abortion. However, participants did experience negative emotional effects, as they were often left feeling scared, angry, and hopeless when they were not referred. Moreover, participants’ opinions on conscientious objection in the UK varied greatly. The majority supported the most common approach within the literature and in practice, whereby health care practitioners are able to object so long as they refer and inform the service user. However, the opinion that health care practitioners should not be allowed to object or should be able to object without referring and informing was also present. Without this research, the impact that conscientious objection is having on service users in the UK and service users’ opinions on conscientious objection wouldn’t be known. These findings will be used to inform national policy and guidelines, making access to abortion fairer and safer for all.Keywords: conscientious objection, abortion, medical ethics, reproductive justice
Procedia PDF Downloads 1454971 Evaluating Daylight Performance in an Office Environment in Malaysia, Using Venetian Blind Systems
Authors: Fatemeh Deldarabdolmaleki, Mohamad Fakri Zaky Bin Ja'afar
Abstract:
This paper presents fenestration analysis to study the balance between utilizing daylight and eliminating the disturbing parameters in a private office room with interior venetian blinds taking into account different slat angles. Mean luminance of the scene and window, luminance ratio of the workplane and window, work plane illumination and daylight glare probability(DGP) were calculated as a function of venetian blind design properties. Recently developed software, analyzing High Dynamic Range Images (HDRI captured by CCD camera), such as radiance based evalglare and hdrscope help to investigate luminance-based metrics. A total of Eight-day measurement experiment was conducted to investigate the impact of different venetian blind angles in an office environment under daylight condition in Serdang, Malaysia. Detailed result for the selected case study showed that artificial lighting is necessary during the morning session for Malaysian buildings with southwest windows regardless of the venetian blind’s slat angle. However, in some conditions of afternoon session the workplane illuminance level exceeds the maximum illuminance of 2000 lx such as 10° and 40° slat angles. Generally, a rising trend is discovered toward mean window luminance level during the day. All the conditions have less than 10% of the pixels exceeding 2000 cd/m² before 1:00 P.M. However, 40% of the selected hours have more than 10% of the scene pixels higher than 2000 cd/m² after 1:00 P.M. Surprisingly in no blind condition, there is no extreme case of window/task ratio, However, the extreme cases happen for 20°, 30°, 40° and 50° slat angles. As expected mean window luminance level is higher than 2000 cd/m² after 2:00 P.M for most cases except 60° slat angle condition. Studying the daylight glare probability, there is not any DGP value higher than 0.35 in this experiment, due to the window’s direction, location of the building and studied workplane. Specifically, this paper reviews different blind angle’s response to the suggested metrics by the previous standards, and finally conclusions and knowledge gaps are summarized and suggested next steps for research are provided. Addressing these gaps is critical for the continued progress of the energy efficiency movement.Keywords: daylighting, office environment, energy simulation, venetian blind
Procedia PDF Downloads 2284970 Resolution of Artificial Intelligence Language Translation Technique Alongside Microsoft Office Presentation during Classroom Teaching: A Case of Kampala International University in Tanzania
Authors: Abigaba Sophia
Abstract:
Artificial intelligence (AI) has transformed the education sector by revolutionizing educational frameworks by providing new opportunities and innovative advanced platforms for language translation during the teaching and learning process. In today's education sector, the primary key to scholarly communication is language; therefore, translation between different languages becomes vital in the process of communication. KIU-T being an International University, admits students from different nations speaking different languages, and English is the official language; some students find it hard to grasp a word during teaching and learning. This paper explores the practical aspect of using artificial intelligence technologies in an advanced language translation manner during teaching and learning. The impact of this technology is reflected in the education strategies to equip students with the necessary knowledge and skills for professional activity in the best way they understand. The researcher evaluated the demand for this practice since students have to apply the knowledge they acquire in their native language to their countries in the best way they understand. The main objective is to improve student's language competence and lay a solid foundation for their future professional development. A descriptive-analytic approach was deemed best for the study to investigate the phenomena of language translation intelligence alongside Microsoft Office during the teaching and learning process. The study analysed the responses of 345 students from different academic programs. Based on the findings, the researcher recommends using the artificial intelligence language translation technique during teaching, and this requires the wisdom of human content designers and educational experts. Lecturers and students will be trained in the basic knowledge of this technique to improve the effectiveness of teaching and learning to meet the student’s needs.Keywords: artificial intelligence, language translation technique, teaching and learning process, Microsoft Office
