Search results for: computing practices
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5130

Search results for: computing practices

4920 The Impact of Structural Empowerment on Risk Management Practices: A Case Study of Saudi Arabia Construction Small and Medium-Sized Enterprises

Authors: S. Alyami, S. Mohammad

Abstract:

These Risk management practices have a significant impact on construction SMEs. The effective utilisation of these practices depends on culture change in order to optimise decision making for critical activities within construction projects. Thus, successful implementation of empowerment strategies would enhance operational employees to participate in effective decision making. However, there remain many barriers to individuals and organisations within empowerment strategies that require empirical investigation before the industry can benefit from their implementation. Gaps in understanding the relationship between employee empowerment and risk management practices still exist. This research paper aims to examine the impact of the structural empowerment on risk management practices in construction SMEs. The questionnaire has been distributed to participants (162 employees) that involve projects and civil engineers within a case study from Saudi construction SMEs. Partial least squares based structural equation modeling (PLS-SEM) was utilised to perform analysis. The results reveal a positive relationship between empowerment and risk management practices. The study shows how structural empowerment contributes to operational employees in risk management practices through involving activities such as decision making, self-efficiency, and autonomy. The findings of this study will contribute to close the current gaps in the construction SMEs context.

Keywords: construction SMEs, culture, decision making, empowerment, risk management

Procedia PDF Downloads 81
4919 Smart Technology Work Practices to Minimize Job Pressure

Authors: Babar Rasheed

Abstract:

The organizations are in continuous effort to increase their yield and to retain their associates, employees. Technology is considered an integral part of attaining apposite work practices, work environment, and employee engagement. Unconsciously, these advanced practices like work from home, personalized intra-network are disturbing employee work-life balance which ultimately increases psychological pressure on employees. The smart work practice is to develop business models and organizational practices with enhanced employee engagement, minimum trouncing of organization resources with persistent revenue and positive addition in global societies. Need of smart work practices comes from increasing employee turnover rate, global economic recession, unnecessary job pressure, increasing contingent workforce and advancement in technologies. Current practices are not enough elastic to tackle global changing work environment and organizational competitions. Current practices are causing many reciprocal problems among employee and organization mechanically. There is conscious understanding among business sectors smart work practices that will deal with new century challenges with addressing the concerns of relevant issues. It is aimed in this paper to endorse customized and smart work practice tools along knowledge framework to manage the growing concerns of employee engagement, use of technology, orgaization concerns and challenges for the business. This includes a Smart Management Information System to address necessary concerns of employees and combine with a framework to extract the best possible ways to allocate companies resources and re-align only required efforts to adopt the best possible strategy for controlling potential risks.

Keywords: employees engagement, management information system, psychological pressure, current and future HR practices

Procedia PDF Downloads 155
4918 Strengthening Urban Governance and Planning Practices for Urban Sustainability Transformations in Cambodia

Authors: Fiona Lord

Abstract:

This paper presents research on strengthening urban governance and planning practices for sustainable and regenerative city transformations looking at urban governance in Cambodia as a case study. Transformations to urban sustainability and regeneration require systemic and long-term transformation processes, across multiple levels of society and inclusive of multiple urban actors. This paper presents the emerging findings of a qualitative case study comparing the urban governance and planning practices in two of Cambodia's secondary cities - Battambang and Sihanoukville. The lessons learned have broader implications for how governance and planning can be strengthened to initiate and sustain urban sustainability transformations in other developing country cities of Cambodia and the Southeast Asia region.

