Search results for: adaptive strategy
2040 Cultural Event and Urban Regeneration: Lessons from Liverpool as the 2008 European Capital of Culture
Authors: Yi-De Liu
Abstract:
For many European cities, a key motivation in developing event strategies is to use event as a catalyst for urban regeneration. One type of event that is particularly used as a means of urban development is the European Capital of Culture (ECOC) initiative. Based on a case study of the 2008 ECOC Liverpool, this paper aims at conceptualising the significance of major event for a city’s economic, cultural and social regenerations. In terms of economic regeneration, the role of the ECOC is central in creating Liverpool’s visitor economy and reshaping city image. Liverpool planned different themes for eight consecutive years as a way to ensure economic sustainability. As far as cultural regeneration is concerned, the ECOC contributed to the cultural regeneration of Liverpool by stimulating cultural participation and interest from the demand side, as well as improving cultural provision and collaboration within the cultural sector from the supply side. So as to social regeneration, Liverpool treated access development as a policy guideline and considered the ECOC as an opportunity to enhance the sense of place. The most significant lesson learned from Liverpool is its long-term planning and efforts made to integrate the ECOC into the overall urban development strategy. As a result, a more balanced and long-term effect on urban regeneration could be achieved.Keywords: cultural event, urban regeneration, european capital of culture, Liverpool
Procedia PDF Downloads 2642039 Effect of Social Network Ties on Virtual Organization Success: Mediate Role of Knowledge Sharing Behaviors: An Empirical Study in Tourism Sector Firms in Jordan
Authors: Raed Hanandeh
Abstract:
This empirical study examines how knowledge sharing behaviors mediate the effect Technology-driven strategy on virtual organization success in Jordanian tourism sector firms. The results reveal that Social network ties are positively related to web knowledge seeking, web knowledge contributing and interactive system, but negatively related to accidental knowledge leakage. Furthermore, all types of knowledge sharing behavior are positively related to virtual organization success. Data collected from 23 firms. The total number of questionnaires mailed, 250 questionnaires were delivered. 214 were considered valid out of 241 Responses were received. The findings provide evidence that knowledge sharing behavior play a mediating role between Social network ties and virtual organization success and show that, web knowledge seeking, web knowledge contributing and interactive system playing an important impact on virtual organization success through knowledge sharing behaviors.Keywords: social network ties, virtual organization success, knowledge sharing behaviors, web knowledge
Procedia PDF Downloads 2732038 Rule Based Architecture for Collaborative Multidisciplinary Aircraft Design Optimisation
Authors: Nickolay Jelev, Andy Keane, Carren Holden, András Sóbester
Abstract:
In aircraft design, the jump from the conceptual to preliminary design stage introduces a level of complexity which cannot be realistically handled by a single optimiser, be that a human (chief engineer) or an algorithm. The design process is often partitioned along disciplinary lines, with each discipline given a level of autonomy. This introduces a number of challenges including, but not limited to: coupling of design variables; coordinating disciplinary teams; handling of large amounts of analysis data; reaching an acceptable design within time constraints. A number of classical Multidisciplinary Design Optimisation (MDO) architectures exist in academia specifically designed to address these challenges. Their limited use in the industrial aircraft design process has inspired the authors of this paper to develop an alternative strategy based on well established ideas from Decision Support Systems. The proposed rule based architecture sacrifices possibly elusive guarantees of convergence for an attractive return in simplicity. The method is demonstrated on analytical and aircraft design test cases and its performance is compared to a number of classical distributed MDO architectures.Keywords: Multidisciplinary Design Optimisation, Rule Based Architecture, Aircraft Design, Decision Support System
Procedia PDF Downloads 3552037 Recognizing and Prioritizing Effective Factors on Productivity of Human Resources Through Using Technique for Order of Preference by Similarity to Ideal Solution Method
Authors: Amirmehdi Dokhanchi, Babak Ziyae
Abstract:
Studying and prioritizing effective factors on productivity of human resources through TOPSIS method is the main aim of the present research study. For this reason, while reviewing concepts existing in productivity, effective factors were studied. Managers, supervisors, staff and personnel of Tabriz Tractor Manufacturing Company are considered subject of this study. Of total individuals, 160 of them were selected through the application of random sampling method as 'subject'. Two questionnaires were used for collecting data in this study. The factors, which had the highest effect on productivity, were recognized through the application of software packages. TOPSIS method was used for prioritizing recognized factors. For this reason, the second questionnaire was put available to statistics sample for studying effect of each of factors towards predetermined indicators. Therefore, decision-making matrix was obtained. The result of prioritizing factors shows that existence of accurate organizational strategy, high level of occupational skill, application of partnership and contribution system, on-the-job-training services, high quality of occupational life, dissemination of appropriate organizational culture, encouraging to creativity and innovation, and environmental factors are prioritized respectively.Keywords: productivity of human resources, productivity indicators, TOPSIS, prioritizing factors
Procedia PDF Downloads 3342036 Alphabet Recognition Using Pixel Probability Distribution
Authors: Vaidehi Murarka, Sneha Mehta, Dishant Upadhyay
Abstract:
Our project topic is “Alphabet Recognition using pixel probability distribution”. The project uses techniques of Image Processing and Machine Learning in Computer Vision. Alphabet recognition is the mechanical or electronic translation of scanned images of handwritten, typewritten or printed text into machine-encoded text. It is widely used to convert books and documents into electronic files etc. Alphabet Recognition based OCR application is sometimes used in signature recognition which is used in bank and other high security buildings. One of the popular mobile applications includes reading a visiting card and directly storing it to the contacts. OCR's are known to be used in radar systems for reading speeders license plates and lots of other things. The implementation of our project has been done using Visual Studio and Open CV (Open Source Computer Vision). Our algorithm is based on Neural Networks (machine learning). The project was implemented in three modules: (1) Training: This module aims “Database Generation”. Database was generated using two methods: (a) Run-time generation included database generation at compilation time using inbuilt fonts of OpenCV library. Human intervention is not necessary for generating this database. (b) Contour–detection: ‘jpeg’ template containing different fonts of an alphabet is converted to the weighted matrix using specialized functions (contour detection and blob detection) of OpenCV. The main advantage of this type of database generation is that the algorithm becomes self-learning and the final database requires little memory to be stored (119kb precisely). (2) Preprocessing: Input image is pre-processed using image processing concepts such as adaptive thresholding, binarizing, dilating etc. and is made ready for segmentation. “Segmentation” includes extraction of lines, words, and letters from the processed text image. (3) Testing and prediction: The extracted letters are classified and predicted using the neural networks algorithm. The algorithm recognizes an alphabet based on certain mathematical parameters calculated using the database and weight matrix of the segmented image.Keywords: contour-detection, neural networks, pre-processing, recognition coefficient, runtime-template generation, segmentation, weight matrix
Procedia PDF Downloads 3892035 Robot Navigation and Localization Based on the Rat’s Brain Signals
Authors: Endri Rama, Genci Capi, Shigenori Kawahara
Abstract:
The mobile robot ability to navigate autonomously in its environment is very important. Even though the advances in technology, robot self-localization and goal directed navigation in complex environments are still challenging tasks. In this article, we propose a novel method for robot navigation based on rat’s brain signals (Local Field Potentials). It has been well known that rats accurately and rapidly navigate in a complex space by localizing themselves in reference to the surrounding environmental cues. As the first step to incorporate the rat’s navigation strategy into the robot control, we analyzed the rats’ strategies while it navigates in a multiple Y-maze, and recorded Local Field Potentials (LFPs) simultaneously from three brain regions. Next, we processed the LFPs, and the extracted features were used as an input in the artificial neural network to predict the rat’s next location, especially in the decision-making moment, in Y-junctions. We developed an algorithm by which the robot learned to imitate the rat’s decision-making by mapping the rat’s brain signals into its own actions. Finally, the robot learned to integrate the internal states as well as external sensors in order to localize and navigate in the complex environment.Keywords: brain-machine interface, decision-making, mobile robot, neural network
Procedia PDF Downloads 2972034 Application Programming Interface Security in Embedded and Open Finance
Authors: Andrew John Zeller, Artjoms Formulevics
Abstract:
Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management
Procedia PDF Downloads 422033 Examining the Nutrition Knowledge, Attitude, and Practices of Elderly Residents in Duguri District, Bauchi State, Nigeria: A Village-Level Analysis
Authors: Iliyasu A. A. Ibrahim
Abstract:
Nutrition knowledge, attitudes, and practices (KAPs) play a vital role in preventing malnutrition and its consequences, impacting quality of life. This study aimed to assess KAPs among elderly individuals (60-90 years) in 4 villages of Duguri District, Alkaleri, Nigeria. A cross-sectional study was conducted among 2000 geriatrics from four villages. Studies showed that 70.6% of participants demonstrated poor nutrition knowledge, 60.2% exhibited unhealthy practices, while 50.5% displayed negative attitudes. Village-wise Comparison indicated that Yashi village recorded the lowest poor knowledge score (47.2%), Mainamaji (57.4%), Kungibar (66.2%), and Badara (67.2%) followed. Yashi village showed the most positive attitude (51.1%). The study revealed factors influencing KAPs, such as travel exposure and higher education, correlated with better attitudes and practices. The study highlights the significance of addressing nutrition-related KAP gaps among Duguri district’s elderly. Raising awareness and implementing a nutrition strategy with a focus on older adults is crucial. Concrete measures must ensure elders' nutritional needs are met, enhancing their quality of life.Keywords: nutrition, knowledge, attitude, practice, elderly, Duguri
Procedia PDF Downloads 102032 Interval Type-2 Fuzzy Vibration Control of an ERF Embedded Smart Structure
Authors: Chih-Jer Lin, Chun-Ying Lee, Ying Liu, Chiang-Ho Cheng
Abstract:
The main objective of this article is to present the semi-active vibration control using an electro-rheological fluid embedded sandwich structure for a cantilever beam. ER fluid is a smart material, which cause the suspended particles polarize and connect each other to form chain. The stiffness and damping coefficients of the ER fluid can be changed in 10 micro seconds; therefore, ERF is suitable to become the material embedded in the tunable vibration absorber to become a smart absorber. For the ERF smart material embedded structure, the fuzzy control law depends on the experimental expert database and the proposed self-tuning strategy. The electric field is controlled by a CRIO embedded system to implement the real application. This study investigates the different performances using the Type-1 fuzzy and interval Type-2 fuzzy controllers. The Interval type-2 fuzzy control is used to improve the modeling uncertainties for this ERF embedded shock absorber. The self-tuning vibration controllers using Type-1 and Interval Type-2 fuzzy law are implemented to the shock absorber system. Based on the resulting performance, Internal Type-2 fuzzy is better than the traditional Type-1 fuzzy control for this vibration control system.Keywords: electro-rheological fluid, semi-active vibration control, shock absorber, type 2 fuzzy control