Procedia PDF Downloads 804969 Analysis of Effect of Microfinance on the Profit Level of Small and Medium Scale Enterprises in Lagos State, Nigeria
Authors: Saheed Olakunle Sanusi, Israel Ajibade Adedeji
Abstract:
The study analysed the effect of microfinance on the profit level of small and medium scale enterprises in Lagos. The data for the study were obtained by simple random sampling, and total of one hundred and fifty (150) small and medium scale enterprises (SMEs) were sampled for the study. Seventy-five (75) each are microfinance users and non-users. Data were analysed using descriptive statistics, logit model, t-test and ordinary least square (OLS) regression. The mean profit of the enterprises using microfinance is ₦16.8m, while for the non-users of microfinance is ₦5.9m. The mean profit of microfinance users is statistically different from the non-users. The result of the logit model specified for the determinant of access to microfinance showed that three of specified variables- educational status of the enterprise head, credit utilisation and volume of business investment are significant at P < 0.01. Enterprises with many years of experience, highly educated enterprise heads and high volume of business investment have more potential access to microfinance. The OLS regression model indicated that three parameters namely number of school years, the volume of business investment and (dummy) participation in microfinance were found to be significant at P < 0.05. These variables are therefore significant determinants of impacts of microfinance on profit level in the study area. The study, therefore, concludes and recommends that to improve the status of small and medium scale enterprises for an increase in profit, the full benefit of access to microfinance can be enhanced through investment in social infrastructure and human capital development. Also, concerted efforts should be made to encouraged non-users of microfinance among SMEs to use it in order to boost their profit.Keywords: credit utilisation, logit model, microfinance, small and medium enterprises
Procedia PDF Downloads 2084968 Collaborative Technology Implementation Success and Knowledge Capacity: Case of Tunisian Banks with Mixed Capital
Authors: Amira Khelil, Habib Affes
Abstract:
Organization resource planning implementation success is important. Today`s competitors in business, in enterprise resource planning and in managing are becoming one of the main tools of achieving competitiveness in business. Resource technologies are considered as an infrastructure to create and maintain business to improve front and back-office efficiency and effectiveness. This study is significant to bring new ideas in determining the key antecedents which are technological resource planning implementation based on knowledge capacity perspectives and help to understand the key success factor in the Tunisian banks. Based on a survey of 150 front office Tunisian agents working in Tunisian banks with mixed capital, using Groupware system, only 51 respondents had given feedback to this survey. By using Warp PLS 3.0, through several tests the relationship between knowledge capability and Groupware implementation success having beta coefficient 0.37 and P-Value <0.01. This result highlights that knowledge capability of bank agent can influence the success of the Groupware implementation.Keywords: groupware implementation, knowledge capacity, partial least squares method, Tunisian banks
Procedia PDF Downloads 4914967 Second Time’s a Charm: The Intervention of the European Patent Office on the Strategic Use of Divisional Applications
Authors: Alissa Lefebre
Abstract:
It might seem intuitive to hope for a fast decision on the patent grant. After all, a granted patent provides you with a monopoly position, which allows you to obstruct others from using your technology. However, this does not take into account the strategic advantages one can obtain from keeping their patent applications pending. First, you have the financial advantage of postponing certain fees, although many applicants would probably agree that this is not the main benefit. As the scope of the patent protection is only decided upon at the grant, the pendency period introduces uncertainty amongst rivals. This uncertainty entails not knowing whether the patent will actually get granted and what the scope of protection will be. Consequently, rivals can only depend upon limited and uncertain information when deciding what technology is worth pursuing. One way to keep patent applications pending, is the use of divisional applications. These applicants can be filed out of a parent application as long as that parent application is still pending. This allows the applicant to pursue (part of) the content of the parent application in another application, as the divisional application cannot exceed the scope of the parent application. In a fast-moving and complex market such as the tele- and digital communications, it might allow applicants to obtain an actual monopoly position as competitors are discouraged to pursue a certain technology. Nevertheless, this practice also has downsides to it. First of all, it has an impact on the workload of the examiners at the patent office. As the number of patent filings have been increasing over the last decades, using strategies that increase this number even more, is not desirable from the patent examiners point of view. Secondly, a pending patent does not provide you with the protection of a granted patent, thus not only create uncertainty for the rivals, but also for the applicant. Consequently, the European patent office (EPO) has come up with a “raising the bar initiative” in which they have decided to tackle the strategic use of divisional applications. Over the past years, two rules have been implemented. The first rule in 