Keywords: Cambodia, planning practices, urban governance, urban sustainability transformations

Procedia PDF Downloads 199
4917 A Two Level Load Balancing Approach for Cloud Environment

Authors: Anurag Jain, Rajneesh Kumar

Abstract:

Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling

Procedia PDF Downloads 398
4916 Alignment between Understanding and Assessment Practice among Secondary School Teachers

Authors: Eftah Bte Moh, Hj Abdullah Izazol Binti Idris, Abd. Aziz Bin Abd. Shukor

Abstract:

This study aimed to identify the alignment of understanding and assessment practices among secondary school teachers. The study was carried out using quantitative descriptive study. The sample consisted of 164 teachers who taught Form 1 and 2 from 11 secondary schools in the district of North Kinta, Perak, Malaysia. Data were obtained from 164 respondents who answered Expectation Alignment Understanding and Practices of School Assessment (PEKDAPS) questionnaire. The data were analysed using SPSS 17.0 +. The Cronbach alpha value obtained through PEKDAPS questionnaire pilot study was 0.86. The results showed that teachers' performance in PEKDAPS based on the mean value was less than 3, which means that perfect alignment does not occur between the understanding and practices of school assessment. Two major PEKDAPS sub-constructs of articulation across grade and age and usability of the system were higher than the moderate alignment of the understanding and practices of school assessment (Min=2.0). The content was focused on PEKDAPs sub-constructs which showed lower than the moderate alignment of the understanding and practices of school assessment (Min=2.0). Another two PEKDAPS sub-constructs of transparency and fairness and the pedagogical implications showed moderate alignment (2.0). The implications of the study is that teachers need to fully understand the importance of alignment among components of assessment, learning and teaching and learning objectives as strategies to achieve quality assessment process.

Keywords: school based assessment, alignment, understanding, assessment practices

Procedia PDF Downloads 432
4915 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 250
4914 Adopting Collaborative Business Processes to Prevent the Loss of Information in Public Administration Organisations

Authors: A. Capodieci, G. Del Fiore, L. Mainetti

Abstract:

Recently, the use of web 2.0 tools has increased in companies and public administration organizations. This phenomenon, known as "Enterprise 2.0", has, de facto, modified common organizational and operative practices. This has led “knowledge workers” to change their working practices through the use of Web 2.0 communication tools. Unfortunately, these tools have not been integrated with existing enterprise information systems, a situation that could potentially lead to a loss of information. This is an important problem in an organizational context, because knowledge of information exchanged within the organization is needed to increase the efficiency and competitiveness of the organization. In this article we demonstrate that it is possible to capture this knowledge using collaboration processes, which are processes of abstraction created in accordance with design patterns and applied to new organizational operative practices.

Keywords: business practices, business process patterns, collaboration tools, enterprise 2.0, knowledge workers

Procedia PDF Downloads 328
4913 MLProxy: SLA-Aware Reverse Proxy for Machine Learning Inference Serving on Serverless Computing Platforms

Authors: Nima Mahmoudi, Hamzeh Khazaei

Abstract:

Serving machine learning inference workloads on the cloud is still a challenging task at the production level. The optimal configuration of the inference workload to meet SLA requirements while optimizing the infrastructure costs is highly complicated due to the complex interaction between batch configuration, resource configurations, and variable arrival process. Serverless computing has emerged in recent years to automate most infrastructure management tasks. Workload batching has revealed the potential to improve the response time and cost-effectiveness of machine learning serving workloads. However, it has not yet been supported out of the box by serverless computing platforms. Our experiments have shown that for various machine learning workloads, batching can hugely improve the system’s efficiency by reducing the processing overhead per request. In this work, we present MLProxy, an adaptive reverse proxy to support efficient machine learning serving workloads on serverless computing systems. MLProxy supports adaptive batching to ensure SLA compliance while optimizing serverless costs. We performed rigorous experiments on Knative to demonstrate the effectiveness of MLProxy. We showed that MLProxy could reduce the cost of serverless deployment by up to 92% while reducing SLA violations by up to 99% that can be generalized across state-of-the-art model serving frameworks.

