Search results for: manage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1219

Search results for: manage

1069 Implementation of an Accessible State-Wide Trauma Education Program

Authors: Christine Lassen, Elizabeth Leonard, Matthew Oliver

Abstract:

The management of trauma is often complex and outcomes dependent on clinical expertise, effective teamwork, and a supported trauma system. The implementation of a statewide trauma education program should be accessible to all clinicians who manage trauma, but this can be challenging due to diverse individual needs, trauma service needs and geography. The NSW Institute of Trauma and Injury Management (ITIM) is a government funded body, responsible for coordinating and supporting the NSW Trauma System. The aim of this presentation is to describe how education initiatives have been implemented across the state. Simulation: In 2006, ITIM developed a Trauma Team Training Course - aimed to educate clinicians on the technical and non-technical skills required to manage trauma. The course is now independently coordinated by trauma services across the state at major trauma centres as well as in regional and rural hospitals. ITIM is currently in the process of re-evaluating and updating the Trauma Team Training Course to allow for the development of new resources and simulation scenarios. Trauma Education Evenings: In 2013, ITIM supported major trauma services to develop trauma education evenings which allowed the provision of free education to staff within the area health service and local area. The success of these local events expanded to regional hospitals. A total of 75 trauma education evenings have been conducted within NSW, with over 10,000 attendees. Wed-Based Resources: Recently, ITIM commenced free live streaming of the trauma education evenings which have now had over 3000 live views. The Trauma App developed in 2015 provides trauma clinicians with a centralised portal for trauma information and works on smartphones and tablets that integrate with the ITIM website. This supports pre-hospital and bedside clinical decisions and allows for trauma care to be more standardised, evidence-based, timely, and appropriate. Online e-Learning modules have been developed to assist clinicians, reduce unwarranted clinical variation and provide up to date evidence based education. The modules incorporate clinically focused education content with summative and formative assessments. Conclusion: Since 2005, ITIM has helped to facilitate the development of trauma education programs for doctors, nurses, pre-hospital and allied health clinicians. ITIM has been actively involved in more than 100 specialized trauma education programs, seminars and clinical workshops - attended by over 12,000 staff. The provision of state-wide trauma education is a challenging task requiring collaboration amongst numerous agencies working towards a common goal – to provide easily accessible trauma education.

Keywords: education, simulation, team-training, trauma

Procedia PDF Downloads 150
1068 Strategies for E-Waste Management: A Literature Review

Authors: Linh Thi Truc Doan, Yousef Amer, Sang-Heon Lee, Phan Nguyen Ky Phuc

Abstract:

During the last few decades, with the high-speed upgrade of electronic products, electronic waste (e-waste) has become one of the fastest growing wastes of the waste stream. In this context, more efforts and concerns have already been placed on the treatment and management of this waste. To mitigate their negative influences on the environment and society, it is necessary to establish appropriate strategies for e-waste management. Hence, this paper aims to review and analysis some useful strategies which have been applied in several countries to handle e-waste. Future perspectives on e-waste management are also suggested. The key findings found that, to manage e-waste successfully, it is necessary to establish effective reverse supply chains for e-waste, and raise public awareness towards the detrimental impacts of e-waste. The result of the research provides valuable insights to governments, policymakers in establishing e-waste management in a safe and sustainable manner.

Keywords: e-waste, e-waste management, life cycle assessment, recycling regulations

Procedia PDF Downloads 234
1067 Virtual Metering and Prediction of Heating, Ventilation, and Air Conditioning Systems Energy Consumption by Using Artificial Intelligence

Authors: Pooria Norouzi, Nicholas Tsang, Adam van der Goes, Joseph Yu, Douglas Zheng, Sirine Maleej

Abstract:

