Search results for: semantics of business vocabulary and rules
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4501

Search results for: semantics of business vocabulary and rules

1771 Insights into the Perception of Sustainable Technology Adoption among Malaysian Small and Medium-Sized Enterprises

Authors: Majharul Talukder, Ali Quazi

Abstract:

The use of sustainable technology is being increasingly driven by the demand for saving resources, long-term cost savings, and protecting the environment. A transitional economy such as Malaysia is an example where traditional technologies are being replaced by sustainable ones. The antecedents that are driving Malaysian SMEs to integrate sustainable technology into their business operations have not been well researched. This paper addresses this gap in our knowledge through an examination of attitudes and ethics as antecedents of acceptance of sustainable technology among Malaysian SMEs. The database comprised 322 responses that were analysed using the PLS-SEM path algorithm. Results indicated that effective and altruism attitudes have high predictive ability for the usage of sustainable technology in Malaysian SMEs. This paper identifies the implications of the findings, along with the major limitations of the research and explores future areas of research in this field.

Keywords: sustainable technology, innovation management, Malaysian SMEs, organizational attitudes and ethical belief

Procedia PDF Downloads 333
1770 Data-Driven Market Segmentation in Hospitality Using Unsupervised Machine Learning

Authors: Rik van Leeuwen, Ger Koole

Abstract:

Within hospitality, marketing departments use segmentation to create tailored strategies to ensure personalized marketing. This study provides a data-driven approach by segmenting guest profiles via hierarchical clustering based on an extensive set of features. The industry requires understandable outcomes that contribute to adaptability for marketing departments to make data-driven decisions and ultimately driving profit. A marketing department specified a business question that guides the unsupervised machine learning algorithm. Features of guests change over time; therefore, there is a probability that guests transition from one segment to another. The purpose of the study is to provide steps in the process from raw data to actionable insights, which serve as a guideline for how hospitality companies can adopt an algorithmic approach.

Keywords: hierarchical cluster analysis, hospitality, market segmentation

Procedia PDF Downloads 108
1769 Training a Neural Network to Segment, Detect and Recognize Numbers

Authors: Abhisek Dash

Abstract:

This study had three neural networks, one for number segmentation, one for number detection and one for number recognition all of which are coupled to one another. All networks were trained on the MNIST dataset and were convolutional. It was assumed that the images had lighter background and darker foreground. The segmentation network took 28x28 images as input and had sixteen outputs. Segmentation training starts when a dark pixel is encountered. Taking a window(7x7) over that pixel as focus, the eight neighborhood of the focus was checked for further dark pixels. The segmentation network was then trained to move in those directions which had dark pixels. To this end the segmentation network had 16 outputs. They were arranged as “go east”, ”don’t go east ”, “go south east”, “don’t go south east”, “go south”, “don’t go south” and so on w.r.t focus window. The focus window was resized into a 28x28 image and the network was trained to consider those neighborhoods which had dark pixels. The neighborhoods which had dark pixels were pushed into a queue in a particular order. The neighborhoods were then popped one at a time stitched to the existing partial image of the number one at a time and trained on which neighborhoods to consider when the new partial image was presented. The above process was repeated until the image was fully covered by the 7x7 neighborhoods and there were no more uncovered black pixels. During testing the network scans and looks for the first dark pixel. From here on the network predicts which neighborhoods to consider and segments the image. After this step the group of neighborhoods are passed into the detection network. The detection network took 28x28 images as input and had two outputs denoting whether a number was detected or not. Since the ground truth of the bounds of a number was known during training the detection network outputted in favor of number not found until the bounds were not met and vice versa. The recognition network was a standard CNN that also took 28x28 images and had 10 outputs for recognition of numbers from 0 to 9. This network was activated only when the detection network votes in favor of number detected. The above methodology could segment connected and overlapping numbers. Additionally the recognition unit was only invoked when a number was detected which minimized false positives. It also eliminated the need for rules of thumb as segmentation is learned. The strategy can also be extended to other characters as well.

Keywords: convolutional neural networks, OCR, text detection, text segmentation

Procedia PDF Downloads 161
1768 The Implication of Islamic Finance and Banking for the Sustainable Development in Bangladesh

Authors: Khan Md. Abdus Subhan, Rabeya Bushra

Abstract:

Bangladesh has already seen significant growth in Islamic banking and finance, contributing to the rapid expansion of this sector in the global banking and finance industry. The objective of this study is to analyse the Islamic finance and banking industry's ability to contribute to sustainable development in Bangladesh. It aims to assess the current state, potential, and limitations of Islamic banking and finance in the country. Bangladesh has significant growth potential for Islamic banking and finance. However, addressing several challenges is imperative. These challenges include the absence of a well-developed infrastructure for Islamic banking and finance, a lack of a solid legal framework, limited attention from the central bank, the absence of an Islamic capital market, and a shortage of experts in Sharia law as well as public awareness. Bangladesh, a nation characterized by a primarily Muslim populace, has acknowledged the importance of Islamic finance and banking in promoting sustainable development. Islamic banking principles advocate for ethical practices, risk sharing, and the avoidance of interest-based transactions. This article examines the impact of Islamic finance and banking on promoting sustainable development in Bangladesh and emphasizes its capacity to tackle socio-economic difficulties. The Islamic banking sector, as a trailblazer in funding sustainable development, has the potential to play a significant role in facilitating the shift toward a circular economy. According to Shari'ah rules and the Sustainable Development Goals (SDGs), Islamic finance principles will help change the linear economy into a circular one. They will also provide a strong framework and a lot of funding sources. This study aims to offer crucial recommendations and techniques for the successful implementation of Islamic finance institutions in Bangladesh. The study will use quantitative research methodology, collecting data from secondary sources. This research offers a thorough understanding of the reasoning for the payment of Zakat and its socio-economic importance. Furthermore, the study provides significant insights that could assist Bangladeshi policymakers and governments in implementing Islamic financing systems.