Keywords: serverless computing, machine learning, inference serving, Knative, google cloud run, optimization

Procedia PDF Downloads 134
4912 Practices of Self-Directed Professional Development of Teachers in South African Public Schools

Authors: Rosaline Govender

Abstract:

This research study is an exploration of the self-directed professional development of teachers who teach in public schools in an era of democracy and educational change in South Africa. Amidst an ever-changing educational system, the teachers in this study position themselves as self-directed teacher-learners where they adopt particular learning practices which enable change within the broader discourses of public schooling. Life-story interviews were used to enter into the private and public spaces of five teachers which offer glimpses of how particular systems shaped their identities, and how the meanings of self-directed teacher-learner shaped their learning practices. Through the Multidimensional framework of analysis and interpretation the teachers’ stories were analysed through three lenses: restorying the field texts - the self through story; the teacher-learner in relation to social contexts, and practices of self-directed learning.This study shows that as teacher-learners learn for change through self-directed learning practices, they develop their agency as transformative intellectuals, which is necessary for the reworking of South African public schools.

Keywords: professional development, professionality, professionalism, self-directed learning

Procedia PDF Downloads 394
4911 Evaluation Practices in Colombia: Between Beliefs and National Exams

Authors: Danilsa Lorduy, Liliana Valle

Abstract:

Assessment and evaluation are inextricable parts of the teaching learning process. Evaluation practices concerns are gaining popularity among curriculum developers an educational researchers, particularly in Colombian regions where English language is taught as a foreign language EFL. This study addressed one of those issues, which are the unbalanced in –services’ evaluation practices perceived in school classes. They present predominance on the written test among the procedures they use to evaluate; therefore, the purpose of this case study was to explore in-service teachers’ evaluation practices, their beliefs about evaluation and to establish an eventual connection between practices and beliefs. To this end, classroom observations, questionnaires, and a semi structured interview were applied to three in-service English teachers from different schools in a city in Colombia. The findings suggested that teachers’ beliefs indicate a formative inclination and they actually are using a variety of procedures different from test but they seem to have some issues regarding their appropriateness for application Moreover, it was found that teachers’ practices are being influenced by external factors such as school requirements and national policies. It could be concluded that the predominance in using tests is not only elicited by teachers’ beliefs but also by national test results 'Pruebas Saber' and law 115 demanding. It was also suggested that further quantitative research is needed to demonstrate connections between overuse of testing procedures and 'Pruebas Saber' national test.

Keywords: beliefs, evaluation, external factors, national test

Procedia PDF Downloads 143
4910 A Study on Consumer Awareness, Safety Perceptions and Practices About Food Preservatives and Flavouring Agents Used in Packed / Canned Foods from South India

Authors: Harsha Kumar H. N., Anshu Kumar Jha, Khushboo Kamal Taneja, Krishan Kabra, Mohamed Hafeez Sadiq

Abstract:

Introduction: The increasing use of preservatives and flavouring agents has the potential to cause health problem among the people. There are no published studies from India exploring the awareness, safety perception, & practices about Food Preservatives (FPs) and Flavouring Agents (FAs). So this study was conducted with the objectives of assessing the awareness, safety perceptions & practices about Food Preservatives (FPs), Flavouring Agents (FAs) in commonly bought / purchased packed food items. Materials & method: This cross-sectional study was conducted in January 2012. Sample size of 126 was computed using the formula for infinite population. People who bought packed food items in malls were approached and requested to fill a pre-tested semi-structured questionnaire. The questionnaire explored awareness, safety perception & practices of FPs & FAs. Data was then analyzed using SPSS version 10.0. Chi-square test was used to know if the observed differences were statistically significant. ‘p’ value <0.05 was considered significant. Results: Totally 123 people (males- 48.8% and females-51.2%) participated (response rate of 97.6%) in the study. Majority of the people were aware about presence of ‘FPs’ (91.7%) and ‘FAs’ (84.9%) though their knowledge was inadequate. Breakup of the study subjects according to level of awareness about FPs was as follows (%): Good (37.4), Satisfactory (40.6), Poor (22) & FAs (%): Good (49.6), Satisfactory (36) & Poor (14). Distribution according to type of practices for FPs was as follows (%): Favourable (14), Unfavourable (86) & FAs (%): Favourable (30.5), Unfavourable (69.5). There was a gap between knowledge and practices. Conclusion: Though there was awareness, the knowledge was inadequate. Unfavourable practices were observed. The gaps in the knowledge and unhealthy practices need to be addressed by public awareness campaign.