In this study, virtual meters will be designed and used for energy balance measurements of an air handling unit (AHU). The method aims to replace traditional physical sensors in heating, ventilation, and air conditioning (HVAC) systems with simulated virtual meters. Due to the inability to manage and monitor these systems, many HVAC systems have a high level of inefficiency and energy wastage. Virtual meters are implemented and applied in an actual HVAC system, and the result confirms the practicality of mathematical sensors for alternative energy measurement. While most residential buildings and offices are commonly not equipped with advanced sensors, adding, exploiting, and monitoring sensors and measurement devices in the existing systems can cost thousands of dollars. The first purpose of this study is to provide an energy consumption rate based on available sensors and without any physical energy meters. It proves the performance of virtual meters in HVAC systems as reliable measurement devices. To demonstrate this concept, mathematical models are created for AHU-07, located in building NE01 of the British Columbia Institute of Technology (BCIT) Burnaby campus. The models will be created and integrated with the system’s historical data and physical spot measurements. The actual measurements will be investigated to prove the models' accuracy. Based on preliminary analysis, the resulting mathematical models are successful in plotting energy consumption patterns, and it is concluded confidently that the results of the virtual meter will be close to the results that physical meters could achieve. In the second part of this study, the use of virtual meters is further assisted by artificial intelligence (AI) in the HVAC systems of building to improve energy management and efficiency. By the data mining approach, virtual meters’ data is recorded as historical data, and HVAC system energy consumption prediction is also implemented in order to harness great energy savings and manage the demand and supply chain effectively. Energy prediction can lead to energy-saving strategies and considerations that can open a window in predictive control in order to reach lower energy consumption. To solve these challenges, the energy prediction could optimize the HVAC system and automates energy consumption to capture savings. This study also investigates AI solutions possibility for autonomous HVAC efficiency that will allow quick and efficient response to energy consumption and cost spikes in the energy market.

Keywords: virtual meters, HVAC, artificial intelligence, energy consumption prediction

Procedia PDF Downloads 71
1066 Transmit Power Optimization for Cooperative Beamforming in Reverse-Link MIMO Ad-Hoc Networks

Authors: Younghyun Jeon, Seungjoo Maeng

Abstract:

In the Ad-hoc network, the great interests regarding MIMO scheme leads to their combination, which is also utilized into its applicable network. We manage the field of the problem into Reverse-link MIMO Ad-hoc Network (RMAN) and propose the methodology to maximize the data rate with its power consumption using Node-Cooperative beamforming technique. Based on the result of mathematical optimization formulation, we design the algorithm to construct optimal orthogonal weight vector according to channel feedback and control its transmission power according to QoS-pricing value level. In simulation results, we show the validity of the proposed mathematical optimization result and algorithm which mean that the sum-rate of each link is converged into some point.

Keywords: ad-hoc network, MIMO, cooperative beamforming, transmit power

Procedia PDF Downloads 358
1065 Servitization in Machine and Plant Engineering: Leveraging Generative AI for Effective Product Portfolio Management Amidst Disruptive Innovations

Authors: Till Gramberg

Abstract:

In the dynamic world of machine and plant engineering, stagnation in the growth of new product sales compels companies to reconsider their business models. The increasing shift toward service orientation, known as "servitization," along with challenges posed by digitalization and sustainability, necessitates an adaptation of product portfolio management (PPM). Against this backdrop, this study investigates the current challenges and requirements of PPM in this industrial context and develops a framework for the application of generative artificial intelligence (AI) to enhance agility and efficiency in PPM processes. The research approach of this study is based on a mixed-method design. Initially, qualitative interviews with industry experts were conducted to gain a deep understanding of the specific challenges and requirements in PPM. These interviews were analyzed using the Gioia method, painting a detailed picture of the existing issues and needs within the sector. This was complemented by a quantitative online survey. The combination of qualitative and quantitative research enabled a comprehensive understanding of the current challenges in the practical application of machine and plant engineering PPM. Based on these insights, a specific framework for the application of generative AI in PPM was developed. This framework aims to assist companies in implementing faster and more agile processes, systematically integrating dynamic requirements from trends such as digitalization and sustainability into their PPM process. Utilizing generative AI technologies, companies can more quickly identify and respond to trends and market changes, allowing for a more efficient and targeted adaptation of the product portfolio. The study emphasizes the importance of an agile and reactive approach to PPM in a rapidly changing environment. It demonstrates how generative AI can serve as a powerful tool to manage the complexity of a diversified and continually evolving product portfolio. The developed framework offers practical guidelines and strategies for companies to improve their PPM processes by leveraging the latest technological advancements while maintaining ecological and social responsibility. This paper significantly contributes to deepening the understanding of the application of generative AI in PPM and provides a framework for companies to manage their product portfolios more effectively and adapt to changing market conditions. The findings underscore the relevance of continuous adaptation and innovation in PPM strategies and demonstrate the potential of generative AI for proactive and future-oriented business management.