Keywords: sustainable development, Islamic fintech, Islamic banking, Bangladesh

Procedia PDF Downloads 41
1767 A Survey on Taxpayer's Compliance in Prospect Theory Structure Using Hierarchical Bayesian Approach

Authors: Sahar Dehghan, Yeganeh Mousavi Jahromi, Ghahraman Abdoli

Abstract:

Since tax revenues are one of the most important sources of government revenue, it is essential to consider increasing taxpayers' compliance. One of the factors that can affect the taxpayers' compliance is the structure of the crimes and incentives envisaged in the tax law. In this research, by using the 'prospect theory', the effects of changes in the rate of crimes and the tax incentive in the direct tax law on the taxpayer’s compliance behavior have been investigated. To determine the preferences and preferences of taxpayer’s in the business sector and their degree of sensitivity to fines and incentives, a questionnaire with mixed gamble structure is designed. Estimated results using the Hierarchical Bayesian method indicate that the taxpayer’s that have been tested in this study are more sensitive to the incentives in the direct tax law, and the tax administration can use this to increase the level of collected tax and increase the level of compliance.

Keywords: tax compliance, prospect theory, value function, mixed gamble

Procedia PDF Downloads 174
1766 The Impact of Insider Trading on Open Market Share Repurchase: A Study in Indian Context

Authors: Sarthak Kumar Jena, Chandra Sekhar Mishra, Prabina Rajib

Abstract:

Purpose: This paper aims to derive undervaluation signal from the insiders trading of Indian companies where the ownership is complex and concentrated, investors protection is weak, and the insider rules and regulations are not stringent like developed country. This study examines the relationship between insider trading with short term and long term abnormal return. The study also examines the relationship between insider trading and the actual share repurchase by the firm. Methodology: A sample of 78 companies over the period 2008-2013 are analyzed in the study due to not availability of insider data in Indian context. For preliminary analysis T-test and Wilcoxon rank sum test is used to find the difference between the insider trading before and after the share repurchase announcement. Tobit model is used to find out whether insider trading influence shares repurchase decisions or not. Return on the basis of market model and buy hold are calculated in the previous year and the following year of share repurchase announcement. Findings: The paper finds that insider trading around share repurchase is more than control firms and there is positive and significant difference in insider buying between the previous year of share buyback announcement and the following year of buyback announcement. Insider buying before share repurchase announcement has a positive influence on share repurchase decisions. We find insider buying has a positive and significant relationship with announcement return, whereas insider selling has a negative significant relationship with announcement return. Actual share repurchase and program completion also depend on insider trading before share repurchase. Research limitation: The study is constrained by the small sample size, so the results should be viewed by keeping this limitation in mind. Originality: The paper is to our best knowledge the first study based on Indian context to extend the insider trading literature to share repurchase event and examine insider trading to find out undervaluation signal associated with insider buying.

Keywords: insider trading, buyback, open market share repurchase, signalling

Procedia PDF Downloads 199
1765 Calculational-Experimental Approach of Radiation Damage Parameters on VVER Equipment Evaluation

Authors: Pavel Borodkin, Nikolay Khrennikov, Azamat Gazetdinov

Abstract:

The problem of ensuring of VVER type reactor equipment integrity is now most actual in connection with justification of safety of the NPP Units and extension of their service life to 60 years and more. First of all, it concerns old units with VVER-440 and VVER-1000. The justification of the VVER equipment integrity depends on the reliability of estimation of the degree of the equipment damage. One of the mandatory requirements, providing the reliability of such estimation, and also evaluation of VVER equipment lifetime, is the monitoring of equipment radiation loading parameters. In this connection, there is a problem of justification of such normative parameters, used for an estimation of the pressure vessel metal embrittlement, as the fluence and fluence rate (FR) of fast neutrons above 0.5 MeV. From the point of view of regulatory practice, a comparison of displacement per atom (DPA) and fast neutron fluence (FNF) above 0.5 MeV has a practical concern. In accordance with the Russian regulatory rules, neutron fluence F(E > 0.5 MeV) is a radiation exposure parameter used in steel embrittlement prediction under neutron irradiation. However, the DPA parameter is a more physically legitimate quantity of neutron damage of Fe based materials. If DPA distribution in reactor structures is more conservative as neutron fluence, this case should attract the attention of the regulatory authority. The purpose of this work was to show what radiation load parameters (fluence, DPA) on all VVER equipment should be under control, and give the reasonable estimations of such parameters in the volume of all equipment. The second task is to give the conservative estimation of each parameter including its uncertainty. Results of recently received investigations allow to test the conservatism of calculational predictions, and, as it has been shown in the paper, combination of ex-vessel measured data with calculated ones allows to assess unpredicted uncertainties which are results of specific unique features of individual equipment for VVER reactor. Some results of calculational-experimental investigations are presented in this paper.