Keywords: food preservatives, flavouring agents, knowledge and practices, general population

Procedia PDF Downloads 484
4909 Teachers' Assessment Practices in Lower Secondary Schools in Tanzania: The Potential and Opportunities for Formative Assessment Practice Implementation

Authors: Joyce Joas Kahembe

Abstract:

The implementation of education assessment reforms in developing countries has been claimed to be problematic and difficult. The socio-economic teaching and learning environment has pointed to constraints in the education reform process. Nevertheless, there are existing assessment practices that if enhanced, can have potential to foster formative assessment practices in those contexts. The present study used the sociocultural perspective to explore teachers’ assessment practices and factors influencing them in Tanzania. Specifically, the sociocultural perspective helped to trace social, economic and political histories imparted to teachers’ assessment practices. The ethnographic oriented methods like interviews, observations and document reviews was used in this exploration. Teachers used assessment practices, such as questioning and answering, tests, assignments and examinations, for evaluating, monitoring and diagnosing students’ understanding, achievement and performance and standards and quality of instruction practices. The obtained assessment information functioned as feedback for improving students’ understanding, performance, and the standard and quality of teaching instruction and materials. For example, teachers acknowledged, praised, approved, disapproved, denied, graded, or marked students’ responses to give students feedback and aid learning. Moreover, teachers clarified and corrected or repeated students’ responses with worded/added words to improve students’ mastery of the subject content. Teachers’ assessment practices were influenced by the high demands of passing marks in the high stakes examinations and the contexts of the social economic teaching environment. There is a need to ally education assessment reforms with existing socio-economic teaching environments and society and institutional demands of assessment to make assessment reforms meaningful and sustainable. This presentation ought to contribute on ongoing strategies for contextualizing assessment practices for formative uses.

Keywords: assessment, feedback, practices, formative assessment

Procedia PDF Downloads 472
4908 Medical Ethics: Knowledge, Attitude and Practices among Young Healthcare Professionals – A Survey from Islamabad, Pakistan

Authors: Asima Mehaboob Khan, Rizwan Taj

Abstract:

Purpose: This study aims to estimate the knowledge, attitude and practices of medical ethics among young healthcare professionals. Method: A qualitative descriptive study was conducted among young healthcare professionals from both public and private sector medical institutions. Using the convenience sampling technique, 272 healthcare professionals participated in this study. A pre-structured modified questionnaire was used to collect the data. Descriptive analyses were executed for each variable. Result: About 76.47% of healthcare professional considers the importance of adequate knowledge of medical ethics, and 82.24% declared lecture, seminars and clinical discussion as the source of their medical knowledge of biomedical ethics. About 42.44% of healthcare professionals exhibited a negative attitude toward medical ethics, 57.72% showed a mildly positive attitude, whereas 1.10% and 0.74% indicated a moderately positive attitude and a highly positive attitude towards medical ethics. Similarly, the level of practice according to medical ethics is also very poor among young healthcare professionals. 34.56% of healthcare professionals deviated from medical ethics during their clinical practices, whereas 0.74% showed a good level of medical practice according to medical ethics. Conclusion: It is concluded in this research study that young healthcare professionals have adequate theoretical knowledge of medical ethics but are not properly trained to perform their clinical practices according to the guidelines of medical ethics. Furthermore, their professional attitude is poorly developed to maintain medical ethics during their clinical practices.