Keywords: servitization, product portfolio management, generative AI, disruptive innovation, machine and plant engineering

Procedia PDF Downloads 28
1064 Emotional, Behavioural and Social Development: Modality of Hierarchy of Needs in Supporting Parents with Special Needs

Authors: Fadzilah Abdul Rahman

Abstract:

Emotional development is developed between the parents and their child. Behavioural development is also developed between the parents and their child. Social Development is how parents can help their special needs child to adapt to society and to face challenges. In promoting a lifelong learning mindset, enhancing skill sets and readiness to face challenges, parents would be able to counter balance these challenges during their care giving process and better manage their expectations through understanding the hierarchy of needs modality towards a positive attitude, and in turn, improve their quality of life and participation in society. This paper aims to demonstrate how the hierarchy of needs can be applied in various situations of caregiving for parents with a special needs child.

Keywords: hierarchy of needs, parents, special needs, care-giving

Procedia PDF Downloads 347
1063 A Case from China on the Situation of Knowledge Management in Government

Authors: Qiaoyun Yang

Abstract:

Organizational scholars have paid enormous attention on how local governments manage their knowledge during the past two decades. Government knowledge management (KM) research recognizes that the management of knowledge flows and networks is critical to reforms on government service efficiency and the effect of administration. When dealing with complex affairs, all the limitations resulting from a lack of KM concept, processes and technologies among all the involved organizations begin to be exposed and further compound the processing difficulty of the affair. As a result, the challenges for individual or group knowledge sharing, knowledge digging and organizations’ collaboration in government's activities are diverse and immense. This analysis presents recent situation of government KM in China drawing from a total of more than 300 questionnaires and highlights important challenges that remain. The causes of the lapses in KM processes within and across the government agencies are discussed.

Keywords: KM processes, KM technologies, government, KM situation

Procedia PDF Downloads 327
1062 The Use of a Geographical Information System in the Field of Irrigation (Moyen-Chéliff)

Authors: Benhenni Abdellaziz

Abstract:

Irrigation is a limiting factor for agricultural production and socioeconomic development of many countries in the arid and semi-arid world. However, the sustainability of irrigation systems requires rational management of the water resource, which is becoming increasingly rare in these regions. The objective of this work is to apply a geographic information system (GIS) coupled with a model for calculating crop water requirements (CROPWATER) for the management of irrigation water in irrigated areas and offer managers an effective tool to better manage water resources in these areas. The application area of GIS is the irrigated perimeter of Western Middle Cheliff, which is located in a semi-arid region (Middle Cheliff). The scope in question is considerable agrarian dynamics and an increased need for irrigation of most crops.

Keywords: GIS, CROPWAT, irrigation, water management, middle cheliff

Procedia PDF Downloads 35
1061 The Use of a Geographical Information System in the Field of Irrigation (Moyen-Chéliff)

Authors: Benhenni Abdellaziz

Abstract:

Irrigation is a limiting factor for agricultural production and socio-economic development of many countries in arid and semiarid in the world. However, the sustainability of irrigation systems requires a rational management of the water resource that is becoming increasingly rare in these regions. The objective of this work is to apply a geographic information system (GIS) coupled to a model for calculating crop water requirements (CROPWATER) for the management of irrigation water in irrigated area and offer managers with an effective tool to better manage water resources in these areas. The application area of GIS is the irrigated perimeter of Western Middle Cheliff which is located in a semi-arid region (Middle Cheliff). The scope in question is a considerable agrarian dynamics and an increased need for irrigation of most crops.