2010 introduced a time limit, upon which divisional applications could only be filed within a 24-month limit after the first communication with the patent office. However, after carrying-out a user feedback survey, the EPO abolished the rule again in 2014 and replaced it by a fee mechanism. The fee mechanism is still in place today, which might be an indication of a better result compared to the first rule change. This study tests the impact of these rules on the strategic use of divisional applications in the tele- and digital communication industry and provides empirical evidence on their success. Upon using three different survival models, we find overall evidence that divisional applications prolong the pendency time and that only the second rule is able to tackle the strategic patenting and thus decrease the pendency time.Keywords: divisional applications, regulatory changes, strategic patenting, EPO
Procedia PDF Downloads 1304966 The Sociology of the Facebook: An Exploratory Study
Authors: Liana Melissa E. de la Rosa, Jayson P. Ada
Abstract:
This exploratory study was conducted to determine the sociology of the Facebook. Specifically, it aimed to know the socio-demographic profile of the respondents in terms of age, sex, year level and monthly allowance; find out the common usage of Facebook to the respondents; identify the features of Facebook that are commonly used by the respondents; understand the benefits and risks of using the Facebook; determine how frequent the respondents use the Facebook; and find out if there is a significant relationship between socio-demographic profile of the respondents and their Facebook usage. This study used the exploratory research design and correlational design employing research survey questionnaire as its main data gathering instrument. Students of the University of Eastern Philippines were selected as the respondents of this study through quota sampling. Ten (10) students were randomly selected from each college of the university. Based on the findings of this study, the following conclusion were drawn: The majority of the respondents are aged 18 and 21 old, female, are third year students, and have monthly allowance of P 2,000 above. On the respondents’ usage of Facebook, the majority of use the Facebook on a daily basis for one to two (1-2) hours everyday. And most users used Facebook by renting a computer in an internet cafe. On the use of Facebook, most users have created their profiles mainly to connect with people and gain new friends. The most commonly used features of Facebook, are: photos application, like button, wall, notification, friend, chat, network, groups and “like” pages status updates, messages and inbox and events. While the other Facebook features that are seldom used by the respondents are games, news feed, user name, video sharing and notes. And the least used Facebook features are questions, poke feature, credits and the market place. The respondents stated that the major benefit that the Facebook has given to its users is its ability to keep in touch with family members or friends while the main risk identified is that the users can become addicted to the Internet. On the tests of relationships between the respondents’ use of Facebook and the four (4) socio-demographic profile variables: age, sex, year level, and month allowance, were found to be not significantly related to the respondents’ use of the Facebook. While the variable found to be significantly related was gender.Keywords: Facebook, sociology, social networking, exploratory study
Procedia PDF Downloads 2904965 Managing Change in the Academic Libraries in the Perspective of Web 2.0
Authors: Raj Kumar, Navjyoti Dhingra
Abstract:
Academic libraries are the hubs in which knowledge is a major resource and the performances of these knowledge in terms of adding and delivering value to their users depend upon their ability and effectiveness in engendering, arranging, managing, and using this knowledge. Developments in Information and Communication Technology’s (ICT), the libraries have been incorporated at the electronic edge to facilitate a rapid transfer of information on a global scale. Web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. Web 2.0 reflects changes in how one can use the web rather than describing any technical or structural change. Libraries provide manifold channels of Information access to its e-users. The rapid expansion of tools, formats, services and technologies has presented many options to unfold Library Collection. Academic libraries must develop ways and means to meet their user’s expectations and remain viable. Web 2.0 tools are the first step on that journey. Web 2.0 has been widely used by the libraries to promote functional services like access to catalogue or for external activities like information or photographs of library events, enhancement of usage of library resources and bringing users closer to the library. The purpose of this paper is to provide a reconnaissance of Web 2.0 tools for enhancing library services in India. The study shows that a lot of user-friendly tools can be adopted by information professionals to effectively cater to information needs of its users. The authors have suggested a roadmap towards a revitalized future for providing various information opportunities to techno-savvy users.Keywords: academic libraries, change management, social media, Web 2.0
Procedia PDF Downloads 2114964 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms: Top 10 Saudi Political Twitter Users
Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez
Abstract:
Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. The existence of influential users who have developed a reputation for their knowledge and experience of specific topics is a major factor contributing to this impact. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is related to the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.Keywords: Twitter, influencers, structured mechanism, Saudi Arabia