Keywords: equipment integrity, fluence, displacement per atom, nuclear power plant, neutron activation measurements, neutron transport calculations

Procedia PDF Downloads 157
1764 A Probability Analysis of Construction Project Schedule Using Risk Management Tool

Authors: A. L. Agarwal, D. A. Mahajan

Abstract:

Construction industry tumbled along with other industry/sectors during recent economic crash. Construction business could not regain thereafter and still pass through slowdown phase, resulted many real estate as well as infrastructure projects not completed on schedule and within budget. There are many theories, tools, techniques with software packages available in the market to analyze construction schedule. This study focuses on the construction project schedule and uncertainties associated with construction activities. The infrastructure construction project has been considered for the analysis of uncertainty on project activities affecting project duration and analysis is done using @RISK software. Different simulation results arising from three probability distribution functions are compiled to benefit construction project managers to plan more realistic schedule of various construction activities as well as project completion to document in the contract and avoid compensations or claims arising out of missing the planned schedule.

Keywords: construction project, distributions, project schedule, uncertainty

Procedia PDF Downloads 350
1763 Revisiting the Jurisprudence of the Appellate Courts on the Jurisdiction of the Shari'ah Court of Appeal under Selected Nigerian Constitutions

Authors: Dahiru Jafaru Usman

Abstract:

Nigerian courts have been sanctioned by a plethora of authorities to always employ the literal rule in interpreting statutes where the language of the statute is clear and unambiguous. This cardinal rule of interpretation appears not to be employed on Shari'ah issues in Nigeria. This is more pronounced in the interpretation of the jurisdiction of the Shari'ah Court of Appeal (hereinafter the court). The paper doctrinally assesses the judicial attitude of Nigerian appellate courts towards the construction of Section 277 of the 1999 Constitution as amended and other relevant statutory enactments by the State Houses of Assembly. The paper argues that a careful examination of the wordings of the constitution on the jurisdiction of the court literally reveals the intention of the constitutional drafters empowering the National Assembly and States' House of Assemblies to add to the itemised jurisdictional areas of the court other matters not mentioned. The paper found that the appellate courts failed in their construction of the constitutional provisions to accord the words and phrases used in the establishment, jurisdiction, and quorum sections of the court their ordinary and grammatical meaning. This results in consistent limitation of the jurisdiction of the court to matters of Islamic personal law. This remains so even when Decree No. 26 of 1986 was in force suspending and amending the provisions of the 1979 Constitution deleting the word 'personal' in the suspended Nigerian Constitutions. In order not to render section 277 futile, the paper recommends that appellate courts in Nigeria should as required by rules of statutory interpretation adopt literal and ordinary grammatical meaning in interpreting constitutional provisions on the jurisdiction of the court. It is further recommended that appellate courts must interpret the provisions of the 1999 constitution in a manner not to frustrate the several decades' yearnings of the Muslims for a court that would hear all their appellate criminal and civil matters on the path of Shari'ah from the lowest court to the highest. This is a duty the Nigerian Supreme Court placed on their shoulders.

Keywords: interpretation of statutes, jurisdiction, literal rule, Nigeria, Shari'ah Court of Appeal, 1999 Constitution

Procedia PDF Downloads 187
1762 Whistleblowing a Contemporary Topic Concerning Businesses

Authors: Andreas Kapardis, Maria Krambia-Kapardis, Sofia Michaelides-Mateou

Abstract:

Corruption and economic crime is a serious problem affecting the sustainability of businesses in the 21st century. Nowadays, many corruption or fraud cases come to light thanks to whistleblowers. This article will first discuss the concept of whistleblowing as well as some relevant legislation enacted around the world. Secondly, it will discuss the findings of a survey of whistleblowers or could-have-been whistleblowers. Finally, suggestions for the development of a comprehensive whistleblowing framework will be considered. Whistleblowing can be described as expressing a concern about a wrongdoing within an organization, such as a corporation, an association, an institution or a union. Such concern must be in the public interest and in good faith and should relate to the cover up of matters that could potentially result in a miscarriage of justice, a crime, criminal offence and threats to health and safety. Whistleblowing has proven to be an effective anti-corruption mechanism and a powerful tool that helps deterring fraud, violations, and malpractices within organizations, corporations and the public sector. Research in the field of whistleblowing has concentrated on the reasons for whistleblowing and financial bounties; the effectiveness of whistleblowing; whistleblowing being a prosocial behavior with a psychological perspective and consequences; as a tool in protecting shareholders, saving lives and billions of dollars of public funds. Whilst, no other study of whistleblowing has been carried out on whistleblowers or intended whistleblowers. The study reported in the current paper analyses the findings of 74 whistleblowers or intended whistleblowers, the reasons behind their decision to blow the whistle, or not to proceed to blow the whistle and any regrets they may have had. In addition a profile of a whistleblower is developed concerning their age, gender, marital and family status and position in an organization. Lessons learned from the intended whistleblowers and in response to the questions if they would be willing to blow the whistle again show that enacting legislation to protect the whistleblower is not enough. Similarly, rewarding the whistleblower does not appear to provide the whistleblower with an incentive since the majority noted that “work ethics is more important than financial rewards”. We recommend the development of a comprehensive and holistic framework for the protection of the whistleblower and to ensure that remedial actions are immediately taken once a whistleblower comes forward. The suggested framework comprises (a) hard legislation in ensuring the whistleblowers follow certain principles when blowing the whistle and, in return, are protected for a period of 5 years from being fired, dismissed, bullied, harassed; (b) soft legislation in establishing an agency to firstly ensure psychological and legal advice is provided to the whistleblowers and secondly any required remedial action is immediately taken to avert the undesirable events reported by a whistleblower from occurring and, finally; (c) mechanisms to ensure the coordination of actions taken.