Procedia PDF Downloads 4472031 1,8-Naphthalimide Substituted 4,4-Difluoroboradiaza-S-Indacene Dyads: Synthesis, Structure, Properties and Live-Cell Imaging
Authors: Madhurima Poddar, Vinay Sharma, Shaikh M. Mobin, Rajneesh Misra
Abstract:
Three 1,8-naphthalimide (NPI) substituted 4,4-difluoroboradiaza-s-indacene (BODIPY) dyads were synthesized via Pd-catalyzed Sonogashira cross-coupling reaction of ethynyl substituted NPI with the meso-, β- and α-halogenated BODIPYs, respectively. The photophysical and electrochemical data reveals considerable electronic communication between the BODIPY and NPI moieties. The electronic absorption spectrum reveals that the substitution of NPI at α position of BODIPY exhibit better electronic communication between the NPI and the BODIPY units. The electronic structures of all the dyads exhibit planar geometries which are in a good correlation with the structures obtained from single crystal X-ray diffraction. The crystal structures of the dyads exhibit interesting supramolecular interactions. The dyads show good cytocompatibility with the potential of multicolor live-cell imaging; making them excellent candidates for biological applications. The work provides an important strategy of screening the substitution pattern at different position of BODIPYs which will be useful for the design of BODIPY based organic molecules for various optoelectronic applications as well as bio-imaging.Keywords: bio-imaging studies, cross-coupling, cyclic voltammetry, density functional calculations, fluorescence spectra, single crystal XRD, UV/Vis spectroscopy
Procedia PDF Downloads 1452030 Biofouling Control during the Wastewater Treatment in Self-Support Carbon Nanotubes Membrane: Role of Low Voltage Electric Potential
Authors: Chidambaram Thamaraiselvan, Carlos Dosoretz
Abstract:
This work will explore the influence of low voltage electric field, both alternating (AC) and direct (DC) currents, on biofouling control to highly electrically conductive self-supporting carbon nanotubes (CNT) membranes at conditions which encourage bacterial growth. A mutant strain of Pseudomonas putida S12 was used a model bacterium. The antibiofouling studies were performed with flow-through mode connecting an electric circuit in resistive mode. Major emphasis was placed on AC due to its ability of repulsing and inactivating bacteria. The observations indicate that an AC potential >1500 mV, 1 kHz frequency, 100 Ω external resistance on ground side and pulse wave above the offset (+0.45) almost completely prevented attachment of bacteria (>98.5%) and bacterial inactivation (95.3±2.5%). Findings suggest that at the conditions applied, direct electron transfer might be dominant in a decrease of cell viability. AC resulted more effective than DC, both in terms of biofouling reduction compared to cathodic DC and in terms of cell inactivation compared to anodic DC. This electrically polarized CNT membranes offer a viable antibiofouling strategy to hinder biofouling and simplify membrane care during filtration.Keywords: bacterial attachment, biofouling control, low electric potential, water treatment
Procedia PDF Downloads 2702029 The Role of Business Process Management in Driving Digital Transformation: Insurance Company Case Study
Authors: Dalia Suša Vugec, Ana-Marija Stjepić, Darija Ivandić Vidović
Abstract:
Digital transformation is one of the latest trends on the global market. In order to maintain the competitive advantage and sustainability, increasing number of organizations are conducting digital transformation processes. Those organizations are changing their business processes and creating new business models with the help of digital technologies. In that sense, one should also observe the role of business process management (BPM) and its maturity in driving digital transformation. Therefore, the goal of this paper is to investigate the role of BPM in digital transformation process within one organization. Since experiences from practice show that organizations from financial sector could be observed as leaders in digital transformation, an insurance company has been selected to participate in the study. That company has been selected due to the high level of its BPM maturity and the fact that it has previously been through a digital transformation process. In order to fulfill the goals of the paper, several interviews, as well as questionnaires, have been conducted within the selected company. The results are presented in a form of a case study. Results indicate that digital transformation process within the observed company has been successful, with special focus on the development of digital strategy, BPM and change management. The role of BPM in the digital transformation of the observed company is further discussed in the paper.Keywords: business process management, case study, Croatia, digital transformation, insurance company
Procedia PDF Downloads 1942028 Therapeutic Role of T Subpopulations Cells (CD4, CD8 and Treg (CD25 and FOXP3+ Cells) of UC MSC Isolated from Three Different Methods in Various Disease
Authors: Kumari Rekha, Mathur K Dhananjay, Maheshwari Deepanshu, Nautiyal Nidhi, Shubham Smriti, Laal Deepika, Sinha Swati, Kumar Anupam, Biswas Subhrajit, Shiv Kumar Sarin
Abstract:
Background: Mesenchymal stem cells are multipotent stem cells derived from mesoderm and are used for therapeutic purposes because of their self-renewal, homing capacity, Immunomodulatory capability, low immunogenicity and mitochondrial transfer signaling. MSCs have the ability to regulate the mechanism of both innate as well as adaptive immune responses through the modulation of cellular response and the secretion of inflammatory mediators. Different sources of MSC are UC MSC, BM MSC, Dental Pulp, and Adipose MSC. The most frequent source used is umbilical cord tissue due to its being easily available and free of limitations of collection procedures from respective hospitals. The immunosuppressive role of MSCs is particularly interesting for clinical use since it confers resistance to rejection by the host immune response. Methodology: In this study, T helper cells (TH4), Cytotoxic T cells (CD-8), immunoregulatory cells (CD25 +FOXP3+) are compared from isolated MSC from three different methods, UC Dissociation Kit (Miltenyi), Explant Culture and Collagenase Type-IV. To check the immunomodulatory property, these MSCs were seeded with PBMC(Coculture) in CD3 coated 24 well plates. Cd28 antibody was added in coculture for six days. The coculture was analyzed in FACS Verse flow cytometry. Results: From flow cytometry analysis of coculture, it found that All over T helper cells (CD4+) number p<0.0264 increases in (All Enzymes) MSC rather than explant MSC(p>0.0895) as compared to Collagenase(p>0.7889) in a coculture of Activated T cell and Mesenchymal Stem Cell. Similar T reg cells (CD25+, FOXP3+) expression p<0.0234increases in All Enzymes), decreases in Explant and Collagenase. Experiments have shown that MSCs can also directly prevent the cytotoxic activity of CD8 lymphocytes mainly by blocking their proliferation rather than by inhibiting the cytotoxic effect. And promoting the t-reg cells, which helps in the mediation of immune response in various diseases. Conclusion: MSC suppress Cytotoxic CD8 T cell and Enhance immunoregulatory T reg (CD4+, CD25+, FOXP3+) Cell expression. Thus, MSC maintains a proper balance(ratio) between CD4 T cells and Cytotoxic CD8 T cells.Keywords: MSC, disease, T cell, T regulatory
Procedia PDF Downloads 1142027 Perspectives on Sustainable Bioeconomy in the Baltic Sea Region
Authors: Susanna Vanhamäki, Gabor Schneider, Kati Manskinen
Abstract:
‘Bioeconomy’ is a complex concept that cuts across many sectors and covers several policy areas. To achieve an overall understanding and support a successful bioeconomy, a cross-sectorial approach is necessary. In practice, due to the concept’s wide scope and varying international approaches, fully understanding bioeconomy is challenging on policy level. This paper provides a background of the topic through an analysis of bioeconomy strategies in the Baltic Sea region. Expert interviews and a small survey were conducted to discover the current and intended focuses of these countries’ bioeconomy sectors. The research shows that supporting sustainability is one of the keys in developing the future bioeconomy. The results highlighted that the bioeconomy has to be sustainable and based on circular economy principles. Currently, traditional bioeconomy sectors like food, wood, fish & waters as well as fuel & energy, which are in the core of national bioeconomy strategies, are best known and are considered more relevant than other bioeconomy industries. However, there is increasing potential for novel sectors, such as textiles and pharmaceuticals. The present research indicates that the opportunities presented by these bioeconomy sectors should be recognised and promoted. Education, research and innovation can play key roles in developing transformative and sustainable improvements in primary production and renewable resources. Furthermore, cooperation between businesses and educators is important.Keywords: bioeconomy, circular economy, policy, strategy
Procedia PDF Downloads 1762026 Entrepreneurship as a Strategy for National Development and Attainment of Millennium Development Goals (MDGs)
Authors: Udokporo Emeka Leonard
Abstract:
The thrust of this paper is to examine how entrepreneurship can assist in the attainment of the first goal among the MDGs – eradication of extreme poverty and hunger in Nigeria. The paper discusses how national development can be driven through employment creation and wealth generation that can lead to reduction in widespread poverty so as to attain one crucial target, in fewer years. The task before Nigeria is certainly a herculean one; it is, in fact a race against time. However, in view of the clear and present danger that the increasing rate of poverty portends for our democracy and our nation, is a race we must; for it is a time bomb on our hands. The paper has been structured into sections; with the introduction as section one. Section two discusses the concept of entrepreneurship; Section three examines the link between entrepreneurship and economic development, while section four examines the challenges facing entrepreneurship in Nigeria. In section five, measures and recommendations to boost entrepreneurship that can drive economic development that translates into poverty reduction and employment creation in Nigeria are suggested. This work is a literature review with some understanding of current trends and situations. It outlines some of the difficulties facing entrepreneurship in Nigeria as the operating environment, inadequate understanding and skewed incentive. It also makes recommendations on possible ways to significantly reduce poverty in 2015.Keywords: development, entrepreneur, Nigeria, poverty
Procedia PDF Downloads 2892025 Developmental Trajectories of Distress and Suicide Risk Following Exposure to Military Sexual Trauma in US Military Service Members
Authors: Rebecca K. Blais, Lindsey Monteith, Hallie Tannahill
Abstract:
Military sexual trauma (MST) includes sexual harassment or assault that occurred during military service. Studies conducted to date on the association of MST with mental health and suicide outcomes are generally circumscribed to either active duty or veteran samples, precluding a thorough analysis of developmental trajectories of distress following MST within the context of ongoing (vs. discharged from) military service. The Military Social Science Laboratory has collected data on mixed service samples of men and women service members, addressing this important literature gap. The purpose of this study was to examine the association of MST, suicide risk, PTSD, depression, alcohol use, and posttraumatic cognitions using two separate samples, which collectively allow for a comprehensive examination of the development of distress following MST. The first sample consisted of 1389 men and women service members and veterans with varying levels of MST severity, including no MST, harassment-only MST, and assault MST. The second sample consisted of 400 men and women service members, all reporting