Procedia PDF Downloads 1194963 Evaluation of Air Movement, Humidity and Temperature Perceptions with the Occupant Satisfaction in Office Buildings in Hot and Humid Climate Regions by Means of Field Surveys
Authors: Diego S. Caetano, Doreen E. Kalz, Louise L. B. Lomardo, Luiz P. Rosa
Abstract:
The energy consumption in non-residential buildings in Brazil has a great impact on the national infrastructure. The growth of the energy consumption has a special role over the building cooling systems, supported by the increased people's requirements on hygrothermal comfort. This paper presents how the occupants of office buildings notice and evaluate the hygrothermic comfort regarding temperature, humidity, and air movement, considering the cooling systems presented at the buildings studied, analyzed by real occupants in areas of hot and humid climate. The paper presents results collected over a long time from 3 office buildings in the cities of Rio de Janeiro and Niteroi (Brazil) in 2015 and 2016, from daily questionnaires with eight questions answered by 114 people between 3 to 5 weeks per building, twice a day (10 a.m. and 3 p.m.). The paper analyses 6 out of 8 questions, emphasizing on the perception of temperature, humidity, and air movement. Statistics analyses were made crossing participant answers and humidity and temperature data related to time high time resolution time. Analyses were made from regressions comparing: internal and external temperature, and then compared with the answers of the participants. The results were put in graphics combining statistic graphics related to temperature and air humidity with the answers of the real occupants. Analysis related to the perception of the participants to humidity and air movements were also analyzed. The hygrothermal comfort statistic model of the European standard DIN EN 15251 and that from the Brazilian standard NBR 16401 were compared taking into account the perceptions of the hygrothermal comfort of the participants, with emphasis on air humidity, taking basis on prior studies published on this same research. The studies point out a relative tolerance for higher temperatures than the ones determined by the standards, besides a variation on the participants' perception concerning air humidity. The paper presents a group of detailed information that permits to improve the quality of the buildings based on the perception of occupants of the office buildings, contributing to the energy reduction without health damages and demands of necessary hygrothermal comfort, reducing the consumption of electricity on cooling.Keywords: thermal comfort, energy consumption, energy standards, comfort models
Procedia PDF Downloads 3234962 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Authors: K. Alese Boniface, K. Adu Michael
Abstract:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)
Procedia PDF Downloads 2794961 Characteristics of Domestic Sewage in Small Urban Communities
Authors: Shohreh Azizi, Memory Tekere, Wag Nel
Abstract:
An evaluation of the characteristics of wastewater generated from small communities was carried out in relation to decentralized approach for domestic sewage treatment plant and design of biological nutrient removal system. The study included the survey of the waste from various individual communities such as a hotel, a residential complex, an office premise, and an educational institute. The results indicate that the concentration of organic pollutant in wastewater from the residential complex is higher than the waste from all the other communities with COD 664 mg/l, BOD 370.2 mg/l and TSS 248.8 mg/l. And the waste water from office premise indicates low organic load with COD428 mg/l, BOD 232mg/l and TSS 157mg/l. The wastewater from residential complex was studied under activated sludge process to evaluate this technology for decentralized wastewater treatment. The Activated sludge process was operated at different 12to 4 hrs hydraulic retention times and the optimum 6 hrs HRT was selected, therefore the average reduction of COD (85.92%) and BOD (91.28 %) was achieved. The issue of sludge recycling, maintenance of biomass concentration and high HRT reactor (10 L) volume are making the system non-practical for smaller communities.Keywords: wastewater, small communities, activated sludge process, decentralized system
Procedia PDF Downloads 3574960 Research and Design of Functional Mixed Community: A Model Based on the Construction of New Districts in China
Authors: Wu Chao
Abstract:
The urban design of the new district in China is different from other existing cities at the city planning level, including Beijing, Shanghai, Guangzhou, etc. And the urban problems of these super-cities are same as many big cities around the world. The goal of the new district construction plan is to enable people to live comfortably, to improve the well-being of residents, and to create a way of life different from that of other urban communities. To avoid the emergence of the super community, the idea of "decentralization" is taken as the overall planning idea, and the function and form of each community are set up with a homogeneous allocation of resources so that the community can grow naturally. Similar to the growth of vines in nature, each community groups are independent and connected through roads, with clear community boundaries that limit their unlimited expansion. With a community contained 20,000 people as a case, the community is a mixture for living, production, office, entertainment, and other functions. Based on the development of the Internet, to create more space for public use, and can use data to allocate resources in real