Search results for: distributed denial of service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5379

Search results for: distributed denial of service

5199 Distributed Multi-Agent Based Approach on Intelligent Transportation Network

Authors: Xiao Yihong, Yu Kexin, Burra Venkata Durga Kumar

Abstract:

With the accelerating process of urbanization, the problem of urban road congestion is becoming more and more serious. Intelligent transportation system combining distributed and artificial intelligence has become a research hotspot. As the core development direction of the intelligent transportation system, Cooperative Intelligent Transportation System (C-ITS) integrates advanced information technology and communication methods and realizes the integration of humans, vehicle, roadside infrastructure, and other elements through the multi-agent distributed system. By analyzing the system architecture and technical characteristics of C-ITS, the report proposes a distributed multi-agent C-ITS. The system consists of Roadside Sub-system, Vehicle Sub-system, and Personal Sub-system. At the same time, we explore the scalability of the C-ITS and put forward incorporating local rewards in the centralized training decentralized execution paradigm, hoping to add a scalable value decomposition method. In addition, we also suggest introducing blockchain to improve the safety of the traffic information transmission process. The system is expected to improve vehicle capacity and traffic safety.

Keywords: distributed system, artificial intelligence, multi-agent, cooperative intelligent transportation system

Procedia PDF Downloads 171
5198 Implementation of Distributed Randomized Algorithms for Resilient Peer-to-Peer Networks

Authors: Richard Tanaka, Ying Zhu

Abstract:

This paper studies a few randomized algorithms in application-layer peer-to-peer networks. The significant gain in scalability and resilience that peer-to-peer networks provide has made them widely used and adopted in many real-world distributed systems and applications. The unique properties of peer-to-peer networks make them particularly suitable for randomized algorithms such as random walks and gossip algorithms. Instead of simulations of peer-to-peer networks, we leverage the Docker virtual container technology to develop implementations of the peer-to-peer networks and these distributed randomized algorithms running on top of them. We can thus analyze their behaviour and performance in realistic settings. We further consider the problem of identifying high-risk bottleneck links in the network with the objective of improving the resilience and reliability of peer-to-peer networks. We propose a randomized algorithm to solve this problem and evaluate its performance by simulations.

Keywords: distributed randomized algorithms, peer-to-peer networks, virtual container technology, resilient networks

Procedia PDF Downloads 172
5197 Ontology-Based Backpropagation Neural Network Classification and Reasoning Strategy for NoSQL and SQL Databases

Authors: Hao-Hsiang Ku, Ching-Ho Chi

Abstract:

Big data applications have become an imperative for many fields. Many researchers have been devoted into increasing correct rates and reducing time complexities. Hence, the study designs and proposes an Ontology-based backpropagation neural network classification and reasoning strategy for NoSQL big data applications, which is called ON4NoSQL. ON4NoSQL is responsible for enhancing the performances of classifications in NoSQL and SQL databases to build up mass behavior models. Mass behavior models are made by MapReduce techniques and Hadoop distributed file system based on Hadoop service platform. The reference engine of ON4NoSQL is the ontology-based backpropagation neural network classification and reasoning strategy. Simulation results indicate that ON4NoSQL can efficiently achieve to construct a high performance environment for data storing, searching, and retrieving.

Keywords: Hadoop, NoSQL, ontology, back propagation neural network, high distributed file system

Procedia PDF Downloads 232
5196 Sync Consensus Algorithm: Trying to Reach an Agreement at Full Speed

Authors: Yuri Zinchenko

Abstract:

Recently, distributed storage systems have been used more and more in various aspects of everyday life. They provide such necessary properties as Scalability, Fault Tolerance, Durability, and others. At the same time, not only reliable but also fast data storage remains one of the most pressing issues in this area. That brings us to the consensus algorithm as one of the most important components that has a great impact on the functionality of a distributed system. This paper is the result of an analysis of several well-known consensus algorithms, such as Paxos and Raft. The algorithm it offers, called Sync, promotes, but does not insist on simultaneous writing to the nodes (which positively affects the overall writing speed) and tries to minimize the system's inactive time. This allows nodes to reach agreement on the system state in a shorter period, which is a critical factor for distributed systems. Also when developing Sync, a lot of attention was paid to such criteria as simplicity and intuitiveness, the importance of which is difficult to overestimate.

Keywords: sync, consensus algorithm, distributed system, leader-based, synchronization.