Keywords: whistleblowing, business ethics, legislation, business

Procedia PDF Downloads 309
1761 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net

Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie

Abstract:

A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.

Keywords: reliability, colored Petri net, assessment, payment models, m-commerce

Procedia PDF Downloads 537
1760 Corporate Cultures Management towards the Retention of Employees: Case Study Company in Thailand

Authors: Duangsamorn Rungsawanpho

Abstract:

The objectives of this paper are to explore the corporate cultures management as determinants of employee retention company in Thailand. This study using mixed method methodology. Data collection using questionnaires and in-depth interviews. The statistics used for data analysis were percentage, mean, standard deviation and inferential statistics will include. The results show that the corporate management culture is perfect for any organization but it depends on the business and the industry because the situations or circumstances that corporate executives are met is different. Because the finding explained that the employees of the company determine the achievement of value-oriented by the corporate culture and international relations is perceived most value for their organizations. In additional we found the employees perceiving with participation can be interpreted as a positive example, many employees feel that they are part of management because they care about their opinions or ideas related with their work.

Keywords: corporate culture, employee retention, retention of employees, management approaches

Procedia PDF Downloads 303
1759 Refugee to Settler: A Study on Rohingya Migration in Chattogram and Cox’s Bazar

Authors: Shahadat Hossain

Abstract:

The United Nations (UN) declared Rohingya as the most oppressed nation in the world. The Rohingya's native place is Arakan, Myanmar, which is newly named Rakhine. The Rohingya have been forcibly migrated to Bangladesh, Malaysia, and other states for settlement for many years. Bangladesh has not been able to handle the pressure of Rohingya refugees, although it has been hosting Rohingya refugees for multiple decades. As a result, Rohingya refugees have been mixed with the local population. Some of the Rohingya people of Arakan already became citizens of Bangladesh after migrating to Bangladesh. The Rohingya have become Bangladeshis through intermarriage, kinship, labour, and business partnerships. Rohingya people preferred to settle in Bangladesh due to cultural, religious, and linguistic similarities. Some of the Rohingyas get an advantage also from the domestic political and voting equation of Bangladesh. This research tried to explore how the Rohingyas settled in Chattogram and Cox's Bazar and became one of the locals. The research sought to focus on their advantage, difficulties, and narrative.

Keywords: Rohingya, refugee, Bangladesh, Rohingya settlement

Procedia PDF Downloads 72
1758 Assessing Soft Skills In Accounting Programmes: Insights From South African University Lecturers

Authors: Dolly Nyaguthii Wanjau

Abstract:

This study contributes to our understanding of how lecturers assess soft skills in accounting programmes, with the intention of producing graduates that are better prepared for the world of work. Insights were obtained through semi-structured interviews with twelve South African universities that offer chartered accountant training and accredited by SAICA. It was found that the lecturers assessed soft skills using traditional methods of assessments such as tests, assignments, and examinations. However, there were missed opportunities to embrace ICT tools in the assessment process, and this could be attributed to a lack of resources within the participating universities. Given the increasing use of digital tools for business activities, it is important that ICT tools be embraced as an inseparable part of soft skills because employers are increasingly looking for accounting graduates with digital skills.

Keywords: accounting, assessment, ICT skills, SAICA, soft skills

Procedia PDF Downloads 129
1757 Machine Learning Techniques to Predict Cyberbullying and Improve Social Work Interventions

Authors: Oscar E. Cariceo, Claudia V. Casal

Abstract:

Machine learning offers a set of techniques to promote social work interventions and can lead to support decisions of practitioners in order to predict new behaviors based on data produced by the organizations, services agencies, users, clients or individuals. Machine learning techniques include a set of generalizable algorithms that are data-driven, which means that rules and solutions are derived by examining data, based on the patterns that are present within any data set. In other words, the goal of machine learning is teaching computers through 'examples', by training data to test specifics hypothesis and predict what would be a certain outcome, based on a current scenario and improve that experience. Machine learning can be classified into two general categories depending on the nature of the problem that this technique needs to tackle. First, supervised learning involves a dataset that is already known in terms of their output. Supervising learning problems are categorized, into regression problems, which involve a prediction from quantitative variables, using a continuous function; and classification problems, which seek predict results from discrete qualitative variables. For social work research, machine learning generates predictions as a key element to improving social interventions on complex social issues by providing better inference from data and establishing more precise estimated effects, for example in services that seek to improve their outcomes. This paper exposes the results of a classification algorithm to predict cyberbullying among adolescents. Data were retrieved from the National Polyvictimization Survey conducted by the government of Chile in 2017. A logistic regression model was created to predict if an adolescent would experience cyberbullying based on the interaction and behavior of gender, age, grade, type of school, and self-esteem sentiments. The model can predict with an accuracy of 59.8% if an adolescent will suffer cyberbullying. These results can help to promote programs to avoid cyberbullying at schools and improve evidence based practice.