Keywords: geographical information, irrigation, economical, use rational

Procedia PDF Downloads 213
1060 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 548
1059 The Application of Modern Technologies in Urban Development

Authors: Solotan A. Tolulope

Abstract:

Due to the lack of application of laws, implementers' acquaintance with the principles of urban planning, or the absence of laws and the governmental role, cities and their urban growth developed more than the fundamental designs and plans. This has led to a lack of foundations and criteria for achieving a life that provides the needs of sufficient housing in urban planning. In this study, we attempted to use cutting-edge innovations and technology to manage and resolve issues while collaborating with planning cadres that have the potential to significantly and favorably impact urban development. This helps to enhance management's function and the effectiveness of urban planning and management. To fulfill the needs of the community and the neighborhoods of these cities, modern approaches and technologies are used, addressing the criteria of sustainability and development. To put the notion of urban sustainability and development into action, this has been researched using global experiences.

Keywords: application, modern, technologies, urban, development

Procedia PDF Downloads 51
1058 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 111
1057 A Pedagogical Study of Computational Design in a Simulated Building Information Modeling-Cloud Environment

Authors: Jaehwan Jung, Sung-Ah Kim

Abstract:

Building Information Modeling (BIM) provides project stakeholders with various information about property and geometry of entire component as a 3D object-based parametric building model. BIM represents a set of Information and solutions that are expected to improve collaborative work process and quality of the building design. To improve collaboration among project participants, the BIM model should provide the necessary information to remote participants in real time and manage the information in the process. The purpose of this paper is to propose a process model that can apply effective architectural design collaborative work process in architectural design education in BIM-Cloud environment.

Keywords: BIM, cloud computing, collaborative design, digital design education

Procedia PDF Downloads 396
1056 A Survey Study Exploring Principal Leadership and Teachers’ Expectations in the Social Working Life of Two Swedish Schools

Authors: Anette Forssten Seiser, Ulf Blossing, Mats Ekholm

Abstract:

The expectation on principals to manage, lead and develop their schools and teachers are high. However, principals are not left alone without guidelines. Policy texts, curricula and syllabuses guide the orientation of their leadership. Moreover, principals’ traits and experience as well as professional norms, are decisive. However, in this study we argue for the importance to deepen the knowledge of how the practice of leadership is shaped in the daily social working life with the teachers at the school. Teachers’ experiences and expectations of leadership influence the principal’s actions, sometimes perhaps contrary to what is emphasized in official texts like the central guidelines. The expectations of teachers make up the norms of the school and thus constitute the local school culture. The aim of this study is to deepen the knowledge of teachers’ expectations on their principals to manage, lead and develop their schools. Two questions are used to guide the study: 1) How do teachers’ and principals’ expectations differ in realistic situations? 2) How do teachers’ experience-based expectations differ from more ideal expectations? To investigate teachers’ expectations of their principals, we use a social psychological perspective framed within an organisational development perspective. A social role is defined by the fact that, within the framework of the role, different people who fulfil the same role exhibit greater similarities than differences in their actions. The way a social role is exercised depends on the expectations placed on the role’s position but also on the expectations of the function of the role. The way in which the social role is embodied in practice also depends on how the person fulfilling the role perceives and understands those expectations. Based on interviews with school principals a questionnaire was constructed. Nine possible real-life and critical incidents were described that are important when it comes to role shaping in the dynamics between teachers and principals. Teachers were asked to make a choice between three, four, or five possible and realistic courses of action for the principal. The teachers were also asked to make two choices between these different options in real-life situations, one ideal as if they were working as a principal themselves, and one experience based – how they estimated that their own principal would act in such a situation. The sample consist of two elementary schools in Sweden. School A consists of two principals and 38 teachers and school B of two principals and 22 teachers. The response rate among the teachers is 95 percent in school A and 86 percent in school B. All four principals answered our questions. The results show that the expectations of teachers and principals can be understood as variations of being harmonic or disharmonic. The harmonic expectations can be interpreted to lead to an attuned leadership, while the disharmonic expectations lead to a more tensed leadership. Harmonious expectations and an attuned leadership are prominent. The results are compared to earlier research on leadership. Attuned and more tensed leadership are discussed in relation to school development and future research.