Keywords: knowledge, attitude, practices, medical ethics

Procedia PDF Downloads 68
4907 Acute Bronchiolitis: Impact of an Educational Video on Mothers’ Knowledge, Attitudes, and Practices

Authors: Atitallah Sofien, Missaoui Nada, Ben Rabeh Rania, Yahyaoui Salem, Mazigh Sonia, Bouyahia Olfa, Boukthir Samir

Abstract:

Introduction: Acute bronchiolitis (AB) is a real public health problem on a global and national scale. Its treatment is most often outpatient. The use of audio-visual supports, such as educational videos, is an innovation in therapeutic education in outpatient treatment. The aim of our study was to evaluate the impact of an educational video on the knowledge, attitudes, and practices of mothers of infants with AB. Methodology: This was a descriptive, analytical, and cross-sectional study with prospective data collection, including mothers of infants with AB. We assessed mothers' knowledge, attitudes, and practices regarding AB, and we created an educational video. We used a questionnaire written in Tunisian Arabic concerning sociodemographic data, mothers' knowledge and attitudes regarding AB, and their opinions on the video, as well as an observation grid to evaluate their practices on the nasopharyngeal unblocking technique. We compared the different parameters before and after watching the video. Results: We noted a statistically significant improvement in mothers' knowledge scores on AB (7.46 in the pre-test versus 14.08 in the post-test; p≤0.05), practices (12.42 in the pre-test versus 18 in the post-test; p≤0.05) and attitudes (5.86 in pre-test versus 9.02 in post-test; p≤0.05). Conclusion: The use of an educational video has a positive impact on the knowledge, practices, and attitudes of mothers towards AB.

Keywords: acute bronchiolitis, therapeutic education, mothers, educational video

Procedia PDF Downloads 36
4906 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 506
4905 On the Factors Affecting Computing Students’ Awareness of the Latest ICTs

Authors: O. D. Adegbehingbe, S. D. Eyono Obono

Abstract:

The education sector is constantly faced with rapid changes in technologies in terms of ensuring that the curriculum is up to date and in terms of making sure that students are aware of these technological changes. This challenge can be seen as the motivation for this study, which is to examine the factors affecting computing students’ awareness of the latest Information Technologies (ICTs). The aim of this study is divided into two sub-objectives which are: the selection of relevant theories and the design of a conceptual model to support it as well as the empirical testing of the designed model. The first objective is achieved by a review of existing literature on technology adoption theories and models. The second objective is achieved using a survey of computing students in the four universities of the KwaZulu-Natal province of South Africa. Data collected from this survey is analyzed using Statistical package for the Social Science (SPSS) using descriptive statistics, ANOVA and Pearson correlations. The main hypothesis of this study is that there is a relationship between the demographics and the prior conditions of the computing students and their awareness of general ICT trends and of Digital Switch Over (DSO) a new technology which involves the change from analog to digital television broadcasting in order to achieve improved spectrum efficiency. The prior conditions of the computing students that were considered in this study are students’ perceived exposure to career guidance and students’ perceived curriculum currency. The results of this study confirm that gender, ethnicity, and high school computing course affect students’ perceived curriculum currency while high school location affects students’ awareness of DSO. The results of this study also confirm that there is a relationship between students prior conditions and their awareness of general ICT trends and DSO in particular.

Keywords: education, information technologies, IDT, awareness

Procedia PDF Downloads 334
4904 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis

Authors: Hyun-Ho Lee, Kee-Won Kim

Abstract:

The arithmetic operations over GF(2m) have been extensively used in error correcting codes and public-key cryptography schemes. Finite field arithmetic includes addition, multiplication, division and inversion operations. Addition is very simple and can be implemented with an extremely simple circuit. The other operations are much more complex. The multiplication is the most important for cryptosystems, such as the elliptic curve cryptosystem, since computing exponentiation, division, and computing multiplicative inverse can be performed by computing multiplication iteratively. In this paper, we present a parallel computation algorithm that operates Montgomery multiplication over finite field using redundant basis. Also, based on the multiplication algorithm, we present an efficient semi-systolic multiplier over finite field. The multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the multiplier saves at least 5% area, 50% time, and 53% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as inversion and division operation.

