Search results for: client’s expectations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1091

Search results for: client’s expectations

1031 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 253
1030 Investigation of Chord Protocol in Peer to Peer Wireless Mesh Network with Mobility

Authors: P. Prasanna Murali Krishna, M. V. Subramanyam, K. Satya Prasad

Abstract:

File sharing in networks are generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. Though, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated.

Keywords: wireless mesh network (WMN), structured P2P networks, peer to peer resource sharing, CHORD Protocol, DHT

Procedia PDF Downloads 447
1029 Digitalization and High Audit Fees: An Empirical Study Applied to US Firms

Authors: Arpine Maghakyan

Abstract:

The purpose of this paper is to study the relationship between the level of industry digitalization and audit fees, especially, the relationship between Big 4 auditor fees and industry digitalization level. On the one hand, automation of business processes decreases internal control weakness and manual mistakes; increases work effectiveness and integrations. On the other hand, it may cause serious misstatements, high business risks or even bankruptcy, typically in early stages of automation. Incomplete automation can bring high audit risk especially if the auditor does not fully understand client’s business automation model. Higher audit risk consequently will cause higher audit fees. Higher audit fees for clients with high automation level are more highlighted in Big 4 auditor’s behavior. Using data of US firms from 2005-2015, we found that industry level digitalization is an interaction for the auditor quality on audit fees. Moreover, the choice of Big4 or non-Big4 is correlated with client’s industry digitalization level. Big4 client, which has higher digitalization level, pays more than one with low digitalization level. In addition, a high-digitalized firm that has Big 4 auditor pays higher audit fee than non-Big 4 client. We use audit fees and firm-specific variables from Audit Analytics and Compustat databases. We analyze collected data by using fixed effects regression methods and Wald tests for sensitivity check. We use fixed effects regression models for firms for determination of the connections between technology use in business and audit fees. We control for firm size, complexity, inherent risk, profitability and auditor quality. We chose fixed effects model as it makes possible to control for variables that have not or cannot be measured.

Keywords: audit fees, auditor quality, digitalization, Big4

Procedia PDF Downloads 270
1028 Construction Quality Perception of Construction Professionals and Their Expectations from a Quality Improvement Technique in Pakistan

Authors: Muhammad Yousaf Sadiq

Abstract:

The complexity arises in defining the construction quality due to its perception, based on inherent market conditions and their requirements, the diversified stakeholders itself and their desired output. An quantitative survey based approach was adopted in this constructive study. A questionnaire-based survey was conducted for the assessment of construction Quality perception and expectations in the context of quality improvement technique. The survey feedback of professionals of the leading construction organizations/companies of Pakistan construction industry were analyzed. The financial capacity, organizational structure, and construction experience of the construction firms formed basis for their selection. The quality perception was found to be project-scope-oriented and considered as an excess cost for a construction project. Any quality improvement technique was expected to maximize the profit for the employer, by improving the productivity in a construction project. The study is beneficial for the construction professionals to assess the prevailing construction quality perception and the expectations from implementation of any quality improvement technique in construction projects.

Keywords: construction quality, expectation, improvement, perception

Procedia PDF Downloads 443
1027 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 265
1026 How Social Support, Interaction with Clients and Work-Family Conflict Contribute to Mental Well-Being for Employees in the Human Service System

Authors: Uwe C. Fischer

Abstract:

Mental health and well-being for employees working in the human service system are getting more and more important given the increasing rate of absenteeism at work. Besides individual capacities, social and community factors seem to be important in the working setting. Starting from a demand resource framework including the classical demand control aspects, social support systems, specific demands and resources of the client work, and work-family conflict were considered in the present study. We state hypothetically, that these factors have a meaningful association with the mental quality of life of employees working in the field of social, educational and health sectors. 1140 employees, working in human service organizations (education, youth care, nursing etc.) were asked for strains and resources at work (selected scales from Salutogenetic Subjective Work Assessment SALSA and own new scales for client work), work-family conflict, and mental quality of life from the German Short Form Health Survey. Considering the complex influences of the variables, we conducted a multiple hierarchical regression analysis. One third of the whole variance of the mental quality of life can be declared by the different variables of the model. When the variables concerning social influences were included in the hierarchical regression, the influence of work related control resource decreased. Excessive workload, work-family conflict, social support by supervisors, co-workers and other persons outside work, as well as strains and resources associated with client work had significant regression coefficients. Conclusions: Social support systems are crucial in the social, educational and health related service sector, regarding the influence on mental well-being. Especially the work-family conflict focuses on the importance of the work-life balance. Also the specific strains and resources of the client work, measured with new constructed scales, showed great impact on mental health. Therefore occupational health promotion should focus more on the social factors within and outside the working place.