Keywords: cyberbullying, evidence based practice, machine learning, social work research

Procedia PDF Downloads 168
1756 Higher Education and the Economy in Western Canada: Is Institutional Autonomy at Risk?

Authors: James Barmby

Abstract:

Canada’s westernmost provinces of British Columbia and Alberta are similar in many respects as they are both reliant on volatile natural resources for major portions of their economies. The two provinces have banded together to develop mutually beneficial trade, investment and labour market mobility rules, but in terms of developing systems of higher education, the two provinces are attempting to align higher education programs to economic development objectives by means that are quite different. In British Columbia, the recently announced initiative, B.C’s Skills for Jobs Blueprint will “make sure education and training programs are aligned with the demands of the labor market.” Meanwhile in Alberta, the province’s institutions of higher education are enjoying the tenth year of their membership in the Campus Alberta Quality Council, which makes recommendations to government on issues related to post-secondary education, including the approval of new programs. In B.C., public institutions of higher education are encouraged to comply with government objectives, and are rewarded with targeted funds for their efforts. In Alberta, the institutions as a system tell the government what programs they want to offer and government can agree or not agree to fund these programs through a ministerial approval process. In comparing the two higher education systems, the question emerges as to which one is more beneficial to the province: the one where change is directed primarily by financial incentives to achieve economic objectives or the one that makes recommendations to the government for changes in programs to achieve institutional objectives? How is institutional autonomy affected in each strategy? Does institutional autonomy matter anymore? In recent years, much has been written in regard to academic freedom, but less about institutional autonomy, which is seen by many as essential to protecting academic freedom. However, while institutional autonomy means freedom from government control, it does not necessarily mean self-government. In this study, a comparison of the two higher education systems is made using recent government policy initiatives in both provinces, and responses to those actions by the higher education institutions. The findings indicate that the economic needs in both provinces take precedence over issues of institutional autonomy.

Keywords: alberta, British Columbia, institutional autonomy, funding

Procedia PDF Downloads 701
1755 Audit and Assurance Program for AI-Based Technologies

Authors: Beatrice Arthur

Abstract:

The rapid development of artificial intelligence (AI) has transformed various industries, enabling faster and more accurate decision-making processes. However, with these advancements come increased risks, including data privacy issues, systemic biases, and challenges related to transparency and accountability. As AI technologies become more integrated into business processes, there is a growing need for comprehensive auditing and assurance frameworks to manage these risks and ensure ethical use. This paper provides a literature review on AI auditing and assurance programs, highlighting the importance of adapting traditional audit methodologies to the complexities of AI-driven systems. Objective: The objective of this review is to explore current AI audit practices and their role in mitigating risks, ensuring accountability, and fostering trust in AI systems. The study aims to provide a structured framework for developing audit programs tailored to AI technologies while also investigating how AI impacts governance, risk management, and regulatory compliance in various sectors. Methodology: This research synthesizes findings from academic publications and industry reports from 2014 to 2024, focusing on the intersection of AI technologies and IT assurance practices. The study employs a qualitative review of existing audit methodologies and frameworks, particularly the COBIT 2019 framework, to understand how audit processes can be aligned with AI governance and compliance standards. The review also considers real-time auditing as an emerging necessity for influencing AI system design during early development stages. Outcomes: Preliminary findings indicate that while AI auditing is still in its infancy, it is rapidly gaining traction as both a risk management strategy and a potential driver of business innovation. Auditors are increasingly being called upon to develop controls that address the ethical and operational risks posed by AI systems. The study highlights the need for continuous monitoring and adaptable audit techniques to handle the dynamic nature of AI technologies. Future Directions: Future research will explore the development of AI-specific audit tools and real-time auditing capabilities that can keep pace with evolving technologies. There is also a need for cross-industry collaboration to establish universal standards for AI auditing, particularly in high-risk sectors like healthcare and finance. Further work will involve engaging with industry practitioners and policymakers to refine the proposed governance and audit frameworks. Funding/Support Acknowledgements: This research is supported by the Information Systems Assurance Management Program at Concordia University of Edmonton.