Keywords: finite field, Montgomery multiplication, systolic array, cryptography

Procedia PDF Downloads 254
4903 Proposed Solutions Based on Affective Computing

Authors: Diego Adrian Cardenas Jorge, Gerardo Mirando Guisado, Alfredo Barrientos Padilla

Abstract:

A system based on Affective Computing can detect and interpret human information like voice, facial expressions and body movement to detect emotions and execute a corresponding response. This data is important due to the fact that a person can communicate more effectively with emotions than can be possible with words. This information can be processed through technological components like Facial Recognition, Gait Recognition or Gesture Recognition. As of now, solutions proposed using this technology only consider one component at a given moment. This research investigation proposes two solutions based on Affective Computing taking into account more than one component for emotion detection. The proposals reflect the levels of dependency between hardware devices and software, as well as the interaction process between the system and the user which implies the development of scenarios where both proposals will be put to the test in a live environment. Both solutions are to be developed in code by software engineers to prove the feasibility. To validate the impact on society and business interest, interviews with stakeholders are conducted with an investment mind set where each solution is labeled on a scale of 1 through 5, being one a minimum possible investment and 5 the maximum.

Keywords: affective computing, emotions, emotion detection, face recognition, gait recognition

Procedia PDF Downloads 336
4902 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority

Authors: Chinedu Peter, Dashrath Singh

Abstract:

Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.

Keywords: P system, binary operation, determinism, weak rule priority

Procedia PDF Downloads 425
4901 The Influence of Green Supply Chain Management Practices' Implementation on Organizational Performance: An Empirical Case Study in Spain

Authors: Keivan Amirbagheri, Ana Nuñez-Carballosa, Laura Guitart-Tarrés

Abstract:

Over the last couple of decades, enterprises have begun to accept the need for environmental management and have started to implement environmental management programs to compete in the markets. The implementation of green supply chain management (GSCM) practices can provide valuable opportunities to improve firm performance. Through the prior investigations, the ascending tendency of the numbers of published papers in the field of green supply chain management practices has been reported and it shows the high interest level of the authors to work in this area. Besides, there is still a gap to study more about the relationship of GSCM to the organizational performance (OP). So, the purpose of this research is to study the practices related to green supply chain management that influence the results of the company as an organizational performance. Based on our previous works, from one part we have collected these GSCM practices (planning, operational, and communication practices) and classified them through conducting some literature reviews to analyze their effects on the OP’s factors (balanced scorecard’s perspectives). To do so we design a case study methodology through semi-structured interviews and secondary data from some multinational well-known companies based in Spain. The cases have been selected with the criterion of trying to collect members of the entire supply chain to have a vision as global as possible. The results report the considerable influence of green supply chain management practices on the organizational performance of the companies of the study. In addition, they represent that the implementation of green supply chain management practices especially in a long-term perspective can be economically justified. From the point of view of the personal, they feel better about being a member of this type of company that has been structured on environmental issues. Also, for these companies, the image that has been created by the implementation of these practices helps them to facilitate their marketing program.

Keywords: green supply chain management, organizational performance, case study, Spain

Procedia PDF Downloads 167
4900 Time Fetching Water and Maternal Childcare Practices: Comparative Study of Women with Children Living in Ethiopia and Malawi

Authors: Davod Ahmadigheidari, Isabel Alvarez, Kate Sinclair, Marnie Davidson, Patrick Cortbaoui, Hugo Melgar-Quiñonez

Abstract:

The burden of collecting water tends to disproportionately fall on women and girls in low-income countries. Specifically, women spend between one to eight hours per day fetching water for domestic use in Sub-Saharan Africa. While there has been research done on the global time burden for collecting water, it has been mainly focused on water quality parameters; leaving the relationship between water fetching and health outcomes understudied. There is little available evidence regarding the relationship between water fetching and maternal child care practices. The main objective of this study was to help fill the aforementioned gap in the literature. Data from two surveys in Ethiopia and Malawi conducted by CARE Canada in 2016-2017 were used. Descriptive statistics indicate that women were predominantly responsible for collecting water in both Ethiopia (87%) and Malawi (99%) respectively, with the majority spending more than 30 minutes per day on water collection. With regards to child care practices, in both countries, breastfeeding was relatively high (77% and 82%, respectively); and treatment for malnutrition was low (15% and 8%, respectively). However, the same consistency was not found for weighing; in Ethiopia only 16% took their children for weighting in contrast to 94% in Malawi. These three practices were summed to create one variable for regressions analyses. Unadjusted logistic regression findings showed that only in Ethiopia was time fetching water significantly associated with child care practices. Once adjusted for covariates, this relationship was no longer found to be significant. Adjusted logistic regressions also showed that the factors that did influence child care practices differed slightly between the two countries. In Ethiopia, a lack of access to community water supply (OR= 0.668; P=0.010), poor attitudes towards gender equality (OR= 0.608; P=0.001), no access to land and (OR=0.603; P=0.000), significantly decreased a women’s odd of using positive childcare practices. Notably, being young women between 15-24 years (OR=2.308; P=0.017), and 25-29 (OR=2.065; P=0.028) increased probability of using positive childcare practices. Whereas in Malawi, higher maternal age, low decision-making power, significantly decreased a women’s odd of using positive childcare practices. In conclusion, this study found that even though amount of time spent by women fetching water makes a difference for childcare practices, it is not significantly related to women’s child care practices when controlling the covariates. Importantly, women’s age contributes to child care practices in Ethiopia and Malawi.

Keywords: time fetching water, community water supply, women’s child care practices, Ethiopia, Malawi

Procedia PDF Downloads 175
4899 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 160
4898 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 251
4897 Appraisal of Maintenance Practices in Selected Tourist Attraction in Bauchi State, Nigeria

Authors: Eldah Ephraim Buba, Amina Bata Zoaka, Aishatu Ibrahim

Abstract:

This study appraised maintenance practices in selected tourist attractions in Bauchi state, Nigeria. Four tourist attractions were used for the research. Checklists were used to assess operations and repairs maintenance practices in the different attractions. The study carried out personal assessment thrice in six months without prior knowledge of the staff in charge for operational maintenance. Records of repairs maintenance from the attractions maintenance unit for a period of ten years were assessed using the checklists. The findings of the study show that operations maintenance was not adequately carried out in the four tourists attractions. Repairs maintenance was carried out in Yankari game reserve and safari, but repairs maintenance was poor in the other three attractions. The study therefore, recommends that adequate maintenance should be practiced in tourist attractions to expand the lifespan of the facilities and also encourage tourist patronage.

Keywords: appraisal, maintenance, practices, tourist attraction

Procedia PDF Downloads 270
4896 Management Accounting Revolution: Developed and Developing Country

Authors: Puwanenthiren Pratheepkanth

Abstract:

The main aim of this paper is to analyse existing literature (1960 -2016) on management accounting revolution by firms in a comparative perspective to see whether any differences between developed and developing countries context. The significant role that management accounting practices play in corporate finance is well established by reams of research articles. The study reveals that there are clear limitations to the literature review, it suggests that a majority of management accounting practices’ studies are focused on developed markets and that there is a scarcity of serious analyses of the situation in emerging markets.