Keywords: client interaction, human service system, mental health, social support, work-family conflict

Procedia PDF Downloads 414
1025 Universiti Sains Malaysia

Authors: Eisa A. Alsafran, Francis T. Edum-Fotwe, Wayne E. Lord

Abstract:

The degree to which a public client actively participates in Public Private Partnership (PPP) schemes, is seen as a determinant of the success of the arrangement, and in particular, efficiency in the delivery of the assets of any infrastructure development. The asset delivery is often an early barometer for judging the overall performance of the PPP. Currently, there are no defined descriptors for the degree of such participation. The lack of defined descriptors makes the association between the degree of participation and efficiency of asset delivery, difficult to establish. This is particularly so if an optimum effect is desired. In addition, such an association is important for the strategic decision to embark on any PPP initiative. This paper presents a conceptual model of different levels of participation that characterise PPP schemes. The modelling was achieved by a systematic review of reported sources that address essential aspects and structures of PPP schemes, published from 2001 to 2015. As a precursor to the modelling, the common areas of Public Client Participation (PCP) were investigated. Equity and risk emerged as two dominant factors in the common areas of PCP, and were therefore adopted to form the foundation of the modelling. The resultant conceptual model defines the different states of combined PCP. The defined states provide a more rational basis for establishing how the degree of PCP affects the efficiency of asset delivery in PPP schemes.

Keywords: asset delivery, infrastructure development, public private partnership, public client participation

Procedia PDF Downloads 243
1024 Client Importance and Audit Quality under Civil Law versus Common Law Societies

Authors: Kelly Grani Yuen

Abstract:

Accounting scandals and auditing frauds are perceived to be driven by aggressive companies and misrepresentation of audit reports. However, local legal systems and law enforcements may affect the services auditors provide to their ‘important’ clients. Under the civil law and common law jurisdictions, the standard setters, the government, and the regulatory bodies treat cases differently. As such, whether or not different forms of legal systems and extent of law enforcement plays an important role in auditor’s Audit Quality is a question this paper attempts to explore. The paper focuses on the investigation in Asia, where Hong Kong represents the common-law jurisdiction, while Taiwan and China represent the civil law jurisdiction. Only the ten reputable accounting firms are used in this study due to the differences in rankings and establishments of some of the small local audit firms. This will also contribute to the data collected between the years 2007-2013. By focusing on the use of multiple regression based on the dependent (Audit Quality) and independent variables (Client Importance, Law Enforcement, and Press Freedom), six different models are established. Results demonstrate that since different jurisdictions have different legal systems and market regulations, auditor’s treatment on ‘important’ clients will vary. However, with the moderators in place (law enforcement and press freedom), the relationship between client importance and audit quality may be smoothed out. With that in mind, this study contributes to local governments and standard setters’ consideration on legal reform and proper law enforcement in the market. Perhaps, with such modifications on the economic systems, collusion between companies and auditors can finally be put to a halt.

Keywords: audit quality, client importance, jurisdiction, modified audit opinions

Procedia PDF Downloads 392
1023 Are Some Languages Harder to Learn and Teach Than Others?

Authors: David S. Rosenstein

Abstract:

The author believes that modern spoken languages should be equally difficult (or easy) to learn, since all normal children learning their native languages do so at approximately the same rate and with the same competence, progressing from easy to more complex grammar and syntax in the same way. Why then, do some languages seem more difficult than others? Perhaps people are referring to the written language, where it may be true that mastering Chinese requires more time than French, which in turn requires more time than Spanish. But this may be marginal, since Chinese and French children quickly catch up to their Spanish peers in reading comprehension. Rather, the real differences in difficulty derive from two sources: hardened L1 language habits trying to cope with contrasting L2 habits; and unfamiliarity with unique L2 characteristics causing faulty expectations. It would seem that effective L2 teaching and learning must take these two sources of difficulty into consideration. The author feels that the latter (faulty expectations) causes the greatest difficulty, making effective teaching and learning somewhat different for each given foreign language. Examples from Chinese and other languages are presented.