Keywords: critical incidents, principal leadership, school culture, school development, teachers' expectations

Procedia PDF Downloads 67
1055 Artificial Intelligence Approach to Manage Human Resources Information System Process in the Construction Industry

Authors: Ahmed Emad Ahmed

Abstract:

This paper aims to address the concept of human resources information systems (HRIS) and how to link it to new technologies such as artificial intelligence (AI) to be implemented in two human resources processes. A literature view has been collected to cover the main points related to HRIS, AI, and BC. A study case has been presented by generating a random HRIS to apply some AI operations to it. Then, an algorithm was applied to the database to complete some human resources processes, including training and performance appraisal, using a pre-trained AI model. After that, outputs and results have been presented and discussed briefly. Finally, a conclusion has been introduced to show the ability of new technologies such as AI and ML to be applied to the human resources management processes.

Keywords: human resources new technologies, HR artificial intelligence, HRIS AI models, construction AI HRIS

Procedia PDF Downloads 127
1054 Curriculum Check in Industrial Design, Based on Knowledge Management in Iran Universities

Authors: Maryam Mostafaee, Hassan Sadeghi Naeini, Sara Mostowfi

Abstract:

Today’s Knowledge management (KM), plays an important role in organizations. Basically, knowledge management is in the relation of using it for taking advantage of work forces in an organization for forwarding the goals and demand of that organization used at the most. The purpose of knowledge management is not only to manage existing documentation, information, and Data through an organization, but the most important part of KM is to control most important and key factor of those information and Data. For sure it is to chase the information needed for the employees in the right time of needed to take from genuine source for bringing out the best performance and result then in this matter the performance of organization will be at most of it. There are a lot of definitions over the objective of management released. Management is the science that in force the accurate knowledge with repeating to the organization to shape it and take full advantages for reaching goals and targets in the organization to be used by employees and users, but the definition of Knowledge based on Kalinz dictionary is: Facts, emotions or experiences known by man or group of people is ‘ knowledge ‘: Based on the Merriam Webster Dictionary: the act or skill of controlling and making decision about a business, department, sport team, etc, based on the Oxford Dictionary: Efficient handling of information and resources within a commercial organization, and based on the Oxford Dictionary: The art or process of designing manufactured products: the scale is a beautiful work of industrial design. When knowledge management performed executive in universities, discovery and create a new knowledge be facilitated. Make procedures between different units for knowledge exchange. College's officials and employees understand the importance of knowledge for University's success and will make more efforts to prevent the errors. In this strategy, is explored factors and affective trends and manage of it in University. In this research, Iranian universities for a time being analyzed that over usage of knowledge management, how they are behaving and having understood this matter: 1. Discovery of knowledge management in Iranian Universities, 2. Transferring exciting knowledge between faculties and unites, 3. Participate of employees for getting and using and transferring knowledge, 4.The accessibility of valid sources, 5. Researching over factors and correct processes in the university. We are pointing in some examples that we have already analyzed which is: -Enabling better and faster decision-making, -Making it easy to find relevant information and resources, -Reusing ideas, documents, and expertise, -Avoiding redundant effort. Consequence: It is found that effectiveness of knowledge management in the Industrial design field is low. Based on filled checklist by Education officials and professors in universities, and coefficient of effectiveness Calculate, knowledge management could not get the right place.