Keywords: developed countries, developing countries, literature review, management accounting practices

Procedia PDF Downloads 247
4895 The Utilization of Big Data in Knowledge Management Creation

Authors: Daniel Brian Thompson, Subarmaniam Kannan

Abstract:

The huge weightage of knowledge in this world and within the repository of organizations has already reached immense capacity and is constantly increasing as time goes by. To accommodate these constraints, Big Data implementation and algorithms are utilized to obtain new or enhanced knowledge for decision-making. With the transition from data to knowledge provides the transformational changes which will provide tangible benefits to the individual implementing these practices. Today, various organization would derive knowledge from observations and intuitions where this information or data will be translated into best practices for knowledge acquisition, generation and sharing. Through the widespread usage of Big Data, the main intention is to provide information that has been cleaned and analyzed to nurture tangible insights for an organization to apply to their knowledge-creation practices based on facts and figures. The translation of data into knowledge will generate value for an organization to make decisive decisions to proceed with the transition of best practices. Without a strong foundation of knowledge and Big Data, businesses are not able to grow and be enhanced within the competitive environment.

Keywords: big data, knowledge management, data driven, knowledge creation

Procedia PDF Downloads 77
4894 Household Energy Usage and Practices in the Rural Areas of Northern Part of Mindanao Island, Philippines

Authors: Odinah Cuartero-Enteria, Aive Pecasales, Jhadly Philip Buniel, Christian Joy Vega, Shiela Estubo

Abstract:

In the Philippines, Mindanao Island has the cheapest electricity because of the hydroelectric plants. Due to the rapid increase of the electricity consumption which the sources of electricity cannot support, it causes rotating brownout during summer season. This study investigated the household energy usage and practices in the rural areas of northern part of the Mindanao Island, Philippines. The questionnaire that includes the respondents’ profile and their common practices in energy consumptions was used as a tool in gathering the data. Several households were subjected to the survey. Results show energy consumption is not dependent on the profile of the respondents. It was observed that most of the families prefer to use energy saving methods of reducing electricity consumption. The main energy saving methods are unplugging unused home appliances, using of compact fluorescent bulb and energy-efficient gadgets, and using high electricity consumption appliances by schedule. Based on the results, the households in the rural areas know the practices of reducing electricity consumption. However, it is highly recommended that concern agencies should initiate information dissemination and strict implementation of well-formulated energy conservation practices all over the areas in Mindanao.

Keywords: Philippines, Mindanao island, rural areas, households, energy usages, practices

Procedia PDF Downloads 354
4893 Gender Discrepancies in Current Pedagogical and Curricular Practices in EFL Higher Education Settings

Authors: Hamad Aldosari

Abstract:

The purpose of this study is to investigate the status of sexism, or gender discrepancies, in current pedagogical and curricular practices in EFL learning higher education settings. Qualitative and quantitative analyses of both course contents and pedagogies in Saudi higher education institutions are to be discussed with reference to female/male topic presentation in dialogs and reading passages, sex-based activity types, stereotyped sex roles and the masculine generic conceptions of male superiority subliminally related in EFL curriculum and pedagogical practices, as well as the causes and effects of segregated language education practices in Saudi Arabia from a holistic vantage point of analysis. Analysis findings show that language educational practices including educational settings and segregation are gender-biased in attitude, but with regard to curriculum, sexism has not been traced. Findings also show that sexism is rampant due to socio-cultural aspects of language education rather than to religious reasons: a finding that seems to mirror the institutionalized unfair sex discrimination to the disadvantage of women in the Arabian societies at large.

Keywords: genderism, sex segregation, Saudi Arabia, EFL

Procedia PDF Downloads 255
4892 The Construction of Multilingual Online Gaming Community

Authors: Dina Alnefaie

Abstract:

This poster presents a study of a Discord private server with thirteen multilingual gamers, aiming to explore the elements that construct a multilingual online gaming community. The study focuses on the communication practices of four Saudi female and male gamers, using various data collection methods, including online observations through recorded videos and screenshots, interviews, and informal conversations for one year. The primary findings show that translanguaging was a prominent feature of their verbal and textual communication practices. Besides, these practices that mostly accompany cultural ones were used to facilitate communication and express their identities in an intercultural context.

Keywords: online community construction, perceptions, multilingualism, digital identity

Procedia PDF Downloads 62
4891 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 367