Keywords: AI auditing, assurance, risk management, governance, COBIT 2019, transparency, accountability, machine learning, compliance

Procedia PDF Downloads 25
1754 An Ancient Rule for Constructing Dodecagonal Quasi-Periodic Formations

Authors: Rima A. Ajlouni

Abstract:

The discovery of quasi-periodic structures in material science is revealing an exciting new class of symmetries, which has never been explored before. Due to their unique structural and visual properties, these symmetries are drawing interest from many scientific and design disciplines. Especially, in art and architecture, these symmetries can provide a rich source of geometry for exploring new patterns, forms, systems, and structures. However, the structural systems of these complicated symmetries are still posing a perplexing challenge. While much of their local order has been explored, the global governing system is still unresolved. Understanding their unique global long-range order is essential to their generation and application. The recent discovery of dodecagonal quasi-periodic patterns in historical Islamic architecture is generating a renewed interest into understanding the mathematical principles of traditional Islamic geometry. Astonishingly, many centuries before its description in the modern science, ancient artists, by using the most primitive tools (a compass and a straight edge), were able to construct patterns with quasi-periodic formations. These ancient patterns can be found all over the ancient Islamic world, many of which exhibit formations with 5, 8, 10 and 12 quasi-periodic symmetries. Based on the examination of these historical patterns and derived from the generating principles of Islamic geometry, a global multi-level structural model is presented that is able to describe the global long-range order of dodecagonal quasi-periodic formations in Islamic Architecture. Furthermore, this method is used to construct new quasi-periodic tiling systems as well as generating their deflation and inflation rules. This method can be used as a general guiding principle for constructing infinite patches of dodecagon-based quasi-periodic formations, without the need for local strategies (tiling, matching, grid, substitution, etc.) or complicated mathematics; providing an easy tool for scientists, mathematicians, teachers, designers and artists, to generate and study a wide range of dodecagonal quasi-periodic formations.

Keywords: dodecagonal, Islamic architecture, long-range order, quasi-periodi

Procedia PDF Downloads 402
1753 Psychological Factors Predicting Social Distance during the COVID-19 Pandemic: An Empirical Investigation

Authors: Calogero Lo Destro

Abstract:

Numerous nations around the world are facing exceptional challenges in employing measures to stop the spread of COVID-19. Following the recommendations of the World Health Organization, a series of preventive measures have been adopted. However, individuals must comply with these rules and recommendations in order to make these measures effective. While COVID-19 was climaxing, it seemed of crucial importance to analyze which psychosocial factors contribute to the acceptance of such preventive behavior, thus favoring the management of COVID-19 worldwide health crisis. In particular, the identification of aspects related to obstacles and facilitation of adherence to social distancing has been considered crucial in the containment of the virus spread. Since the virus was firstly detected in China, Asian people could be considered a relevant outgroup targeted for exclusion. We also hypothesized social distance could be influenced by characteristics of the target, such as smiling or coughing. 260 participants participated in this research on a voluntary basis. They filled a survey designed to explore a series of COVID-19 measures (such as exposure to virus and fear of infection). We also assessed participants state and trait anxiety. The dependent variable was social distance, based on a measure of seating distance designed ad hoc for the present work. Our hypothesis that participants could report greater distance in response to Asian people was not confirmed. On the other hand, significantly lower distance in response to smiling compared to coughing targets was reported. Adopting a regression analysis model, we found that participants' social distance, in response to both coughing and smiling targets, was predicted by fear of infection and by the perception COVID-19 could become a pandemic. Social distance in response to the coughing target was also significantly and positively predicted by age and state anxiety. In summary, the present work has sought to identify a set of psychological variables, which may still be predictive of social distancing.

Keywords: COVID-19, social distancing, health, preventive behaviors, risk of infection

Procedia PDF Downloads 124
1752 Computational Assistance of the Research, Using Dynamic Vector Logistics of Processes for Critical Infrastructure Subjects Continuity

Authors: Urbánek Jiří J., Krahulec Josef, Urbánek Jiří F., Johanidesová Jitka

Abstract:

These Computational assistance for the research and modelling of critical infrastructure subjects continuity deal with this paper. It enables us the using of prevailing operation system MS Office (SmartArt...) for mathematical models, using DYVELOP (Dynamic Vector Logistics of Processes) method. It serves for crisis situations investigation and modelling within the organizations of critical infrastructure. In the first part of the paper, it will be introduced entities, operators and actors of DYVELOP method. It uses just three operators of Boolean algebra and four types of the entities: the Environments, the Process Systems, the Cases and the Controlling. The Process Systems (PrS) have five “brothers”: Management PrS, Transformation PrS, Logistic PrS, Event PrS and Operation PrS. The Cases have three “sisters”: Process Cell Case, Use Case and Activity Case. They all need for the controlling of their functions special Ctrl actors, except ENV – it can do without Ctrl. Model´s maps are named the Blazons and they are able mathematically - graphically express the relationships among entities, actors and processes. In the second part of this paper, the rich blazons of DYVELOP method will be used for the discovering and modelling of the cycling cases and their phases. The blazons need live PowerPoint presentation for better comprehension of this paper mission. The crisis management of energetic crisis infrastructure organization is obliged to use the cycles for successful coping of crisis situations. Several times cycling of these cases is a necessary condition for the encompassment of the both the emergency event and the mitigation of organization´s damages. Uninterrupted and continuous cycling process bring for crisis management fruitfulness and it is a good indicator and controlling actor of organizational continuity and its sustainable development advanced possibilities. The research reliable rules are derived for the safety and reliable continuity of energetic critical infrastructure organization in the crisis situation.