Keywords: knowledge management, industrial design, educational curriculum, learning performance

Procedia PDF Downloads 337
1053 Access to Education and Adopted Identity of the Rohingya Amid Government Restrictions in Bangladesh

Authors: Ishrat Zakia Sultana

Abstract:

The consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma resulted four major influxes of the Rohingya people to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving a huge number of the Rohingya, one of the fundamental human rights of the Rohingya – education – has never been fulfilled in Bangladesh. The Ministry of Disaster Management and Relief of the government of Bangladesh has been looking after the Rohingya and managing various programs for the Rohingya. On its website, the Ministry claims that it provides the basic supports/services to the Rohingya, including providing education. In practice, however, education for the Rohingya include only the provisions for registered Rohingya refugees – who are a very small number of populations among the entire Rohingya hosted in Bangladesh – and that is only up to grade 7 within the registered camps at Teknaf and Ukhia of Cox’s Bazar district of the country. There is no answer of the question, ‘What’s next’? Although refugees in Canada, Sudan, Turkey and other countries have been allowed to go to mainstream schools, Rohingya refugees in Bangladesh are not allowed to do so legally. Due to the lack of proof of nationality of the Rohingya, the government of Bangladesh imposes restrictions on their access to Bangladeshi schools. However, despite their vulnerability and statelessness, many Rohingyas are desperate to pursue education outside the camps and find their own way not only within Cox’s Bazar but also even in the capital city of the country. But they must hide their refugee identity to accomplish this. My research aims to explore how they manage to get admission amid government restrictions on their access to education in the mainstream institutions in Bangladesh. It will reveal how Rohingya people use adopted identity to get access to education in Bangladesh, and how they apply their own techniques to achieve their goals without having government approved identity. This research examined the strategies the Rohingya applied to manage documents related to their identity to ensure their admission to Bangladeshi education institutions – in schools, colleges, and universities. The research employed a qualitative approach. It used semi structured individual interviews and Focused Group Discussions (FGDs) with 20 male and female Rohingya refugees who are 18 years old and above, and have enrolled in Bangladeshi education institutions with adopted identity. Also I interviewed 5 local community members and policy makers to understand their perceptions and roles in this process. The findings of this research will allow the policy makers to rethink the outcomes of the restrictions on Rohingya’s education in Bangladesh, the ramifications of the denial of Rohingya’s access to education, and initiate policy dialogues on how to allow Rohingya refugees to pursue education in Bangladesh in legal way.

Keywords: Rohingya, Refugee, Bangladesh, Education

Procedia PDF Downloads 29
1052 Application of Unmanned Aerial Vehicle in Geohazard Mapping: Case Study Dominica

Authors: Michael Mickson

Abstract:

The recent development of unmanned aerial vehicles (UAVs) has been increasing the number of technical solutions that can be used to identify, map, and manage the effects of geohazards. UAVs are generally cheaper and more versatile than traditional remote-sensing techniques, and they can be therefore considered as a good alternative for the acquisition of imagery and other remote sensing data before, during and after a natural hazard event. This study aims to use UAV for investigating areas susceptible to high mobility flows such as debris flow in Dominica, especially after the 2017 Hurricane Maria. The use of UAVs in identifying, mapping and managing of natural hazards helps to mitigate the negative effects of natural hazards on livelihood, properties and the built environment.

Keywords: unmanned aerial vehicle (UAV), geohazards, remote sensing, mapping, Dominica

Procedia PDF Downloads 86
1051 Considering Partially Developed Artifacts in Change Impact Analysis Implementation

Authors: Nazri Kama, Sufyan Basri, Roslina Ibrahim

Abstract:

It is important to manage the changes in the software to meet the evolving needs of the customer. Accepting too many changes causes delay in the completion and it incurs additional cost. One type of information that helps to make the decision is through change impact analysis. Current impact analysis approaches assume that all classes in the class artifact are completely developed and the class artifact is used as a source of analysis. However, these assumptions are impractical for impact analysis in the software development phase as some classes in the class artifact are still under development or partially developed that leads to inaccuracy. This paper presents a novel impact analysis approach to be used in the software development phase. The significant achievements of the approach are demonstrated through an extensive experimental validation using three case studies.

Keywords: software development, impact analysis, traceability, static analysis.