Procedia PDF Downloads 24
5195 The Importance of Customer Engagement and Service Innovation in Value Co-Creation

Authors: Soheila Raeisi, Meng Lingjie

Abstract:

The interaction of customers with businesses is a process that is critical to the running of those businesses. Different levels of customer engagement and service innovation exist when pursuing value co-creation endeavors. The important thing in this whole process is for business managers know the benefits that can be realized when these activities are pursued effectively. The purpose of this paper is to first identify the importance of value co-creation when pursued via customer engagement and service innovation. Secondly, it will also identify the conditions under which value co-destruction can occur on the same. The background of the topic will be reviewed followed by the literature review with a special focus on the definition of these terms and the research design to be used. The research found that it is beneficial to have a strong relationship between stakeholders and the business in order to have strong customer engagement and service innovation.

Keywords: customer engagement, service innovation, value co-creation, value co-destruction

Procedia PDF Downloads 321
5194 The Effective Operations Competitive Advantages of Mobile Phone Service Providers across Countries: The Case of Middle East Region

Authors: Yazan Khalid Abed-Allah Migdadi

Abstract:

The aim of this study is identifying the effective operations competitive advantages of mobile phone service providers across countries. All Arab countries in the Middle East region were surveyed except Syria, and 27 out of 31 service providers were surveyed. Data collected from corporations’ annual reports, websites and other professional institutions published sources. Multiple linear regression analysis test was used to identify the relationship between operations competitive advantages and market share. The effective operations competitive advantages were; diversity of offers and service accessibility

Keywords: competitive advantage, mobile telecommunication operations, Middle East, service provider

Procedia PDF Downloads 363
5193 Finding and Obtaining Special Education Services Globally: Research and Development

Authors: Melissa Hartley, Erika McCoy

Abstract:

Military-connected children with disabilities often require services in different countries throughout their school career. This research and development text seeks to provide current practices in finding and obtaining comparable special education services globally. Considerations in service provision include: language of the service provider, service delivery format, current service availability and finding comparable services, location of services, and readily available services. After providing current practices, the researchers will engage the audience in brainstorming additional ways at finding and obtaining comparable special education services globally.

Keywords: collaboration, international education, service delivery, special education services

Procedia PDF Downloads 187
5192 Integrating Service Learning into a Business Analytics Course: A Comparative Investigation

Authors: Gokhan Egilmez, Erika Hatfield, Julie Turner

Abstract:

In this study, we investigated the impacts of service-learning integration on an undergraduate level business analytics course from multiple perspectives, including academic proficiency, community awareness, engagement, social responsibility, and reflection. We assessed the impact of the service-learning experience by using a survey developed primarily based on the literature review and secondarily on an ad hoc group of researchers. Then, we implemented the survey in two sections, where one of the sections was a control group. We compared the results of the empirical survey visually and statistically.

Keywords: business analytics, service learning, experiential education, statistical analysis, survey research

Procedia PDF Downloads 71
5191 The Relation between Organization Cultures with the Quality of Service for Government Hospital in Dusit Area

Authors: Routsukol Sunalai

Abstract:

This research was to study the relationship between the organizational culture like bureaucratic system, and patronage system in government hospitals with hospital accreditation and its impact on the quality of service in the government hospital accredited. Qualitative research was applied in this study by in-depth interviews with samples containing 20 public welfare service providers, i.e. doctors, nurses and practical nurses and 20 service recipients in the units of study. It was found that the bureaucracy still existed and was evidenced by the structure of the line of command; work systems, clear cut duty divisions, procedures and plans, and the patronage system hindered the quality of service in the government hospitals under the process of development and accreditation. The administrators should encourage and support the creation of a learning process in the organization for self-improvement and work development.

Keywords: hospital in Dusit Area, organization culture, the quality of service, economics and financial engineering

Procedia PDF Downloads 293
5190 Assessing Bus Service Quality in Dhaka City from the Perspective of Female Passengers

Authors: S. K. Subah, R. Tasnim, M. I. Jahan, M. R. Islam

Abstract:

While talking about how comfortable and convenient Dhaka's bus service is, the minimum emphasis is placed on the female commuters of the Dhaka city. Recognizing the contemporary situation, the supreme focus is to develop experimental model based on statistical methods. SEM has been adopted to quantify passenger satisfaction, which is affected by the perceived service quality. The study deals with 16 observed variables and three latent variables, which were correlated to identify their significance on the regulation of perceived SQ (Service Quality). To calibrate the model, a dataset of 250 responses from female users of local buses has been utilized through survey. A questionnaire structured with SQ variables was prepared in consultation with prevailing literature, practitioners, academicians, and users. The result concludes that the attributes of safe and secured environment have the most significant impact on the overall bus service quality according to the insight of female respondents. The study outcome might be a great help for the policymakers, women's organizations, and NGOs to formulate transport policy that will ensure a women-friendly public bus service.