Keywords: blazons, computational assistance, DYVELOP method, critical infrastructure

Procedia PDF Downloads 382
1751 An Ontology for Semantic Enrichment of RFID Systems

Authors: Haitham S. Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, Kamilia Hosny

Abstract:

Radio Frequency Identification (RFID) has become a key technology in the margining concept of Internet of Things (IoT). Naturally, business applications would require the deployment of various RFID systems that are developed by different vendors and use various data formats. This heterogeneity poses a real challenge in developing large-scale IoT systems with RFID as integration is becoming very complex and challenging. Semantic integration is a key approach to deal with this challenge. To do so, ontology for RFID systems need to be developed in order to annotated semantically RFID systems, and hence, facilitate their integration. Accordingly, in this paper, we propose ontology for RFID systems. The proposed ontology can be used to semantically enrich RFID systems, and hence, improve their usage and reasoning. The usage of the proposed ontology is explained through a simple scenario in the health care domain.

Keywords: RFID, semantic technology, ontology, sparql query language, heterogeneity

Procedia PDF Downloads 471
1750 Comparing Performance of Neural Network and Decision Tree in Prediction of Myocardial Infarction

Authors: Reza Safdari, Goli Arji, Robab Abdolkhani Maryam zahmatkeshan

Abstract:

Background and purpose: Cardiovascular diseases are among the most common diseases in all societies. The most important step in minimizing myocardial infarction and its complications is to minimize its risk factors. The amount of medical data is increasingly growing. Medical data mining has a great potential for transforming these data into information. Using data mining techniques to generate predictive models for identifying those at risk for reducing the effects of the disease is very helpful. The present study aimed to collect data related to risk factors of heart infarction from patients’ medical record and developed predicting models using data mining algorithm. Methods: The present work was an analytical study conducted on a database containing 350 records. Data were related to patients admitted to Shahid Rajaei specialized cardiovascular hospital, Iran, in 2011. Data were collected using a four-sectioned data collection form. Data analysis was performed using SPSS and Clementine version 12. Seven predictive algorithms and one algorithm-based model for predicting association rules were applied to the data. Accuracy, precision, sensitivity, specificity, as well as positive and negative predictive values were determined and the final model was obtained. Results: five parameters, including hypertension, DLP, tobacco smoking, diabetes, and A+ blood group, were the most critical risk factors of myocardial infarction. Among the models, the neural network model was found to have the highest sensitivity, indicating its ability to successfully diagnose the disease. Conclusion: Risk prediction models have great potentials in facilitating the management of a patient with a specific disease. Therefore, health interventions or change in their life style can be conducted based on these models for improving the health conditions of the individuals at risk.

Keywords: decision trees, neural network, myocardial infarction, Data Mining

Procedia PDF Downloads 429
1749 Trace Logo: A Notation for Representing Control-Flow of Operational Process

Authors: M. V. Manoj Kumar, Likewin Thomas, Annappa

Abstract:

Process mining research discipline bridges the gap between data mining and business process modeling and analysis, it offers the process-centric and end-to-end methods/techniques for analyzing information of real-world process detailed in operational event-logs. In this paper, we have proposed a notation called trace logo for graphically representing control-flow perspective (order of execution of activities) of process. A trace logo consists of a stack of activity names at each position, sizes of the activity name indicates their frequency in the traces and the total height of the activity depicts the information content of the position. A trace logo created from a set of aligned traces generated using Multiple Trace Alignment technique.

Keywords: consensus trace, process mining, multiple trace alignment, trace logo

Procedia PDF Downloads 349
1748 Justice and the Juvenile: Changing Trends and Developments

Authors: Shikhar Shrivastava, Varun Khare

Abstract:

Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions.

Keywords: juvenile, justice system, retributive, rehabilitative, delinquency

Procedia PDF Downloads 457
1747 A Review on Upcycling: Current Body of Literature, Knowledge Gaps and a Way Forward

Authors: Kyungeun Sung

Abstract:

Upcycling is a process in which used materials are converted into something of higher value and/or quality in their second life. It has been increasingly recognised as one promising means to reduce material and energy use and also to engender sustainable production and consumption. For this reason and other foreseeable benefits, the concept of upcycling has received more attention from numerous researchers and business practitioners in recent years. This has been seen in the growing number of publications on this topic since the 1990s. However, the overall volume of literature dealing with upcycling is still low and no major review has been presented. Therefore, in order to further establish this field, this paper analyses and summarises the current body of literature on upcycling, focusing on different definitions, trends in practices, benefits, drawbacks and barriers in a number of subject areas and gives suggestions for future research by illuminating knowledge gaps in the area of upcycling.

Keywords: circular economy, cradle to cradle, sustainable production and consumption, upcycling, waste management

Procedia PDF Downloads 420
1746 The Role of Capital Budgeting in Nigeria Companies

Authors: Eworo David

Abstract:

It is dearly evident that a company which does not and will not innovate faces the grave danger of being pushed out of existence. The purpose of this study is to bring to knowledge of companies the significance of capital budgeting in viable project implementation and for proper investment appraisal as regards steps involved in effective investment strategies. The study examines investment policies of Nigeria companies. It deals with an overview of capital budgeting. The analysis covers the data gathered from two multi-national companies in Nigeria. The population of the study was the senior managers and the top management staff of the companies. The system of capital budgeting structure and project implementation styles were compared and contrasted to determine whether the system has MADE or MARRED the development of the organizations. The recommendations contribute towards Nigeria companies to remain and survive in business through the use of capital budgeting.