Keywords: learning different languages, language learning difficulties, faulty language expectations

Procedia PDF Downloads 508
1022 The Life Skills Project: Client-Centered Approaches to Life Skills Acquisition for Homeless and At-Risk Populations

Authors: Leah Burton, Sara Cumming, Julianne DiSanto

Abstract:

Homelessness is a widespread and complex problem in Canada and around the globe. Many Canadians will face homelessness at least once in their lifetime, with several experiencing subsequent bouts or cyclical patterns of housing precarity. While a Housing First approach to homelessness is a long-standing and widely accepted best practice, it is also recognized that the acquisition of life skills is an effective way to reduce cycles of homelessness. Indeed, when individuals are provided with a range of life skills—such as (but not limited to) financial literacy, household management, interpersonal skills, critical thinking, and resource management—they are given the tools required to maintain long-term Housing for a lifetime; thus reducing a repetitive need for services. However, there is limited research regarding the best ways to teach life skills, a problem that has been further complicated in a post-pandemic world, where services are being delivered online or in a hybrid model of care. More than this, it is difficult to provide life skills on a large scale without losing a client-centered approach to services. This lack of client-centeredness is also seen in the lack of attention to culturally sensitive life skills, which consider the diverse needs of individuals and imbed equity, diversity, and inclusion (EDI) within the skills being taught. This study aims to fill these identified gaps in the literature by employing a community-engaged (CER) approach. Academic, government, funders, front-line staff, and clients at 15 not-for-profits from across the Greater Toronto Area in Ontario, Canada, collaborated to co-create a virtual, client-centric, EDI-informed life skill learning management system. A triangulation methodology was utilized for this research. An environmental scan was conducted for current best practices, and over 100 front-line staff (including workers, managers, and executive directors who work with homeless populations) participated in two separate Creative Problem Solving Sessions. Over 200 individuals with experience in homelessness completed quantitative and open-ended surveys. All sections of this research aimed to discover the areas of skills that individuals need to maintain Housing and to ascertain what a more client-driven EDI approach to life skills training should include. This presentation will showcase the findings on which life skills are deemed essential for homeless and precariously housed individuals.

Keywords: homelessness, housing first, life skills, community engaged research, client- centered

Procedia PDF Downloads 72
1021 Critical Reading Achievement of Rural Migrant Children in China: The Roles of Educational Expectation

Authors: Liman Zhao, Jianlong Zhang, Mingman Ren, Chuang Wang, Jian Liu

Abstract:

Rural migrant children have become a fast-growing population in China as a consequence of the large-scale population flow from rural to urban areas in the context of urbanization. In China, the socioeconomic status of migrant children is relatively low in comparison to non-migrant children. Parents of migrant children often work in occupations with long working hours, high labor intensity, and low pay due to their poor academic qualifications. Most migrant children's parents have not received higher education and have no time to read with their children. The family of migrant children usually does not have a good collection of books either, which leads to these children’s insufficient reading and low reading levels. Moreover, migrant children frequently relocate with their parents, and their needs for knowledge and reading are often neglected by schools, which puts migrant children at risk of academic failure in China. Therefore, the academic achievement of rural migrant children has become a focus of education in China. This study explores the relationship between the educational expectation of rural migrant children and their critical reading competence in general and the moderating effect of the difference between parental educational expectation to their children and the children’s own educational expectation. The responses to a survey from 5113 seventh-grade children in a district of the capital city in China revealed that children who moved to cities in grades 4-6 of primary school performed the best in critical reading, and children who moved to cities after middle school showed the worst performance in critical reading. In addition, parents’ educational expectations of their children and their own educational expectations were both significant predictors of rural migrant children’s reading competence. The higher a child's expectations of a degree and the smaller the gap between parents' expectations of a child's education and the child's own education expectations, the better the child's performance in critical reading.

Keywords: educational expectation, critical reading competence, rural migrant children, moderating effect

Procedia PDF Downloads 180
1020 Marital Expectations, Marital Infidelity and Neuroticism as Predictors of Marital Conflict: Case Study of Igbo Spouses in Imo State, Nigeria

Authors: Ann Ukachi Madukwe, Juliana Chinwendu Njoku

Abstract:

Marital conflict, conceptualized in this study as the ongoing lack of peace and satisfaction in a marital union which threatens marital stability, has become quite prevalent in modern Igbo communities. The frequent incidences of spousal battery, spousal sexual abuse, domestic violence, long term separation and in some cases outright divorce are worrisome indicators of the endemic challenge marital conflict poses in most Igbo communities. This study examined marital expectations, marital infidelity (self and spouse), and neuroticism as predictors of marital conflict. Marital expectation was described as a married person’s appraisal of how well their pre-marital desires were being met by their spouses and within the marriage relationship. It assessed different aspects of personal and interpersonal positive outcomes in a marital union. Marital infidelity referred to the likelihood that married individuals or their spouses could have indulged in intimate activities like passionate kisses and romantic dates with someone other than their spouses. Participants reported on themselves as well as their spouses. The last predictor variable neuroticism was measured as a personality trait that addresses issues of emotional instability especially as it relates to a person’s interactions. Neurotic persons were considered to have high emotional reactivity; they would have strong emotional response to issues that emotionally stable persons might overlook. Participants comprised of Igbo male and female spouses selected from Imo state using randomized cluster sampling method. The study utilized the cross sectional survey design and Stepwise linear multiple regression for data analyses. Findings showed that though marital infidelity by spouse was generally below average and spouses marital expectations were being fulfilled; marital expectations followed by marital infidelity – spouse proved to be significant predictors of marital conflict. Marital conflict reduced as marital expectations got fulfilled and increased as the level of likelihood of marital infidelity by the spouse increased. Spouses in this study also reported an increased level of neuroticism, with males being more neurotic than females. Neuroticism was found to be the least significant predictor of marital conflict compared to marital expectations and marital infidelity – spouse. Finally, the article made recommendations to spouses and marital counsellors regarding especially the need to manage the neurotic tendencies of Igbo spouses.

Keywords: Igbo spouses, marital conflict, marital expectations, Nigeria

Procedia PDF Downloads 152
1019 Conceptualizing Notions of Poverty in Graduate Social Work Education: Contextualizing the Formation of the ‘Social Worker’ Subjectivity

Authors: Emily Carrothers

Abstract:

This research takes a critical look at the development of the social worker subjectivity, particularly in Canada. Through an interrogation of required graduate course texts, this paper explicates the discursive formation, orientation, and maintenance of the social worker subject and the conceptualizations of poverty in graduate social work education. This research aims to advance understandings of power and ideology in social work graduate texts and formations of particular dominant constructions of poverty and social worker subjectivity. Guiding questions for this inquiry include: What are social workers being oriented to? What are social workers being oriented away from? How is poverty theorized, discussed and/or attached to social location in social work education? And, how are social workers implicated in contesting or reinforcing poverty? Using critical discourse analysis, 6 texts were analyzed with a particular focus on ways in which notions of poverty are discursively represented and ways in which notions of the formation of the social worker were approached. This revealed that discursively underpinning social work in anti-oppressive practice (AOP) can work to reify hierarchal structures of power that orient social workers away from structural poverty reduction strategies and towards punitive interactions with those that experience poverty and multiple forms of marginalization. This highlights that the social worker subjectivity is formed in opposition to the client, with graduate texts constructing the social worker as an expert in client’s lives and experiences even more so than the client.

Keywords: Canada, education, social work, subjectivity

Procedia PDF Downloads 136
1018 Programmed Speech to Text Summarization Using Graph-Based Algorithm

Authors: Hamsini Pulugurtha, P. V. S. L. Jagadamba

Abstract:

Programmed Speech to Text and Text Summarization Using Graph-based Algorithms can be utilized in gatherings to get the short depiction of the gathering for future reference. This gives signature check utilizing Siamese neural organization to confirm the personality of the client and convert the client gave sound record which is in English into English text utilizing the discourse acknowledgment bundle given in python. At times just the outline of the gathering is required, the answer for this text rundown. Thus, the record is then summed up utilizing the regular language preparing approaches, for example, solo extractive text outline calculations

Keywords: Siamese neural network, English speech, English text, natural language processing, unsupervised extractive text summarization

Procedia PDF Downloads 183
1017 African American Female Caregivers’ Perceptions, Experiences, and Expectations of the Special Education Process

Authors: Lenell D. Walton

Abstract:

African American families have consistently contended that their child’s special education team does not provide the services necessary to meet their child’s academic goals. Special education teams must guide and mentor African American students and their families through the special education process. This qualitative study examined African American female caregivers' perceptions, experiences, and expectations regarding the special education process. Data collection methods utilized in the study included a survey, semi-structured interviews, and three focus groups. Data were analyzed and compared to identify themes. Three themes emerged from the survey: education and training, participation, and challenges. Six major themes emerged: (a) differences in treatment and cultural disconnect, (b) lack of support and resources, (c) participants’ experiences of the special education process, (d) parent participation, (e) barriers and concerns, and (f) expectations. Implications for policy and practice to improve the special education process are discussed.