Keywords: bus service quality, female perception, structural equation modelling, safety-security, women friendly bus

Procedia PDF Downloads 119
5189 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 95
5188 Model-Free Distributed Control of Dynamical Systems

Authors: Javad Khazaei, Rick Blum

Abstract:

Distributed control is an efficient and flexible approach for coordination of multi-agent systems. One of the main challenges in designing a distributed controller is identifying the governing dynamics of the dynamical systems. Data-driven system identification is currently undergoing a revolution. With the availability of high-fidelity measurements and historical data, model-free identification of dynamical systems can facilitate the control design without tedious modeling of high-dimensional and/or nonlinear systems. This paper develops a distributed control design using consensus theory for linear and nonlinear dynamical systems using sparse identification of system dynamics. Compared with existing consensus designs that heavily rely on knowing the detailed system dynamics, the proposed model-free design can accurately capture the dynamics of the system with available measurements and input data and provide guaranteed performance in consensus and tracking problems. Heterogeneous damped oscillators are chosen as examples of dynamical system for validation purposes.

Keywords: consensus tracking, distributed control, model-free control, sparse identification of dynamical systems

Procedia PDF Downloads 226
5187 Considering the Reliability of Measurements Issue in Distributed Adaptive Estimation Algorithms

Authors: Wael M. Bazzi, Amir Rastegarnia, Azam Khalili

Abstract:

In this paper we consider the issue of reliability of measurements in distributed adaptive estimation problem. To this aim, we assume a sensor network with different observation noise variance among the sensors and propose new estimation method based on incremental distributed least mean-square (IDLMS) algorithm. The proposed method contains two phases: I) Estimation of each sensors observation noise variance, and II) Estimation of the desired parameter using the estimated observation variances. To deal with the reliability of measurements, in the second phase of the proposed algorithm, the step-size parameter is adjusted for each sensor according to its observation noise variance. As our simulation results show, the proposed algorithm considerably improves the performance of the IDLMS algorithm in the same condition.

Keywords: adaptive filter, distributed estimation, sensor network, IDLMS algorithm

Procedia PDF Downloads 600
5186 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).

Keywords: mininet, OpenFlow, POX controller, SDN

Procedia PDF Downloads 193
5185 The Effect of Relationship Marketing on Service Quality and Customer Satisfaction without Service Providers' Emotional Intelligence: The Case of the Insurance Industry in Ghana

Authors: Frank Frimpong Opuni, Michael Mba Allan, Kwame Adu-Gyamfi, Michael Sarkodie Baffoe

Abstract:

This paper assesses the effect of relationship marketing on service quality and customer satisfaction from the perspective of the moderating role of emotional intelligence in the insurance industry in Ghana. A descriptive quantitative research technique was employed. A random sample of 384 each of customers and service providers in 3 insurance firms in Accra were used as the source of data. According to findings, emotional intelligence makes a strong positive effect on relationship marketing at 5% significance level, r (283) = .817, p = .000. Though relationship marketing makes a strong positive effect on service quality (r = .767, p < .05) and customer satisfaction (r = .647, p < .05), this effect becomes insignificant (p > .05) when the effect of emotional intelligence on relationship marketing is controlled for. It is therefore recommended that insurance firms give priority to equipping their relationship employees with emotional intelligence to maximise service quality and customer satisfaction.