time. And this kind of shared space is the main part of the activity space in the community. At the same time, the transformation of spatial function can be determined by the usage feedback of all kinds of existing space, and the use of space can be changed by the changing data. Take the residential unit as the basic building function mass, take the lower three to four floors of the building as the main flexible space for use, distribute functions such as entertainment, service, office, etc. For the upper living space, set up a small amount of indoor and outdoor activity space, also used as shared space. The transformable space of the bottom layer is evenly distributed, combined with the walking space connected the community, the service and entertainment network can be formed in the whole community, and can be used in most of the community space. With the basic residential unit as the replicable module, the design of the other residential units runs through the idea of decentralization and the concept of the vine community, and the various units are reasonably combined. At the same time, a small number of office buildings are added to meet the special office needs. The new functional mixed community can change many problems of the present city in the future construction, at the same time, it can keep its vitality through the adjustment function of the Internet.Keywords: decentralization, mixed functional community, shared space, spatial usage data
Procedia PDF Downloads 1254959 Outreach Intervention Addressing Crack Cocaine Addiction in Users with Co-Occurring Opioid Use Disorder
Authors: Louise Penzenstadler, Tiphaine Robet, Radu Iuga, Daniele Zullino
Abstract:
Context: The outpatient clinic of the psychiatric addiction service of Geneva University Hospital has been providing support to individuals affected by various narcotics for 30 years. However, the increasing consumption of crack cocaine in Geneva has presented a new challenge for the healthcare system. Research Aim: The aim of this research is to evaluate the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder. Methodology: The research utilizes a combination of quantitative and qualitative retrospective data analysis to evaluate the effectiveness of the outreach intervention. Findings: The data collected from October 2023 to December 2023 show that the outreach program successfully made 1,071 contacts with drug users and led to 15 new requests for care and enrollment in treatment. Patients expressed high satisfaction with the intervention, citing easy and rapid access to treatment and social support. Theoretical Importance: This research contributes to the understanding of the challenges and specific needs of a complex group of drug users who face severe health problems. It highlights the importance of outreach interventions in establishing trust, connecting users with care, and facilitating medication-assisted treatment for opioid addiction. Data Collection: Data was collected through the outreach program's interactions with drug users, including street outreach interventions and presence at locations frequented by users. Patient satisfaction surveys were also utilized. Analysis Procedures: The collected data was analyzed using both quantitative and qualitative methods. The quantitative analysis involved examining the number of contacts made, new requests for care, and treatment enrollment. The qualitative analysis focused on patient satisfaction and their perceptions of the intervention. Questions Addressed: The research addresses the following questions: What is the impact of an outreach intervention on crack cocaine addiction in users with co-occurring opioid use disorder? How effective is the outreach program in connecting drug users with care and initiating medication-assisted treatment? Conclusion: The outreach program has proven to be an effective intervention in establishing trust with crack users, connecting them with care, and initiating medication-assisted treatment for opioid addiction. It has also highlighted the importance of addressing the specific challenges faced by this group of drug users.Keywords: crack addiction, outreach treatment, peer intervention, polydrug use
Procedia PDF Downloads 644958 Clicking Based Graphical Password Scheme Resistant to Spyware
Authors: Bandar Alahmadi
Abstract:
The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.Keywords: security, password, authentication, attack, applications
Procedia PDF Downloads 1674957 A Construction Scheduling Model by Applying Pedestrian and Vehicle Simulation
Authors: Akhmad F. K. Khitam, Yi Tai, Hsin-Yun Lee
Abstract:
In the modern research of construction management, the goals of scheduling are not only to finish the project within the limited duration, but also to improve the impact of people and environment. Especially for the impact to the pedestrian and vehicles, the considerable social cost should be estimated in the total performance of a construction project. However, the site environment has many differences between projects. These interactions affect the requirement and goal of scheduling. It is difficult for schedule planners to quantify these interactions. Therefore, this study use 3D dynamic simulation technology to plan the schedule of the construction engineering projects that affect the current space users (i.e., the pedestrians and vehicles). The proposed model can help the project manager find out the optimal schedule to minimize the inconvenience brought to the space users. Besides, a roadwork project and a building renovation project were analyzed for the practical situation of engineering and operations. Then this study integrates the proper optimization algorithms and computer technology to establish a decision support model. The proposed model can generate a near-optimal schedule solution for project planners.Keywords: scheduling, simulation, optimization, pedestrian and vehicle behavior