Keywords: African American, caregivers, critical race theory, special education

Procedia PDF Downloads 76
1016 Nearest Neighbor Investigate Using R+ Tree

Authors: Rutuja Desai

Abstract:

Search engine is fundamentally a framework used to search the data which is pertinent to the client via WWW. Looking close-by spot identified with the keywords is an imperative concept in developing web advances. For such kind of searching, extent pursuit or closest neighbor is utilized. In range search the forecast is made whether the objects meet to query object. Nearest neighbor is the forecast of the focuses close to the query set by the client. Here, the nearest neighbor methodology is utilized where Data recovery R+ tree is utilized rather than IR2 tree. The disadvantages of IR2 tree is: The false hit number can surpass the limit and the mark in Information Retrieval R-tree must have Voice over IP bit for each one of a kind word in W set is recouped by Data recovery R+ tree. The inquiry is fundamentally subordinate upon the key words and the geometric directions.

Keywords: information retrieval, nearest neighbor search, keyword search, R+ tree

Procedia PDF Downloads 262
1015 Inertial Motion Capture System for Biomechanical Analysis in Rehabilitation and Sports

Authors: Mario Sandro F. Rocha, Carlos S. Ande, Anderson A. Oliveira, Felipe M. Bersotti, Lucas O. Venzel

Abstract:

The inertial motion capture systems (mocap) are among the most suitable tools for quantitative clinical analysis in rehabilitation and sports medicine. The inertial measuring units (IMUs), composed by accelerometers, gyroscopes, and magnetometers, are able to measure spatial orientations and calculate displacements with sufficient precision for applications in biomechanical analysis of movement. Furthermore, this type of system is relatively affordable and has the advantages of portability and independence from external references. In this work, we present the last version of our inertial motion capture system, based on the foregoing technology, with a unity interface designed for rehabilitation and sports. In our hardware architecture, only one serial port is required. First, the board client must be connected to the computer by a USB cable. Next, an available serial port is configured and opened to establish the communication between the client and the application, and then the client starts scanning for the active MOCAP_S servers around. The servers play the role of the inertial measuring units that capture the movements of the body and send the data to the client, which in turn create a package composed by the ID of the server, the current timestamp, and the motion capture data defined in the client pre-configuration of the capture session. In the current version, we can measure the game rotation vector (grv) and linear acceleration (lacc), and we also have a step detector that can be abled or disabled. The grv data are processed and directly linked to the bones of the 3D model, and, along with the data of lacc and step detector, they are also used to perform the calculations of displacements and other variables shown on the graphical user interface. Our user interface was designed to calculate and present variables that are important for rehabilitation and sports, such as cadence, speed, total gait cycle, gait cycle length, obliquity and rotation, and center of gravity displacement. Our goal is to present a low-cost portable and wearable system with a friendly interface for application in biomechanics and sports, which also performs as a product of high precision and low consumption of energy.

Keywords: biomechanics, inertial sensors, motion capture, rehabilitation

Procedia PDF Downloads 116
1014 Simulated Translator-Client Relations in Translator Training: Translator Behavior around Risk Management

Authors: Maggie Hui

Abstract:

Risk management is not a new concept; however, it is an uncharted area as applied to the translation process and translator training. Risk managers are responsible for managing risk, i.e. adopting strategies with the intention to minimize loss and maximize gains in spite of uncertainty. Which risk strategy to use often depends on the frequency of an event (i.e. probability) and the severity of its outcomes (i.e. impact). This is basically the way translation/localization project managers handle risk management. Although risk management could involve both positive and negative impacts, impact seems to be always negative in professional translators’ management models, e.g. how many days of project time are lost or how many clients are lost. However, for analysis of translation performance, the impact should be possibly positive (e.g. increased readability of the translation) or negative (e.g. loss of source-text information). In other words, the straight business model of risk management is not directly applicable to the study of risk management in the rendition process. This research aims to explore trainee translators’ risk managing while translating in a simulated setting that involves translator-client relations. A two-cycle experiment involving two roles, the translator and the simulated client, was carried out with a class of translation students to test the effects of the main variable of peer-group interaction. The researcher made use of a user-friendly screen-voice recording freeware to record subjects’ screen activities, including every word the translator typed and every change they made to the rendition, the websites they browsed and the reference tools they used, in addition to the verbalization of their thoughts throughout the process. The research observes the translation procedures subjects considered and finally adopted, and looks into the justifications for their procedures, in order to interpret their risk management. The qualitative and quantitative results of this study have some implications for translator training: (a) the experience of being a client seems to reinforce the translator’s risk aversion; (b) there is a wide gap between the translator’s internal risk management and their external presentation of risk; and (c) the use of role-playing simulation can empower students’ learning by enhancing their attitudinal or psycho-physiological competence, interpersonal competence and strategic competence.