Keywords: relationship marketing, service quality, customer satisfaction, emotional intelligence

Procedia PDF Downloads 441
5184 Pre-Exsisting Attitude, Service Failure, and Recovery: Effect, Attributes, and Process in an Islamic Country

Authors: Niloofar Mobasem, Kambiz Heidarzadeh Hanzaee

Abstract:

Purpose: The study aimed to measure the customer satisfaction with service recovery through the conflict management framework, especially assessing the role of pre-existing attitudes for measuring the customer response to the service failure. Design/ methodology/ approach: The study is based on the experimental research method. The factorial designs are used in the research that measures the variables in two separate studies. In the first study, the factorial design is 3 conflict management style: cooperative, competitive, avoiding; - 3 service performance: exceed expectation, meet expectation, fail to meet expectation; and in the second study includes: - 3 conflict management style: cooperative, competitive, avoiding; - 2 service performance: exceed expectation, fail to meet expectation; - 2 pre-existing attitude: positive, negative. Finding: The results of study based on a scenario indicate that the conflict management style affected on customer satisfaction by service recovery efforts as well as the pre-existing attitudes affected the customer interpretation for service providers (conflict management style) and those who have positive pre-existing attitudes are interested to response to the cooperative approach in dealing with service failure. Research limitation/ implication: According to all researches, the study has several limitations. The nature of scenario in this study may cause to hit the reality of life. Although, the similar scenario approaches commonly are used for such researches, but the approaches are not without criticism. Practical implications: Given the importance of service recovery, companies can understand the importance of creating customer satisfaction achieved by the positive results due to the service recovery during the shortness or service failure by the mentioned companies. Originality/ value: The study highlights the importance of service failure and providing the education in relation to the service recovery.

Keywords: service recovery, pre-existing attitude, service failure, customer satisfaction

Procedia PDF Downloads 515
5183 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 48
5182 Distributed Framework for Pothole Detection and Monitoring Using Federated Learning

Authors: Ezil Sam Leni, Shalen S.

Abstract:

Transport service monitoring and upkeep are essential components of smart city initiatives. The main risks to the relevant departments and authorities are the ever-increasing vehicular traffic and the conditions of the roads. In India, the economy is greatly impacted by the road transport sector. In 2021, the Ministry of Road Transport and Highways Transport, Government of India, produced a report with statistical data on traffic accidents. The data included the number of fatalities, injuries, and other pertinent criteria. This study proposes a distributed infrastructure for the monitoring, detection, and reporting of potholes to the appropriate authorities. In a distributed environment, the nodes are the edge devices, and local edge servers, and global servers. The edge devices receive the initial model to be employed from the global server. The YOLOv8 model for pothole detection is used in the edge devices. The edge devices run the pothole detection model, gather the pothole images on their path, and send the updates to the nearby edge server. The local edge server selects the clients for its aggregation process, aggregates the model updates and sends the updates to the global server. The global server collects the updates from the local edge servers, performs aggregation and derives the updated model. The updated model has the information about the potholes received from the local edge servers and notifies the updates to the local edge servers and concerned authorities for monitoring and maintenance of road conditions. The entire process is implemented in FedCV distributed environment with the implementation using the client-server model and aggregation entities. After choosing the clients for its aggregation process, the local edge server gathers the model updates and transmits them to the global server. After gathering the updates from the regional edge servers, the global server aggregates them and creates the updated model. Performance indicators and the experimentation environment are assessed, discussed, and presented. Accelerometer data may be taken into consideration for improved performance in the future development of this study, in addition to the images captured from the transportation routes.

Keywords: federated Learning, pothole detection, distributed framework, federated averaging

Procedia PDF Downloads 45
5181 A Multi-Role Oriented Collaboration Platform for Distributed Disaster Reduction in China

Authors: Linyao Qiu, Zhiqiang Du

Abstract:

As the rapid development of urbanization, economic developments, and steady population growth in China, the widespread devastation, economic damages, and loss of human lives caused by numerous forms of natural disasters are becoming increasingly serious every year. Disaster management requires available and effective cooperation of different roles and organizations in whole process including mitigation, preparedness, response and recovery. Due to the imbalance of regional development in China, the disaster management capabilities of national and provincial disaster reduction centers are uneven. When an undeveloped area suffers from disaster, neither local reduction department could get first-hand information like high-resolution remote sensing images from satellites and aircrafts independently, nor sharing mechanism is provided for the department to access to data resources deployed in other place directly. Most existing disaster management systems operate in a typical passive data-centric mode and work for single department, where resources cannot be fully shared. The impediment blocks local department and group from quick emergency response and decision-making. In this paper, we introduce a collaborative platform for distributed disaster reduction. To address the issues of imbalance of sharing data sources and technology in the process of disaster reduction, we propose a multi-role oriented collaboration business mechanism, which is capable of scheduling and allocating for optimum utilization of multiple resources, to link various roles for collaborative reduction business in different place. The platform fully considers the difference of equipment conditions in different provinces and provide several service modes to satisfy technology need in disaster reduction. An integrated collaboration system based on focusing services mechanism is designed and implemented for resource scheduling, functional integration, data processing, task management, collaborative mapping, and visualization. Actual applications illustrate that the platform can well support data sharing and business collaboration between national and provincial department. It could significantly improve the capability of disaster reduction in China.