the highest severity of MST, assault MST. In both samples, roughly half reported being discharged from service. Participants completed self-report measures of MST exposure severity, suicide ideation, suicide risk, PTSD, depression, alcohol misuse, and posttraumatic cognitions, as well as perceptions of how the military responded to their MST. Relative to those still serving in the US military, veterans were more likely to endorse suicidal ideation, higher PTSD symptoms, and higher depression symptoms if they felt the military mishandled their experience of MST (referred to as perceived institutional betrayal). However, among those reporting the most severe MST, veterans reported lower alcohol misuse and more adaptive posttraumatic cognitions. These findings suggest that those separated from the military experience different posttraumatic aftermath following MST relative to those who are currently serving in the military. Such findings suggest critical differences in the developmental trajectory of distress, necessitating different interventions to successfully reduce distress and dysfunction. Additional analyses will explore the impact of gender on these associations and explore full mechanistic models of distress grouped by discharged status.Keywords: military sexual trauma, PTSD, suicide, developmental trajectories, depression
Procedia PDF Downloads 1242024 Combating Supplier-Copycatting With Intellectual Property Agreements
Authors: Hubert Pun
Abstract:
When a manufacturer outsources the production of a product, it distributes its intellectual property (IP) into a supply chain that it may not be able to fully control. An IP agreement between a manufacturer and its suppliers is a popular solution to address the challenge of supplier-copycatting. The goal of this paper is to examine the impact of copycatting, from both the supplier and third-party firms, and the effectiveness of an IP agreement. Specifically, we use a game-theoretic approach to examine a system where a manufacturer outsources to a supplier. The supplier and a third-party firm decide whether or not to enter the market with copycat products while the manufacturer selects the level of marketing investment. The manufacturer can reduce the threat of supplier-copycatting by signing an IP agreement. We find that the manufacturer can be worse off from signing an IP agreement with its supplier, even if the IP agreement is costless and perfectly enforceable. We show that a manufacturer can deter copycat products through vertical integration and IP agreements and we outline the instances where each method is preferred. Furthermore, we find that the manufacturer may choose not to invest in quality improvements as a copycat deterrence strategy. We show that the supplier can benefit from the manufacturer’s decision to sign an IP agreement and that the supplier and the consumers can benefit from government regulations against copycat products. Our paper demonstrates the strengths and limitations of various copycat deterrence strategies when a supplier and third-party may produce copycat products.Keywords: coopetitive supply chain, copycat, government regulation, intellectual property
Procedia PDF Downloads 1832023 A Conceptual Framework of Strategies for Managing Intellectual Property Rights at Different Stages of Product Life Cycle
Authors: Nithyananda K. V.
Abstract:
Organizations follow various strategies for managing their intellectual property rights, either in the form of securing IP rights or using such IP rights through leveraging, monetizing, and commercializing them. It is well known that organizations adopt different intellectual property strategies in response to other organizations within the industry. But within an organization, and within the products that are being manufactured and sold by it, the strategies for managing its intellectual property rights keep changing at different stages of the product life cycle. Organizations could adopt not only different strategies for managing its intellectual property rights, but could also adopt different kinds of business models to leverage, monetize, and commercial the IP rights. This paper analyzes the various strategies that can be adopted by organizations to manage its IP rights at different stages of the product life cycle and the rationale for adopting such strategies. This would be a secondary research, based solely on the literature of strategic management, new product development, resource-based management, and the intellectual property management. This paper synthesizes the literature from these streams to propose a conceptual framework of strategies that can be adopted by organizations for managing its IP rights in conjunction with the life cycle of the products that it manufactures and sells in the market. This framework could be adopted by organizations in implementing strategies for effectively managing their IP rights.Keywords: intellectual property strategy, management of intellectual property rights, New product development, product life cycle
Procedia PDF Downloads 2972022 Six Failure Points Innovators and Entrepreneurs Risk Falling into: An Exploratory Study of Underlying Emotions and Behaviors of Self- Perceived Failure
Authors: Katarzyna Niewiadomska
Abstract:
Many technology startups fail to achieve a worthwhile return on investment for their funders, founders, and employees. Failures in product development, to-market strategy, sales, and delivery are commonly recognized. Founder failures are not as obvious and harder to identify. This paper explores six critical failure points that entrepreneurs and innovators are susceptible to and aims to link their emotional intelligence and behavioral profile to the points at which they experienced self-perceived failure. A model of six failure points from the perspective of the technology entrepreneur ranging from pre-startup to maturity is provided. By analyzing emotional and behavioral profile data from entrepreneurs and recording in-person accounts, certain key emotional and behavioral clusters contributing to each failure point are determined, and several underlying factors are defined and discussed. Recommendations that support entrepreneurs and innovators stalling at each failure point are given. This work can enable stakeholders to evaluate founder emotional and behavioral profiles and to take risk-mitigating action, either through coaching or through more robust team creation, to avoid founder-related company failure. The paper will be of interest to investors funding startups, executives leading them and mentors supporting them.Keywords: behavior, emotional intelligence, entrepreneur, failure