Keywords: risk management, role-playing simulation, translation pedagogy, translator-client relations

Procedia PDF Downloads 236
1013 A Pilot Study on the Development and Validation of an Instrument to Evaluate Inpatient Beliefs, Expectations and Attitudes toward Reflexology (IBEAR)-16

Authors: Samuel Attias, Elad Schiff, Zahi Arnon, Eran Ben-Arye, Yael Keshet, Ibrahim Matter, Boker Lital Keinan

Abstract:

Background: Despite the extensive use of manual therapies, reflexology in particular, no validated tools have been developed to evaluate patients' beliefs, attitudes and expectations regarding reflexology. Such tools however are essential to improve the results of the reflexology treatment, by better adjusting it to the patients' attitudes and expectations. The tool also enables assessing correlations with clinical results of interventional studies using reflexology. Methods: The IBEAR (Inpatient Beliefs, Expectations and Attitudes toward Reflexology) tool contains 25 questions (8 demographic and 17 specifically addressing reflexology), and was constructed in several stages: brainstorming by a multidisciplinary team of experts; evaluation of each of the proposed questions by the experts' team; and assessment of the experts' degree of agreement per each question, based on a Likert 1-7 scale (1 – don't agree at all; 7 – agree completely). Cronbach's Alpha was computed to evaluate the questionnaire's reliability while the Factor analysis test was used for further validation (228 patients). The questionnaire was tested and re-tested (48h) on a group of 199 patients to assure clarity and reliability, using the Pearson coefficient and the Kappa test. It was modified based on these results into its final form. Results: After its construction, the IBEAR questionnaire passed the expert group's preliminary consensus, evaluation of the questions' clarity (from 5.1 to 7.0), inner validation (from 5.5 to 7) and structural validation (from 5.5 to 6.75). Factor analysis pointed to two content worlds in a division into 4 questions discussing attitudes and expectations versus 5 questions on belief and attitudes. Of the 221 questionnaires collected, a Cronbach's Alpha coefficient was calculated on nine questions relating to beliefs, expectations, and attitudes regarding reflexology. This measure stood at 0.716 (satisfactory reliability). At the Test-Retest stage, 199 research participants filled in the questionnaire a second time. The Pearson coefficient for all questions ranged between 0.73 and 0.94 (good to excellent reliability). As for dichotomic answers, Kappa scores ranged between 0.66 and 1.0 (mediocre to high). One of the questions was removed from the IBEAR following questionnaire validation. Conclusions: The present study provides evidence that the proposed IBEAR-16 questionnaire is a valid and reliable tool for the characterization of potential reflexology patients and may be effectively used in settings which include the evaluation of inpatients' beliefs, expectations, and attitudes toward reflexology.

Keywords: reflexology, attitude, expectation, belief, CAM, inpatient

Procedia PDF Downloads 205
1012 Late Payment Issues Faced by Subcontractors in the Malaysian Construction Industry

Authors: Nur Emma Mustaffa, Hii Ping Ping

Abstract:

Late payment is a common issue in the construction industry and the subcontractors are not spared from it. This study has been carried out with the objectives to identify the implications of late payment issues toward the subcontractors and the strategies adopted by them to overcome the late payment issues. In terms of the strategies which can be adopted in overcoming the late payment, the subcontractors may suspend or slow down the construction process, making periodic follow up with the client, demand the rights to interest on late payment or the issuance of a promissory note by the client. The focus of the study is primarily on Grade 4 to Grade 7 contractors in Johor Bahru, Malaysia who carried out subcontracting works and registered under Construction Industry Development Board (CIDB). Employing survey as the main research method for data collection, the analysis would therefore mainly be adopting Likert Scale Analysis, Ranking Analysis and Frequency Distribution Analysis. This research showed the main implication of late payment issues towards subcontractors is created financial hardship to them. Besides, the most effective strategy adopted by the subcontractors to overcome the late payment issues is follow-up with client using formal procedure. From the findings, most of the subcontractors had low level of experiences and frequency in the adoption of Construction Industry Payment and Adjudication Act (CIPAA) 2012 to solve the payment disputes in the construction industry. In a nutshell, it is hoped that these findings will become guidance to the subcontractors to overcome the late payment issues in their future projects.