Procedia PDF Downloads 576
1050 Price Control: A Comprehensive Step to Control Corruption in the Society

Authors: Muhammad Zia Ullah Baig, Atiq Uz Zama

Abstract:

The motivation of the project is to facilitate the governance body, as well as the common man in his/her daily life consuming product rates, to easily monitor the expense, to control the budget with the help of single SMS (message), e-mail facility, and to manage governance body by task management system. The system will also be capable of finding irregularities being done by the concerned department in mitigating the complaints generated by the customer and also provide a solution to overcome problems. We are building a system that easily controls the price control system of any country, we will feeling proud to give this system free of cost to Indian Government also. The system is able to easily manage and control the price control department of government all over the country. Price control department run in different cities under City District Government, so the system easily run in different cities with different SMS Code and decentralize Database ensure the non-functional requirement of system (scalability, reliability, availability, security, safety). The customer request for the government official price list with respect to his/her city SMS code (price list of all city available on website or application), the server will forward the price list through a SMS, if the product is not available according to the price list the customer generate a complaint through an SMS or using website/smartphone application, complaint is registered in complaint database and forward to inspection department when the complaint is entertained, the inspection department will forward a message about the complaint to customer. Inspection department physically checks the seller who does not follow the price list, but the major issue of the system is corruption, may be inspection officer will take a bribe and resolve the complaint (complaint is fake) in that case the customer will not use the system. The major issue of the system is to distinguish the fake and real complain and fight for corruption in the department. To counter the corruption, our strategy is to rank the complain if the same type of complaint is generated the complaint is in high rank and the higher authority will also notify about that complain, now the higher authority of department have reviewed the complaint and its history, the officer who resolve that complaint in past and the action against the complaint, these data will help in decision-making process, if the complaint was resolved because the officer takes bribe, the higher authority will take action against that officer. When the price of any good is decided the market/former representative is also there, with the mutual understanding of both party the price is decided, the system facilitate the decision-making process. The system shows the price history of any goods, inflation rate, available supply, demand, and the gap between supply and demand, these data will help to allot for the decision-making process.

Keywords: price control, goods, government, inspection, department, customer, employees

Procedia PDF Downloads 383
1049 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 119
1048 A Schema of Building an Efficient Quality Gate throughout the Software Development with Tools

Authors: Le Chen

Abstract:

This paper presents an efficient tool platform scheme to ensure quality protection throughout the software development process. The main principle is to manage the information of requirements, design, development, testing, operation and maintenance process with proper tools, and to set up the quality standards of each process. Through the tools’ display and summary of quality standards, the quality standards can be visualizad and ready for policy decision, which is called Quality Gate in this paper. In addition, the tools are also integrated to achieve the exchange and relation of information which highly improving operational efficiency. In this paper, the feasibility of the scheme is verified by practical application of development projects, and the overall information display and data mining are proposed to be further improved.

Keywords: efficiency, quality gate, software process, tools

Procedia PDF Downloads 328
1047 Homoeopathy with Integrative Approach in the World of Attention Deficit Hyperactivity Disorder

Authors: Mansi Chinchanikar

Abstract:

Homoeopathy is the second most widely used medical system in the world, yet the homoeopaths of India and around the world are sick of reading or hearing about how homoeopathy is only a placebo effect and cannot cure or even manage any disease. However, individuals making such unfounded claims should explain to the group how a homoeopathic placebo, particularly one for a neurodevelopmental disease like Attention Deficit Hyperactivity Disorder (ADHD), can be effective in children, with studies to back it up their skeptics. This literary review work exhibits how homoeopathy with a multimodal approach may show a considerable proportion of ADHD patients in India and throughout the world successfully manageable and treatable according to growing study evidence, ruling out the hazardous conventional medicines. Indeed, homeopathy can help cure ADHD symptoms either on its own or in combination with other types of integrative systems.

Keywords: ADHD, adult ADHD, homoeopathy, integrative approach

Procedia PDF Downloads 44
1046 Customer Satisfaction for Integrated Marketing Communication in Department Store Chiang Mai Province

Authors: Teerapong Chaisen, Pornpan Puttaraksa, Chayanit Chitchai, Peeraya Somsak, Rinyaphat Kecharananta

Abstract:

This paper aims to study integrated marketing communication (IMC) of department store in Chiang Mai with the object to understand how department stores manage communication in order to inform customer and how customers react to the received information. We study the example of 300 customers both Thai and foreigners who received the given information from the department stores and the reactions of these customers. This paper shows Central festival is the top destination to visit for Thai customers. On the other hand, Central Plaza is favored by foreign customers. However, all department stores need to use more IMC to make awareness for customer.