Procedia PDF Downloads 1424956 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India
Authors: Mani Gupta
Abstract:
This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics
Procedia PDF Downloads 3584955 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink
Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang
Abstract:
In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN
Procedia PDF Downloads 5414954 Assess and Improve Building Energy Efficiency– a Case Study on the Office of Research and Graduate Studies at Qatar University
Authors: Mohamed Youssef
Abstract:
The proliferation of energy consumption in the built environment has made energy efficiency and savings strategies a priority objective for energy policies in most countries. Qatar is a clear example, where it has initiated several programs and institutions to mitigate the overuse of electricity consumption and control the energy load of the building by following global standards and spreading awareness campaigns. A Case study on the Office of Research and Graduate Studies at Qatar University has been investigated in this paper. The paper studied the rating load of existing buildings before and after retrofitting by using Carrier’s Hourly Analysis Program (HAP). The performance of the building has increased especially after using the LED light system instead of fluorescent light with a low payback period. GINAN paint and green roof have shown a considerable contribution to the reduction of electrical load in the building. In comparison, the double HR window had the least effect on the reduction of electricity consumption.Keywords: energy conservation in Qatar, HAP, LED light, GINAN paint, green roof, double HR window
Procedia PDF Downloads 1754953 The Impact of Hybrid Working Models on Employee Engagement
Authors: Sibylle Tellenbach, Julie Haddock-Millar, Francis Bidault
Abstract:
The aim of this research is to understand the extent to which hybrid working models have influenced employee engagement in the Swiss financial sector. The context for this research is the transition out of the pandemic and the changes that have occurred between 2020 and 2023. Since the pandemic, many financial services companies have had to rethink their working model for office-based employees, as this group of employees has been able to experience a new way of working and, thus, greater freedom and flexibility. For a large number of companies, it was a huge change to shift from the traditional office-based to a new hybrid working model. A heightened focus on employee engagement has become a necessity in order to understand and respond to the challenges presented by the shift in a working model. This new way of working, partly office-based and partly virtual, has led to ambiguities about the impact on the engagement of hybrid teams. Therefore, the research question is: How hybrid working models have influenced employee engagement to what extent? The methodological approach is a narrative inquiry with four similar functional teams within four Swiss financial companies. Semi-structured interviews will be conducted with managers from middle management and their individual team members. The findings will demonstrate whether this shift in the working model influenced individual team members’ engagement and to what extent. The contribution of this research is two-fold. First, the research makes a theoretical contribution, presenting evidence of the impact of hybrid working on individual team members’ engagement in a specific sector and context, enhancing current knowledge on the challenges in working model transition. Second, this research will make a practice-based contribution, recommending ways to enhance the engagement of hybrid teams in a specific context. These recommendations may be applied in wider sectors and teams.Keywords: employee engagement, hybrid teams, hybrid working models, Swiss financial sector, team engagement
Procedia PDF Downloads 964952 Study on the OTP Authentication Method and Security for User Mobility in the Cloud
Authors: Jong-Won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.Keywords: cloud, OTP, mobility, security, authentication
Procedia PDF Downloads 3524951 Achieving Flow at Work: An Experience Sampling Study to Comprehend How Cognitive Task Characteristics and Work Environments Predict Flow Experiences
Authors: Jonas De Kerf, Rein De Cooman, Sara De Gieter
Abstract:
For many decades, scholars have aimed to understand how work can become more meaningful by maximizing both potential and enhancing feelings of satisfaction. One of the largest contributions towards such positive psychology was made with the introduction of the concept of ‘flow,’ which refers to a condition in which people feel intense engagement and effortless action. Since then, valuable research on work-related flow has indicated that this state of mind is related to positive outcomes for both organizations (e.g., social, supportive climates) and workers (e.g., job satisfaction). Yet, scholars still do not fully comprehend how such deep involvement at work is obtained, given the notion that flow is considered a short-term, complex, and dynamic experience. Most research neglects that people who experience flow ought to be optimally challenged so that intense concentration is required. Because attention is at the core of this enjoyable state of mind, this study aims to comprehend how elements that affect workers’ cognitive functioning impact flow at work. Research on cognitive performance suggests that working on mentally demanding tasks (e.g., information processing tasks) requires workers to concentrate deeply, as a result leading to flow experiences. Based on social facilitation theory, working on such tasks in an isolated environment