Keywords: business collaboration, data sharing, distributed disaster reduction, focusing service

Procedia PDF Downloads 266
5180 Evaluation of Practicality of On-Demand Bus Using Actual Taxi-Use Data through Exhaustive Simulations

Authors: Jun-ichi Ochiai, Itsuki Noda, Ryo Kanamori, Keiji Hirata, Hitoshi Matsubara, Hideyuki Nakashima

Abstract:

We conducted exhaustive simulations for data assimilation and evaluation of service quality for various setting in a new shared transportation system, called SAVS. Computational social simulation is a key technology to design recent social services like SAVS as new transportation service. One open issue in SAVS was to determine the service scale through the social simulation. Using our exhaustive simulation framework, OACIS, we did data-assimilation and evaluation of effects of SAVS based on actual tax-use data at Tajimi city, Japan. Finally, we get the conditions to realize the new service in a reasonable service quality.

Keywords: on-demand bus sytem, social simulation, data assimilation, exhaustive simulation

Procedia PDF Downloads 279
5179 The Mediation Effect of Customer Satisfaction in the Relationship between Service Quality, Corporate Image to Customer Loyalty

Authors: Rizwan Ali, Hammad Zafar

Abstract:

The purpose of this research is to investigate the mediation effect of customer satisfaction in the relationship between service quality, corporate image to customer loyalty, in Pakistan banking sector. The population of this research is banking customers and sample size of 210 respondents. This research uses the SPSS, Correlation, ANOVA and regression analysis techniques along with AMOS methods. The service quality and corporate image applied by the banks are not all variables can directly affect customer loyalty, but must first going through satisfaction. Which means that banks must first need to understand what the customer basic needs through variable service quality and corporate image so that the customers feel loyal when the level of satisfaction is resolved. The service quality provided by the banking industry needs to be improved in order to improve customer satisfaction and loyalty of banking services, especially for banks in Pakistan.

Keywords: customer loyalty, service quality, corporate image, customer satisfaction

Procedia PDF Downloads 68
5178 Assessing the Pre-Service and In-Service Teachers’ Continuation of Use of Technology After Participation in Professional Development

Authors: Ayoub Kafyulilo, Petra Fisser, Joke Voogt

Abstract:

This study was conducted to assess the continuation of the use of technology in science and mathematics teaching of the pre-service and in-service teachers who attended the professional development programme. It also assessed professional development, personal, institutional, and technological factors contributing to the continuous use of technology in teaching. The study involved 42 teachers, thirteen pre-service teachers, and twenty-nine in-service teachers. A mixed-method research approach was used to collect data for this study. Findings showed that the continuous use of technology in teaching after the termination of the professional development arrangement was high among the pre-service teachers, and differed for the in-service teachers. The regression model showed that knowledge and skills, access to technology and ease of use were strong predictors (R2 = 55.3%) of the teachers’ continuous use of technology after the professional development arrangement. The professional development factor did not have a direct effect on the continuous use of technology, rather had an influence on personal factors (knowledge and skills). In turn, the personal factors had influence on the institutional factors (access to technology) and technological factors (ease of use), which together had an effect on the teachers’ continuous use of technology in teaching.

Keywords: technology, professional development, teachers, science and mathematics

Procedia PDF Downloads 119
5177 Enabling Service Innovation in Higher Education Institutions by Means of Leveraging Knowledge Management Practices

Authors: Mulalo Mushaisano

Abstract:

It has been revealed in the existing literature that specific knowledge management practices can be implemented and utilized in organizations to enable sustaining service innovation. This kind of innovation is of crucial importance in service environments such as institutions of higher education because it allows the delivery of enhanced services which are designed to add value and deliver better services to clients. However, there is a widespread lack of the necessary implementation of essential knowledge practices in higher education institutions owing to a variety of internal challenges and barriers. The primary objective of the study was to identify the essential knowledge management practices required for the enablement of service innovation. The main outcome was the development of a framework of knowledge management practice which can be applied in institutions of higher education to achieve service innovation. The study will address the gap in where existing literature mostly explored the aforementioned processes in the context of commercial and corporate organizations and not in the higher education environment.