Keywords: subcontractors, implications, strategies, CIPAA 2012, payment

Procedia PDF Downloads 138
1011 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 283
1010 A Nexus between Research and Teaching: Fostering Student Expectations of Research-Informed Teaching Approaches

Authors: Lina S. Calucag

Abstract:

Integration of research and teaching in higher education can provide valuable ways of enhancing the student learning experience, but establishing such integrative links can be complex and problematic, given different practices and levels of understanding. This study contributes to the pedagogical literature in drawing on findings from students’ survey exploring perceptions of research-informed teaching to examine how links between research and teaching can be suitably strengthened. The study employed a descriptive research design limited to the undergraduate students taking thesis/capstone courses in the tertiary levels private or public colleges and universities across the globe as respondents of the study. The findings noted that the students’ responses from different disciplines: engineering, science, education, business-related, and computer on the nexus between research and teaching is remarkable in fostering student expectations of research-informed teaching approaches. Students’ expectations on research-led, research-oriented, research-based, and research-tutored are enablers in linking research and teaching. It is recommended that experimental studies should be conducted using the four different research-informed teaching approaches in the classroom, namely: research-led, research-oriented, research-based, and research-tutored.

Keywords: research-led, research-informed teaching, research-oriented teaching, research-tutored, research-based

Procedia PDF Downloads 132
1009 Dynamic Effects of Charitable Giving in a Ramsey Model

Authors: Riham Barbar

Abstract:

This paper studies the dynamic effects of charitable giving in a Ramsey model à la Becker and Foias (1994), such that heterogeneity is reduced to two types of agents: rich and poor. It is assumed that rich show a great concern for poor and enjoy giving. The introduction of charitable giving in this paper is inspired from the notion of Zakat (borrowed from the Islamic Economics) and is defined according to the warm-glow of Andreoni (1990). In this framework, we prove the existence of a steady state where only the patient agent holds capital. Furthermore, we show that local indetermincay appears. While moderate values of charitable-giving elasticity makes the appearance of endogenous fluctuations due to self-fulfilling expectations more likely, high values of this elasticity stabilizes endogenous fluctuations, by narrowing down the range of parameter values compatible with local indeterminacy and may rule out expectations-driven fluctuations if it exceeds certain threshold. Finally, cycles of period two emerge. However, charitable-giving makes it less likely for these cycles to emerge.

Keywords: charitable giving, warm-glow, bifurcations, heterogeneous agents, indeterminacy, self-fulfilling expectations, endogenous fluctuations

Procedia PDF Downloads 290
1008 Indigenizing Social Work Practice: Best Practice of Family Service Agency (LK3) State Islamic University (UIN) Syarif Hidayatullah Jakarta

Authors: Siti Napsiyah, Ismet Firdaus, Lisma Dyawati Fuaida, Ellies Sukmawati

Abstract:

This paper examines the existence, role, and challenge of Family Service Agency, in Bahasa Indonesia known as Lembaga Konsultasi Kesejahteraan Keluarga (LK3) of Syarif Hidayatullah State Islamic University (UIN) Jakarta. It has been established since 2012. It is an official agency under the Ministry of Social Affairs of Indonesia. The establishment of LK3 aims to provide psychosocial services for families of students who has psychosocial problem in their life. The study also aims to explore the trend of psychosocial problems of its client (student) for the past three years (2014-2016). The research method of the study is using a qualitative social work research method. A review of selected data of the client of LK3 UIN Syarif Hidayatullah Jakarta around five main issues: Family background, psychosocial mapping, potential resources, student coping mechanism strategy, client strength and network. The study also uses a review of academic performance report as well as an interview and observation. The findings show that the trend of psychosocial problems of the client of LK3 UIN Syarif Hidayatullah Jakarta vary as follow: bad academic performance, low income family, broken home, domestic violence, disability, mental disorder, sexual abuse, and the like. LK3 UIN Syarif Hidayatullah Jakarta has significant roles to provide psychosocial support and services for the survival of the students to deal with their psychosocial problems. Social worker of LK3 performs indigenous social work practice: individual counseling, family counseling, group therapy, home visit, case conference, Islamic Spiritual Approach, and Spiritual Emotional Freedom Technique (SEPT).

Keywords: psychosocial, indigenizing social work, resiliency, coping mechanism

Procedia PDF Downloads 241
1007 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 225
1006 A Case for Ethics Practice under the Revised ISO 14001:2015

Authors: Reuben Govender, M. L. Woermann

Abstract:

The ISO 14001 management system standard was first published in 1996. It is a voluntary standard adopted by both private and public sector organizations globally. Adoption of the ISO 14001 standard at the corporate level is done to help manage business impacts on the environment e.g. pollution control. The International Organization for Standardization (ISO) revised the standard in 2004 and recently in 2015. The current revision of the standard appears to adopt a communitarian-type philosophy. The inclusion of requirements to consider external 'interested party' needs and expectations implies this philosophy. Therefore, at operational level businesses implementing ISO 14001 will have to consider needs and expectations beyond local laws. Should these external needs and expectations be included in the scope of the environmental management system, they become requirements to be complied with in much the same way as compliance to laws. The authors assert that the recent changes to ISO 14001 introduce an ethical dimension to the standard. The authors assert that business ethics as a discipline now finds relevance in ISO 14001 via contemporary stakeholder theory and discourse ethics. Finally, the authors postulate implications of (not) addressing these requirements before July 2018 when transition to the revised standard must be complete globally.