eases concentration. Prior research has indicated that working at home (instead of working at the office) or in a closed office (rather than in an open-plan office) impacts employees’ overall functioning in terms of concentration and productivity. Consequently, we advance such knowledge and propose an interaction by combining cognitive task characteristics and work environments among part-time teleworkers. Hence, we not only aim to shed light on the relation between cognitive tasks and flow but also provide empirical evidence that workers performing such tasks achieve the highest states of flow while working either at home or in closed offices. In July 2022, an experience-sampling study will be conducted that uses a semi-random signal schedule to understand how task and environment predictors together impact part-time teleworkers’ flow. More precisely, about 150 knowledge workers will fill in multiple surveys a day for two consecutive workweeks to report their flow experiences, cognitive tasks, and work environments. Preliminary results from a pilot study indicate that on a between level, tasks high in information processing go along with high self-reported fluent productivity (i.e., making progress). As expected, evidence was found for higher fluency in productivity for workers performing information processing tasks both at home and in a closed office, compared to those performing the same tasks at the office or in open-plan offices. This study expands the current knowledge on work-related flow by looking at a task and environmental predictors that enable workers to obtain such a peak state. While doing so, our findings suggest that practitioners should strive for ideal alignments between tasks and work locations to work with both deep involvement and gratification.Keywords: cognitive work, office lay-out, work location, work-related flow
Procedia PDF Downloads 1024950 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks
Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang
Abstract:
LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.Keywords: LTE networks, multicast, resource allocation, layered video
Procedia PDF Downloads 3904949 Usability in E-Commerce Websites: Results of Eye Tracking Evaluations
Authors: Beste Kaysı, Yasemin Topaloğlu
Abstract:
Usability is one of the most important quality attributes for web-based information systems. Specifically, for e-commerce applications, usability becomes more prominent. In this study, we aimed to explore the features that experienced users seek in e-commerce applications. We used eye tracking method in evaluations. Eye movement data are obtained from the eye-tracking method and analyzed based on task completion time, number of fixations, as well as heat map and gaze plot measures. The results of the analysis show that the eye movements of participants' are too static in certain areas and their areas of interest are scattered in many different places. It has been determined that this causes users to fail to complete their transactions. According to the findings, we outlined the issues to improve the usability of e-commerce websites. Then we propose solutions to identify the issues. In this way, it is expected that e-commerce sites will be developed which will make experienced users more satisfied.Keywords: e-commerce websites, eye tracking method, usability, website evaluations
Procedia PDF Downloads 1824948 Evaluation of Introductory Programming Course for Non-Computer Science Majored Students
Authors: H. Varol
Abstract:
Although students’ interest level in pursuing Computer Science and related degrees are lower than previous decade, fundamentals of computers, specifically introductory level programming courses are either listed as core or elective courses for a number of non-computer science majors. Universities accommodate these non-computer science majored students either via creating separate sections of a class for them or simply offering mixed-body classroom solutions, in which both computer science and non-computer science students take the courses together. In this work, we demonstrated how we handle introductory level programming course at Sam Houston State University and also provide facts about our observations on students’ success during the coursework. Moreover, we provide suggestions and methodologies that are based on students’ major and skills to overcome the deficiencies of mix-body type of classes.Keywords: computer science, non-computer science major, programming, programming education
Procedia PDF Downloads 3334947 Practice Based Approach to the Development of Family Medicine Residents’ Educational Environment
Authors: Lazzat M. Zhamaliyeva, Nurgul A. Abenova, Gauhar S. Dilmagambetova, Ziyash Zh. Tanbetova, Moldir B. Ahmetzhanova, Tatyana P. Ostretcova, Aliya A. Yegemberdiyeva
Abstract:
Introduction: There are many reasons for the weak training of family doctors in Kazakhstan: the unified national educational program is not focused on competencies, the role of a general practitioner (GP) is not clear, poor funding for the health care and education system, outdated teaching and assessment methods, inefficient management. We highlight two issues in particular. Firstly, academic teachers of family medicine (FM) in Kazakhstan do not practice as family doctors; most of them are narrow specialists (pediatricians, therapists, surgeons, etc.); they usually hold one-time consultations; clinical mentors from practical healthcare (non-academic teachers) do not have the teaching competences, and the vast majority of them are also narrow specialists. Secondly, clinical sites (polyclinics) are unprepared for general practice and do not follow the principles of family medicine; residents do not like to be in primary health care (PHC) settings due to the chaos that is happening there, as well as