Keywords: higher education, innovation, knowledge management, service innovation

Procedia PDF Downloads 104
5176 Impact of Series Reactive Compensation on Increasing a Distribution Network Distributed Generation Hosting Capacity

Authors: Moataz Ammar, Ahdab Elmorshedy

Abstract:

The distributed generation hosting capacity of a distribution network is typically limited at a given connection point by the upper voltage limit that can be violated due to the injection of active power into the distribution network. The upper voltage limit violation concern becomes more important as the network equivalent resistance increases with respect to its equivalent reactance. This paper investigates the impact of modifying the distribution network equivalent reactance at the point of connection such that the upper voltage limit is violated at a higher distributed generation penetration, than it would without the addition of series reactive compensation. The results show that series reactive compensation proves efficient in certain situations (based on the ratio of equivalent network reactance to equivalent network resistance at the point of connection). As opposed to the conventional case of capacitive compensation of a distribution network to reduce voltage drop, inductive compensation is seen to be more appropriate for alleviation of distributed-generation-induced voltage rise.

Keywords: distributed generation, distribution networks, series compensation, voltage rise

Procedia PDF Downloads 361
5175 An Approach to Integrated Water Resources Management, a Plan for Action to Climate Change in India

Authors: H. K. Ramaraju

Abstract:

World is in deep trouble and deeper denial. Worse, the denial is now entirely on the side of action. It is well accepted that climate change is a reality. Scientists say we need to cap temperature increases at 2°C to avoid catastrophe, which means capping emissions at 450 ppm .We know global average temperatures have already increased by 0.8°C and there is enough green house gas in the atmosphere to lead to another 0.8°C increase. There is still a window of opportunity, a tiny one, to tackle the crisis. But where is the action? In the 1990’s, when the world did even not understand, let alone accept, the crises, it was more willing to move to tackle climate change. Today we are in reverse in gear. The rich world has realized it is easy to talk big, but tough to take steps to actually reduce emissions. The agreement was that these countries would reduce so that the developing World could increase. Instead, between 1990 and 2006, their carbon dioxide emissions increased by a whopping 14.5 percent, even green countries of Europe are unable to match words with action. Stop deforestation and take a 20 percent advantage in our carbon balance sheet, with out doing anything at home called REDD (reducing emissions from deforestation and forest degradation) and push for carbon capture and storage (CCS) technologies. There are warning signs elsewhere and they need to be read correctly and acted up on , if not the cases like flood –act of nature or manmade disaster. The full length paper orient in proper understanding of the issues and identifying the most appropriate course of action.

Keywords: catastrophe, deforestation, emissions, waste water

Procedia PDF Downloads 264
5174 Analysis of Importance of Culture in Distributed Design Based on the Case Study at the University of Strathclyde

Authors: Zixuan Yang

Abstract:

This paper presents an analysis of the necessary consideration culture in distributed design through a thorough literature review and case study. The literature review has identified that the need for understanding cultural differences in product design and user evaluations is highlighted by analyzing cross-cultural influences; culture plays a significant role in distributed work, particularly in establishing team cohesion, trust, and credibility early in the project. By applying approaches of Geert Hofstede's dimensions and Fukuyama's trust analysis, a case study of a global design project, i.e., multicultural distributed teamwork solving the problem in terms of reducing the risk of deep vein thrombosis, showcases cultural dynamics, emphasizing trust-building and decision-making. The lessons learned emphasized the importance of cultural awareness, adaptability, and the utilization of scientific theories to enable effective cross-cultural collaborations in global design, providing valuable insights into navigating cultural diversity within design practices.

Keywords: culture, distributed design, global design, Geert Hofstede's dimensions, Fukuyama's trust analysis

Procedia PDF Downloads 18
5173 Bible of Hospitality: Considering the Hotel Business through the Prism of the Evangelical Approach

Authors: Rimma Kiseleva

Abstract:

The hotel business has a long history. The basis of the service of hospitality industry enterprises is the service, attitude, and consciousness of employees as hospitable “hosts of the house”. It is generally accepted that the founder and main expert of quality service is Caesar Ritz, “the king of hoteliers and the hotelier of kings.” However when deeply immersed in the history of the universe, it turns out that the very first book about hospitality, standardization of guest reception processes and the basics of better service is nothing more than the Bible. A unique study on the topic of considering the Church as a hotel, as well as the hotel business itself as the most gracious work of Jesus Christ Himself, which is confirmed by verses from the Gospel, includes the following approaches: analytical, comparative, empirical. The study shows that it was Jesus Christ who became the founder of the rules of the most sacrificial service, real service to people, filled with brotherly love, humility, love for strangers, those qualities that are the foundation, the “three pillars” of the hospitality industry. And also that the hotel is the most charitable cause, which is still relevant today.