Procedia PDF Downloads 2292021 Optimization of Feeder Bus Routes at Urban Rail Transit Stations Based on Link Growth Probability
Authors: Yu Song, Yuefei Jin
Abstract:
Urban public transportation can be integrated when there is an efficient connection between urban rail lines, however, there are currently no effective or quick solutions being investigated for this connection. This paper analyzes the space-time distribution and travel demand of passenger connection travel based on taxi track data and data from the road network, excavates potential bus connection stations based on potential connection demand data, and introduces the link growth probability model in the complex network to solve the basic connection bus lines in order to ascertain the direction of the bus lines that are the most connected given the demand characteristics. Then, a tree view exhaustive approach based on constraints is suggested based on graph theory, which can hasten the convergence of findings while doing chain calculations. This study uses WEI QU NAN Station, the Xi'an Metro Line 2 terminal station in Shaanxi Province, as an illustration, to evaluate the model's and the solution method's efficacy. According to the findings, 153 prospective stations have been dug up in total, the feeder bus network for the entire line has been laid out, and the best route adjustment strategy has been found.Keywords: feeder bus, route optimization, link growth probability, the graph theory
Procedia PDF Downloads 772020 Development of Fuzzy Logic Control Ontology for E-Learning
Authors: Muhammad Sollehhuddin A. Jalil, Mohd Ibrahim Shapiai, Rubiyah Yusof
Abstract:
Nowadays, ontology is common in many areas like artificial intelligence, bioinformatics, e-commerce, education and many more. Ontology is one of the focus areas in the field of Information Retrieval. The purpose of an ontology is to describe a conceptual representation of concepts and their relationships within a particular domain. In other words, ontology provides a common vocabulary for anyone who needs to share information in the domain. There are several ontology domains in various fields including engineering and non-engineering knowledge. However, there are only a few available ontology for engineering knowledge. Fuzzy logic as engineering knowledge is still not available as ontology domain. In general, fuzzy logic requires step-by-step guidelines and instructions of lab experiments. In this study, we presented domain ontology for Fuzzy Logic Control (FLC) knowledge. We give Table of Content (ToC) with middle strategy based on the Uschold and King method to develop FLC ontology. The proposed framework is developed using Protégé as the ontology tool. The Protégé’s ontology reasoner, known as the Pellet reasoner is then used to validate the presented framework. The presented framework offers better performance based on consistency and classification parameter index. In general, this ontology can provide a platform to anyone who needs to understand FLC knowledge.Keywords: engineering knowledge, fuzzy logic control ontology, ontology development, table of content
Procedia PDF Downloads 2992019 Developing a Mathematical Model for Trade-Off Analysis of New Green Products
Authors: M. R. Gholizadeh, N. Bhuiyan, M. Salari
Abstract:
In the near future, companies will be increasingly forced to shift their activities along a new road in order to decrease the harmful effects of their design, production and after-life on our environment. Products must meet environmental standards to not only prevent penalties but to consider the sustainability for future generations. However, the most important factor that companies will face is selecting a reasonable strategy to maximize their profit. Thus, companies need to have precise forecast from their profit after design stage through Trade-off analysis. This paper is an attempt to introduce a mathematical model that considers effective factors that impact the total profit when products are designed for resource and energy efficiency or recyclability. The modification is according to different strategies based on a Cost-Volume-Profit model. Here, the cost structure consists of Recycling cost, Development cost, Ramp-up cost, Production cost, and Pollution cost. Also, the model shows the effect of implementation of design for recyclable on revenue structure through revenue of used parts and revenue of recycled materials. A numerical example is used to evaluate the proposed model. Results show that fulfillment of Green Product Development not only can reduce the environmental impact of products but also it will increase profit of company in long term.Keywords: green product, design for environment, C-V-P model, trade-off analysis
Procedia PDF Downloads 3162018 Covid-19: Preparedness, Response, and Use of Video Technology in Managing Infection Rate at Lagos University Teaching Hospital, Lagos-Nigeria
Authors: Afolakemi Helen Olaleye, Ogunjobi A. O
Abstract:
Since coronavirus disease 2019 (COVID-19) was first reported in Nigeria, the virus has spread to virtually all sub-Saharan Africa (SSA) countries. In Nigeria, government agencies came together to create a goal-driven taskforce in improving our response against the virus. As COVID-19 international spread has been curtailed, community spread became rampant locally, leading to many health authorities raising concerns over the scarcity of medical consumables and supplies. Here at Lagos university teaching Hospital (LUTH), we present data analysis of COVID-19 infections offered at our Hospital (LUTH) and the surrounding communities. In addition, the adopted innovative solution to control the spread of infection, methods used in filling shortages of consumables, personal protective equipment (PPE), and use of mobile video technology in patient’s consultation. The management style and strategy adopted has led to a decline in infection rates in our community and among our front line staff. The current COVID -19 crisis has created an opportunity to test and demonstrate our pandemic response and control of infectious disease along with the revealed unknown potential in our community.Keywords: COVID-19, preparedness, response, Lagos university teaching hospital