Keywords: integrated marketing communication, satisfaction, department store, consumer

Procedia PDF Downloads 288
1045 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 362
1044 Decision Support System for Tourism in Northern Part of Thailand

Authors: Katejarinporn Chaiya, Thawit Janbanklong

Abstract:

The purposes of this study were to design and find users’ satisfaction after using the decision support system for tourism in the Northern part of Thailand, which can provide tourists with touristic information and plan their personal voyage. Such information can be retrieved systematically based on personal budget and provinces. The samples of this study were five experts and users: 30 "white collars" in Bangkok. This decision support system was designed via ASP.NET. Its database was developed by using MySQL, for administrators to effectively manage the database. The application outcome revealed that the innovation works properly as sought in objectives. Specialists and white collars in Bangkok have evaluated the decision support system; the result was satisfactorily positive.

Keywords: decision Support System, ASP.NET, MySQL, white collars

Procedia PDF Downloads 326
1043 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 56
1042 The Self-Care During Pregnancy of Muslim Adolescents in Southern Border Provinces, Thailand

Authors: Benyapa Thitimapong, Najwa Niyomdecha

Abstract:

This qualitative descriptive research aimed to explore the self-care experiences during pregnancy of Muslim adolescents. Twenty participants were first-time Muslim mothers who had pregnancy experienceห under 20 years of age in three Southern border provinces of Thailand. Participants were selected by purposive sampling with inclusion criteria. Data were collected from the in-depth interview and analyzed using content analysis. The findings revealed that Muslim pregnant adolescents take care of themselves in the context of combining self-care in an Islamic way and conventional medicine. There are 2 subthemes: 1) antenatal care with Tok Bidan and 2) health promotion during pregnancy. The finding will help to understand self-care during pregnancy of Muslim adolescents among three Southern border provinces and can apply to nurse educators as a guide to educate and manage an appropriate self-care program for Muslim pregnant adolescents based on cultural diversity.

Keywords: adolescents, muslim, pregnancy, selfcare

Procedia PDF Downloads 82
1041 A Decision Support System for Flight Disruptions Management

Authors: Burak Erkayman, Emin Gundogar, Hayrettin Evirgen, Murat Sarı

Abstract:

With the increasing competition in recent years, airline companies tend to manage their operations aiming fewer losses in a robust manner. Airline operations are complex operations and have the necessity of being performed just in time and more knock-on relevant elements in the event of a disruption. In this study a knowledge based decision support system is suggested and software is developed. The developed software includes knowledge bases which are based on expert experience and government regulations, model bases and data bases. The results of the suggested approach are presented and improvable aspects of the approach are discussed.

Keywords: knowledge based systems, irregular operations, decision support systems, flight disruptions management

Procedia PDF Downloads 277
1040 Rejoinders to the Expression of Reprimand among Jordanian Youth: A Pragmatic Study

Authors: Nisreen Al-Khawaldeh

Abstract:

The study investigates the expressions voiced by Jordanian youth as rejoinders to the expressions of reprimands. It also explores the impact sociocultural variables exert on such types of rejoinders. To our best knowledge, this study is the first of its kind. Despite the significance and sensitivity of such type of communicative act, there is a scarcity of research on it, and it has not been investigated in the Jordanian context. Data collected from observation of naturally occurring data. Data have been qualitatively and quantitatively analyzed in light of the rapport management approach (RMA). The analysis revealed different types of rejoinders, among which was the expression of apology, admitting responsibility, and trying to manage and fix the situation were the most used strategies. Variation in the types of strategies was attributed to the influence of the sociocultural variables. Promising ideas were recommended for future research.

Keywords: gender, rejoinder to reprimand, Jordanian youth, rapport management approach

Procedia PDF Downloads 161