Keywords: Augustine Aurelius, Bible, Gospel, guest house, hospitality, hotel, humility, inn, Jesus Christ, Joseph Fletcher, New Testament, Paul Tillich, service, strangeness

Procedia PDF Downloads 15
5172 The Visualization of the Way of Creating a Service: Slavic Liturgical Books. Between Text and Music

Authors: Victoria Legkikh

Abstract:

To create a new Orthodox service of Jerusalem rite and to make it possible for a performance, one had to use several types of books. These are menaions and triodion, cleargy service book, stichirarion and typikon. These books keep a part of the information about the service, which a medieval copyist had to put together like a puzzle. But an abundance of necessary books and their variety created a lot of problems in copying services. The main problem was the difference of text in notated and not notated manuscripts (they were corrected at a different time) and lack of information in typikon, which provided only a type of hymns and their mode. After all, a copyist could have both corrected and not corrected manuscripts which also provided a different type of service. It brings us to the situation when we hardly have a couple of manuscripts containing the same service, and it is difficult to understand which changes were made voluntarily and which ones were provided by different types of available manuscripts. A recent paper proposes an analysis of every type of liturgical book and a way of using them in copying and correcting a service so we can divide voluntary changes and changes due to various types of books. The paper also proposes an index showing the “material” life of hymns in different types of manuscripts and the changes of its version and place in the same type of manuscript. This type of index can help in reconstructing the way of creation/copying service and can be useful for publication of the services providing necessary information of every hymn in every used manuscript.

Keywords: orthodox church music, creation, manuscripts, liturgical books

Procedia PDF Downloads 139
5171 A Fast Parallel and Distributed Type-2 Fuzzy Algorithm Based on Cooperative Mobile Agents Model for High Performance Image Processing

Authors: Fatéma Zahra Benchara, Mohamed Youssfi, Omar Bouattane, Hassan Ouajji, Mohamed Ouadi Bensalah

Abstract:

The aim of this paper is to present a distributed implementation of the Type-2 Fuzzy algorithm in a parallel and distributed computing environment based on mobile agents. The proposed algorithm is assigned to be implemented on a SPMD (Single Program Multiple Data) architecture which is based on cooperative mobile agents as AVPE (Agent Virtual Processing Element) model in order to improve the processing resources needed for performing the big data image segmentation. In this work we focused on the application of this algorithm in order to process the big data MRI (Magnetic Resonance Images) image of size (n x m). It is encapsulated on the Mobile agent team leader in order to be split into (m x n) pixels one per AVPE. Each AVPE perform and exchange the segmentation results and maintain asynchronous communication with their team leader until the convergence of this algorithm. Some interesting experimental results are obtained in terms of accuracy and efficiency analysis of the proposed implementation, thanks to the mobile agents several interesting skills introduced in this distributed computational model.

Keywords: distributed type-2 fuzzy algorithm, image processing, mobile agents, parallel and distributed computing

Procedia PDF Downloads 385
5170 Genetic Algorithm Based Node Fault Detection and Recovery in Distributed Sensor Networks

Authors: N. Nalini, Lokesh B. Bhajantri

Abstract:

In Distributed Sensor Networks, the sensor nodes are prone to failure due to energy depletion and some other reasons. In this regard, fault tolerance of network is essential in distributed sensor environment. Energy efficiency, network or topology control and fault-tolerance are the most important issues in the development of next-generation Distributed Sensor Networks (DSNs). This paper proposes a node fault detection and recovery using Genetic Algorithm (GA) in DSN when some of the sensor nodes are faulty. The main objective of this work is to provide fault tolerance mechanism which is energy efficient and responsive to network using GA, which is used to detect the faulty nodes in the network based on the energy depletion of node and link failure between nodes. The proposed fault detection model is used to detect faults at node level and network level faults (link failure and packet error). Finally, the performance parameters for the proposed scheme are evaluated.

Keywords: distributed sensor networks, genetic algorithm, fault detection and recovery, information technology

Procedia PDF Downloads 414