Procedia PDF Downloads 1442017 Enhancing Academic Writing Through Artificial Intelligence: Opportunities and Challenges
Authors: Abubakar Abdulkareem, Nasir Haruna Soba
Abstract:
Artificial intelligence (AI) is developing at a rapid pace, revolutionizing several industries, including education. This talk looks at how useful AI can be for academic writing, with an emphasis on how it can help researchers be more accurate, productive, and creative. The academic world now relies heavily on AI technologies like grammar checkers, plagiarism detectors, and content generators to help with the writing, editing, and formatting of scholarly papers. This study explores the particular uses of AI in academic writing and assesses how useful and helpful these applications may be for both students and scholars. By means of an extensive examination of extant literature and a sequence of empirical case studies, we scrutinize the merits and demerits of artificial intelligence tools utilized in academic writing. Important discoveries indicate that although AI greatly increases productivity and lowers human error, there are still issues that need to be resolved, including reliance, ethical concerns, and the potential loss of critical thinking abilities. The talk ends with suggestions for incorporating AI tools into academic settings so that they enhance rather than take the place of the intellectual rigor that characterizes scholarly work. This study adds to the continuing conversation about artificial intelligence (AI) in higher education by supporting a methodical strategy that uses technology to enhance human abilities in academic writing.Keywords: artificial intelligence, academic writing, ai tools, productivity, ethics, higher education
Procedia PDF Downloads 272016 Exploratory Study of the Influencing Factors for Hotels' Competitors
Authors: Asma Ameur, Dhafer Malouche
Abstract:
Hotel competitiveness research is an essential phase of the marketing strategy for any hotel. Certainly, knowing the hotels' competitors helps the hotelier to grasp its position in the market and the citizen to make the right choice in picking a hotel. Thus, competitiveness is an important indicator that can be influenced by various factors. In fact, the issue of competitiveness, this ability to cope with competition, remains a difficult and complex concept to define and to exploit. Therefore, the purpose of this article is to make an exploratory study to calculate a competitiveness indicator for hotels. Further on, this paper makes it possible to determine the criteria of direct or indirect effect on the image and the perception of a hotel. The actual research is used to look into the right model for hotel ‘competitiveness. For this reason, we exploit different theoretical contributions in the field of machine learning. Thus, we use some statistical techniques such as the Principal Component Analysis (PCA) to reduce the dimensions, as well as other techniques of statistical modeling. This paper presents a survey covering of the techniques and methods in hotel competitiveness research. Furthermore, this study allows us to deduct the significant variables that influence the determination of hotel’s competitors. Lastly, the discussed experiences in this article found that the hotel competitors are influenced by several factors with different rates.Keywords: competitiveness, e-reputation, hotels' competitors, online hotel’ review, principal component analysis, statistical modeling
Procedia PDF Downloads 1192015 Virtual Co-Creation Model in Hijab Fashion Industry: Business Model Approach
Authors: Lisandy A. Suryana, Lidia Mayangsari, Santi Novani
Abstract:
Creative industry in Indonesia become an important aspect of the economy. One of the sectors of creative industry which give the highest contribution toward Indonesia’s GDP is fashion sector. In line with the target of Indonesia in 2020 to be the qibla’ of moeslem fashion of the world, all of the stakeholders of the business ecosystem should collaborate. Rather than focus on the internal aspects of producer, external aspects such as customers, government, community, etc. become important to be involved in the ecosystem to support the development and sustainability of those fashion sector. Unfortunately, although Indonesia has the biggest moeslem population, the number of hijab business penetration only 10%. Therefore, this research aims to analyze and develop the virtual co-creation platform for hijab creative industry as the strategy to achieve sustainability and increase the market share. This preliminary research describes the main stakeholders in the hijab creative industry based on business model approach. This business model is adapted by considering the service science context, and the data is collected by using the qualitative approach especially in-depth interview. This business model shows the relationship between resource integration, value co-creation, the value proposition of the company, and also the financial aspect of the business.Keywords: value co-creation, Hijab Fashion Industry, creative industry, service business model, business model canvas
Procedia PDF Downloads 3802014 Nano-Particle of π-Conjugated Polymer for Near-Infrared Bio-Imaging
Authors: Hiroyuki Aoki
Abstract:
Molecular imaging has attracted much attention recently, which visualizes biological molecules, cells, tissue, and so on. Among various in vivo imaging techniques, the fluorescence imaging method has been widely employed as a useful modality for small animals in pre-clinical researches. However, the higher signal intensity is needed for highly sensitive in vivo imaging. The objective of the current study is the development of a fluorescent imaging agent with high brightness for the tumor imaging of a mouse. The strategy to enhance the fluorescence signal of a bio-imaging agent is the increase of the absorption of the excitation light and the fluorescence conversion efficiency. We developed a nano-particle fluorescence imaging agent consisting of a π-conjugated polymer emitting a fluorescence signal in a near infrared region. A large absorption coefficient and high emission intensity at a near infrared optical window for biological tissue enabled highly sensitive in vivo imaging with a tumor-targeting ability by an EPR (enhanced permeation and retention) effect. The signal intensity from the π-conjugated fluorescence imaging agent is larger by two orders of magnitude compared to a quantum dot, which has been known as the brightest imaging agent. The π-conjugated polymer nano-particle would be a promising candidate in the in vivo imaging of small animals.Keywords: fluorescence, conjugated polymer, in vivo imaging, nano-particle, near-infrared