due to the lack of the necessary equipment for mastering and consolidating practical skills. Aim: We present the concept of the family physicians’ training office (FPTO), which is being created as a friendly learning environment for young general practitioners and for the involvement of academic teachers of family medicine in the practical work and innovative development of PHC. Methodology: In developing the conceptual framework and identifying practical activities, we drew on literature and expert input, and interviews. Results: The goal of the FPTO is to create a favorable educational and clinical environment for the development of the FM residents’ competencies, in which the residents with academic teachers and clinical mentors could understand and accept the principles of family medicine, improve clinical knowledge and skills, and gain experience in improving the quality of their practice in scientific basis. Three main areas of office activity are providing primary care to the patients, improving educational services for FM residents and other medical workers, and promoting research in PHC and innovations. The office arranges for residents to see outpatients at least 50% of the time, and teachers of FM departments at least 1/4 of their working time conduct general medical appointments next to residents. Taking into account the educational and scientific workload, the number of attached population for one GP does not exceed 500 persons. The equipment of the office allows FPTO workers to perform invasive and other manipulations without being sent to other clinics. In the office, training for residents is focused on their needs and aimed at achieving the required level of competence. International methodologies and assessment tools are adapted to local conditions and evaluated for their effectiveness and acceptability. Residents and their faculty actively conduct research in the field of family medicine. Conclusions: We propose to change the learning environment in order to create teams of like-minded people, to unite residents and teachers even more for the development of family medicine. The offices will also invest resources in developing and maintaining young doctors' interest in family medicine.Keywords: educational environment, family medicine residents, family physicians’ training office, primary care research
Procedia PDF Downloads 1344946 Mobile Network Users Amidst Ultra-Dense Networks in 5G Using an Improved Coordinated Multipoint (CoMP) Technology
Authors: Johnson O. Adeogo, Ayodele S. Oluwole, O. Akinsanmi, Olawale J. Olaluyi
Abstract:
In this 5G network, very high traffic density in densely populated areas, most especially in densely populated areas, is one of the key requirements. Radiation reduction becomes one of the major concerns to secure the future life of mobile network users in ultra-dense network areas using an improved coordinated multipoint technology. Coordinated Multi-Point (CoMP) is based on transmission and/or reception at multiple separated points with improved coordination among them to actively manage the interference for the users. Small cells have two major objectives: one, they provide good coverage and/or performance. Network users can maintain a good quality signal network by directly connecting to the cell. Two is using CoMP, which involves the use of multiple base stations (MBS) to cooperate by transmitting and/or receiving at the same time in order to reduce the possibility of electromagnetic radiation increase. Therefore, the influence of the screen guard with rubber condom on the mobile transceivers as one major piece of equipment radiating electromagnetic radiation was investigated by mobile network users amidst ultra-dense networks in 5g. The results were compared with the same mobile transceivers without screen guards and rubber condoms under the same network conditions. The 5 cm distance from the mobile transceivers was measured with the help of a ruler, and the intensity of Radio Frequency (RF) radiation was measured using an RF meter. The results show that the intensity of radiation from various mobile transceivers without screen guides and condoms was higher than the mobile transceivers with screen guides and condoms when call conversation was on at both ends.Keywords: ultra-dense networks, mobile network users, 5g, coordinated multi-point.
Procedia PDF Downloads 1074945 Musical Composition by Computer with Inspiration from Files of Different Media Types
Authors: Cassandra Pratt Romero, Andres Gomez de Silva Garza
Abstract:
This paper describes a computational system designed to imitate human inspiration during musical composition. The system is called MIS (Musical Inspiration Simulator). The MIS system is inspired by media to which human beings are exposed daily (visual, textual, or auditory) to create new musical compositions based on the emotions detected in said media. After building the system we carried out a series of evaluations with volunteer users who used MIS to compose music based on images, texts, and audio files. The volunteers were asked to judge the harmoniousness and innovation in the system's compositions. An analysis of the results points to the difficulty of computational analysis of the characteristics of the media to which we are exposed daily, as human emotions have a subjective character. This observation will direct future improvements in the system.Keywords: human inspiration, musical composition, musical composition by computer, theory of sensation and human perception
Procedia PDF Downloads 1854944 Web Proxy Detection via Bipartite Graphs and One-Mode Projections
Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo
Abstract:
With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.Keywords: bipartite graph, one-mode projection, clustering, web proxy detection
Procedia PDF Downloads 246