Keywords: business ethics, environmental ethics, ethics practice, ISO 14001:2015

Procedia PDF Downloads 234
1005 Consumer Value and Purchase Behaviour: The Mediating Role of Consumers' Expectations of Corporate Social Responsibility in Durban, South Africa

Authors: Abosede Ijabadeniyi, Jeevarathnam P. Govender

Abstract:

Prevailing strategic Corporate Social Responsibility (CSR) research is predominantly centred around the predictive implications of the construct on behavioural outcomes. This phenomenon limits the depth of our understanding of the trajectory of strategic CSR. The purpose of this paper is to investigate the mediating effects of CSR expectations on the relationship between consumer value and purchase behaviour by identifying the implications of the multidimensionality of CSR (economic, legal, ethical and philanthropic) on the latter. Drawing from the stakeholder theory and its interplay with the prevalence of Ubuntu values; the underlying force which governs the values of South African camaraderie, we hypothesise that the multidimensionality of CSR expectations has positive mediating effects in the relationship between consumer value and purchase behaviour. Partial Least Square (PLS) path modelling was employed, using six measures of the average path coefficient (APC) to test the relationship between the constructs. Results from a sample of mall shoppers of (n=411), based on a survey conducted across five major malls in Durban, South Africa, indicate that only the legal dimension of CSR serves as a mediating factor in the relationship among the constructs. South Africa’s unique history of segregation, leading to the proliferation of spontaneous organisational approach to CSR and higher expectations of organisational legitimacy are identified as antecedents of consumers’ reliance on the law (legal CSR) to redress the ills of the past, sustainable development, and socially responsible behaviour. The paper also highlights theoretical and managerial implications for future research.

Keywords: consumer value, corporate marketing, corporate social responsibility, purchase behaviour, Ubuntu

Procedia PDF Downloads 339
1004 Artificial Intelligence Methods for Returns Expectations in Financial Markets

Authors: Yosra Mefteh Rekik, Younes Boujelbene

Abstract:

We introduce in this paper a new conceptual model representing the stock market dynamics. This model is essentially based on cognitive behavior of the intelligence investors. In order to validate our model, we build an artificial stock market simulation based on agent-oriented methodologies. The proposed simulator is composed of market supervisor agent essentially responsible for executing transactions via an order book and various kinds of investor agents depending to their profile. The purpose of this simulation is to understand the influence of psychological character of an investor and its neighborhood on its decision-making and their impact on the market in terms of price fluctuations. Therefore, the difficulty of the prediction is due to several features: the complexity, the non-linearity and the dynamism of the financial market system, as well as the investor psychology. The Artificial Neural Networks learning mechanism take on the role of traders, who from their futures return expectations and place orders based on their expectations. The results of intensive analysis indicate that the existence of agents having heterogeneous beliefs and preferences has provided a better understanding of price dynamics in the financial market.

Keywords: artificial intelligence methods, artificial stock market, behavioral modeling, multi-agent based simulation

Procedia PDF Downloads 414
1003 Innovation Knowledge Management for Public Sector in the Thailand

Authors: Supattra Kanchanopast

Abstract:

This article presents the process of change for innovation in the Thai public sector in order to create higher client satisfaction. Change management should concern the potentiality of the change agent or leader, the long-term vision or policy (political side) of the organization, the communication within the organization, suitable organizational culture and structure, preparedness of the personnel, and the fitness of the reward system. Sustaining innovation creation is not sophisticated, as traditionally believed. A basic management principle of identifying clarified and motivating goals needs to be followed by creating support systems after implementation and by ensuring the stakeholders’ benefit, derived from the innovation projects. Finally, creating an amiable atmosphere among the practitioners, including effective evaluation and reward schemes, will support the innovation. However, none of these will ever take place unless support is gained from the leaders of those organizations, and from the staff and clients involved also as well.

Keywords: change management, client satisfaction, innovation management, Thai public sector

Procedia PDF Downloads 229
1002 Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: ubiquitous computing, authentication, context-awareness, trust management

Procedia PDF Downloads 215