Procedia PDF Downloads 4782013 Deep Supervision Based-Unet to Detect Buildings Changes from VHR Aerial Imagery
Authors: Shimaa Holail, Tamer Saleh, Xiongwu Xiao
Abstract:
Building change detection (BCD) from satellite imagery is an essential topic in urbanization monitoring, agricultural land management, and updating geospatial databases. Recently, methods for detecting changes based on deep learning have made significant progress and impressive results. However, it has the problem of being insensitive to changes in buildings with complex spectral differences, and the features being extracted are not discriminatory enough, resulting in incomplete buildings and irregular boundaries. To overcome these problems, we propose a dual Siamese network based on the Unet model with the addition of a deep supervision strategy (DS) in this paper. This network consists of a backbone (encoder) based on ImageNet pre-training, a fusion block, and feature pyramid networks (FPN) to enhance the step-by-step information of the changing regions and obtain a more accurate BCD map. To train the proposed method, we created a new dataset (EGY-BCD) of high-resolution and multi-temporal aerial images captured over New Cairo in Egypt to detect building changes for this purpose. The experimental results showed that the proposed method is effective and performs well with the EGY-BCD dataset regarding the overall accuracy, F1-score, and mIoU, which were 91.6 %, 80.1 %, and 73.5 %, respectively.Keywords: building change detection, deep supervision, semantic segmentation, EGY-BCD dataset
Procedia PDF Downloads 1202012 Experiences of Online Opportunities and Risks: Examining Internet Use and Digital Literacy of Young People in Nigeria
Authors: Isah Yahaya Aliyu
Abstract:
Research on Internet use has often approached beneficial uses (online opportunities) of the Internet as separate from the risky encounters (online risks) of young people online. However, empirical evidence from diverse contexts appears to increasingly support the fusion of the two sets of online activities. Hence, the current research investigates the correlation between Internet use (IU) and digital literacy (DL) with online opportunities (OP) and risks (OR), using data from a Nigerian context, where there appears a paucity of research and literature on integrating opportunities and risks in the same study. A web-based data collection method was used to administer a survey to 335 undergraduate students in Northeastern Nigeria. Underpinned to Livingstone and Helsper model, findings are largely consistent with existing literature; IU and DL influence OP (R2 = 0.791, SE = 0.265, F-Stats = 626.566, P-value <.001), equally IU and DL influence OR as well (R2 = 0.343, SE = 0.465, F-Stats = 86.671, P-value <.001). OP and OR were found to strongly correlate positively (r = .667, n = 335, p < 0.01). This study has provided buttressing evidence from a Nigerian context of the fusion of benefits and risks of the Internet among young people. It has also upheld the argument for improved literacy as strategy for minimizing risks/harm rather than restricting use. Other theoretical and policy implications of the findings have been discussed in line with local and global debates about the Internet and its attendant effects.Keywords: digital, internet, literacy, opportunities, risks
Procedia PDF Downloads 872011 Re-identification Risk and Mitigation in Federated Learning: Human Activity Recognition Use Case
Authors: Besma Khalfoun
Abstract:
In many current Human Activity Recognition (HAR) applications, users' data is frequently shared and centrally stored by third parties, posing a significant privacy risk. This practice makes these entities attractive targets for extracting sensitive information about users, including their identity, health status, and location, thereby directly violating users' privacy. To tackle the issue of centralized data storage, a relatively recent paradigm known as federated learning has emerged. In this approach, users' raw data remains on their smartphones, where they train the HAR model locally. However, users still share updates of their local models originating from raw data. These updates are vulnerable to several attacks designed to extract sensitive information, such as determining whether a data sample is used in the training process, recovering the training data with inversion attacks, or inferring a specific attribute or property from the training data. In this paper, we first introduce PUR-Attack, a parameter-based user re-identification attack developed for HAR applications within a federated learning setting. It involves associating anonymous model updates (i.e., local models' weights or parameters) with the originating user's identity using background knowledge. PUR-Attack relies on a simple yet effective machine learning classifier and produces promising results. Specifically, we have found that by considering the weights of a given layer in a HAR model, we can uniquely re-identify users with an attack success rate of almost 100%. This result holds when considering a small attack training set and various data splitting strategies in the HAR model training. Thus, it is crucial to investigate protection methods to mitigate this privacy threat. Along this path, we propose SAFER, a privacy-preserving mechanism based on adaptive local differential privacy. Before sharing the model updates with the FL server, SAFER adds the optimal noise based on the re-identification risk assessment. Our approach can achieve a promising tradeoff between privacy, in terms of reducing re-identification risk, and utility, in terms of maintaining acceptable accuracy for the HAR model.Keywords: federated learning, privacy risk assessment, re-identification risk, privacy preserving mechanisms, local differential privacy, human activity recognition
Procedia PDF Downloads 11