Keywords: appraisal, budgeting structure, capital budgeting, effective investment strategies

Procedia PDF Downloads 362
1745 Stating Best Commercialization Method: An Unanswered Question from Scholars and Practitioners

Authors: Saheed A. Gbadegeshin

Abstract:

Commercialization method is a means to make inventions available at the market for final consumption. It is described as an important tool for keeping business enterprises sustainable and improving national economic growth. Thus, there are several scholarly publications on it, either presenting or testing different methods for commercialization. However, young entrepreneurs, technologists and scientists would like to know the best method to commercialize their innovations. Then, this question arises: What is the best commercialization method? To answer the question, a systematic literature review was conducted, and practitioners were interviewed. The literary results revealed that there are many methods but new methods are needed to improve commercialization especially during these times of economic crisis and political uncertainty. Similarly, the empirical results showed there are several methods, but the best method is the one that reduces costs, reduces the risks associated with uncertainty, and improves customer participation and acceptability. Therefore, it was concluded that new commercialization method is essential for today's high technologies and a method was presented.

Keywords: commercialization method, technology, knowledge, intellectual property, innovation, invention

Procedia PDF Downloads 342
1744 The Management Information System for Convenience Stores: Case Study in 7 Eleven Shop in Bangkok

Authors: Supattra Kanchanopast

Abstract:

The purpose of this research is to develop and design a management information system for 7 eleven shop in Bangkok. The system was designed and developed to meet users’ requirements via the internet network by use of application software such as My SQL for database management, Apache HTTP Server for Web Server and PHP Hypertext Preprocessor for an interface between web server, database and users. The system was designed into two subsystems as the main system, or system for head office, and the branch system for branch shops. These consisted of three parts which are classified by user management as shop management, inventory management and Point of Sale (POS) management. The implementation of the MIS for the mini-mart shop, can lessen the amount of paperwork and reduce repeating tasks so it may decrease the capital of the business and support an extension of branches in the future as well.

Keywords: convenience store, the management information system, inventory management, 7 eleven shop

Procedia PDF Downloads 482
1743 Impact of Electronic Guest Relationship Management (e-GRM) on Brand Loyalty: The Case of Croatian Hotels

Authors: Marina Laškarin, Vlado Galičić

Abstract:

Quick adoption of e-business and emerging influence of “Electronic Word of Mouth e-WOM” communication on guests made leading hotel brands successful examples of electronic guest relationship management. Main reasons behind such success are well established procedures in collection, analysis and usage of highly valuable data available on the Internet, generated through some form of e-GRM programme. E-GRM is more than just a technology solution. It’s a system which balance respective guest demands, hotel technological capabilities and organizational culture of employees, discharging the universal approach in guest relations “same for all”. The purpose of this research derives from the necessity of determining the importance of monitoring and applying e-WOM communication as one of the methods used in managing guest relations. This paper analyses and compares different hotelier’s opinions on e-WOM communication.

Keywords: brand loyalty, e-WOM communication, GRM programmes, organizational culture

Procedia PDF Downloads 290
1742 The Role of ICTS in Improving the Quality of Public Spaces in Large Cities of the Third World

Authors: Ayat Ayman Abdelaziz Ibrahim Amayem, Hassan Abdel-Salam, Zeyad El-Sayad

Abstract:

Nowadays, ICTs have spread extensively in everyday life in an unprecedented way. A great attention is paid to the ICTs while ignoring the social aspect. With the immersive invasion of internet as well as smart phones’ applications and digital social networking, people become more socially connected through virtual spaces instead of meeting in physical public spaces. Thus, this paper aims to find the ways of implementing ICTs in public spaces to regain their status as attractive places for people, incite meetings in real life and create sustainable lively city centers. One selected example of urban space in the city center of Alexandria is selected for the study. Alexandria represents a large metropolitan city subjected to rapid transformation. Improving the quality of its public spaces will have great effects on the whole well-being of the city. The major roles that ICTs can play in the public space are: culture and art, education, planning and design, games and entertainment, and information and communication. Based on this classification various examples and proposals of ICTs interventions in public spaces are presented and analyzed to encourage good old fashioned social interaction by creating the New Social Public Place of this Digital Era. The paper will adopt methods such as questionnaire for evaluating the people’s willingness to accept the idea of using ICTs in public spaces, their needs and their proposals for an attractive place; the technique of observation to understand the people behavior and their movement through the space and finally will present an experimental design proposal for the selected urban space. Accordingly, this study will help to find design principles that can be adopted in the design of future public spaces to meet the needs of the digital era’s users with the new concepts of social life respecting the rules of place-making.

Keywords: Alexandria sustainable city center, digital place-making, ICTs, social interaction, social networking, urban places

Procedia PDF Downloads 420