Search results for: metro vendors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 193

Search results for: metro vendors

133 Anomaly Detection Based on System Log Data

Authors: M. Kamel, A. Hoayek, M. Batton-Hubert

Abstract:

With the increase of network virtualization and the disparity of vendors, the continuous monitoring and detection of anomalies cannot rely on static rules. An advanced analytical methodology is needed to discriminate between ordinary events and unusual anomalies. In this paper, we focus on log data (textual data), which is a crucial source of information for network performance. Then, we introduce an algorithm used as a pipeline to help with the pretreatment of such data, group it into patterns, and dynamically label each pattern as an anomaly or not. Such tools will provide users and experts with continuous real-time logs monitoring capability to detect anomalies and failures in the underlying system that can affect performance. An application of real-world data illustrates the algorithm.

Keywords: logs, anomaly detection, ML, scoring, NLP

Procedia PDF Downloads 61
132 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa

Authors: Blessings Masuku

Abstract:

This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.

Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance

Procedia PDF Downloads 34
131 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 60
130 When the Rubber Hits the Road: The Enactment of Well-Intentioned Language Policy in Digital vs. In Situ Spaces on Washington, DC Public Transportation

Authors: Austin Vander Wel, Katherin Vargas Henao

Abstract:

Washington, DC, is a city in which Spanish, along with several other minority languages, is prevalent not only among tourists but also those living within city limits. In response to this linguistic diversity and DC’s adoption of the Language Access Act in 2004, the Washington Metropolitan Area Transit Authority (WMATA) committed to addressing the need for equal linguistic representation and established a five-step plan to provide the best multilingual information possible for public transportation users. The current study, however, strongly suggests that this de jure policy does not align with the reality of Spanish’s representation on DC public transportation–although perhaps doing so in an unexpected way. In order to investigate Spanish’s de facto representation and how it contrasts with de jure policy, this study implements a linguistic landscapes methodology that takes critical language-policy as its theoretical framework (Tollefson, 2005). Specifically concerning de facto representation, it focuses on the discrepancies between digital spaces and the actual physical spaces through which users travel. These digital vs. in situ conditions are further analyzed by separately addressing aural and visual modalities. In digital spaces, data was collected from WMATA’s website (visual) and their bilingual hotline (aural). For in situ spaces, both bus and metro areas of DC public transportation were explored, with signs comprising the visual modality and recordings, driver announcements, and interactions with metro kiosk workers comprising the aural modality. While digital spaces were considered to successfully fulfill WMATA’s commitment to representing Spanish as outlined in the de jure policy, physical spaces show a large discrepancy between what is said and what is done, particularly regarding the bus system, in addition to the aural modality overall. These discrepancies in situ spaces place Spanish speakers at a clear disadvantage, demanding additional resources and knowledge on the part of residents with limited or no English proficiency in order to have equal access to this public good. Based on our critical language-policy analysis, while Spanish is represented as a right in the de jure policy, its implementation in situ clearly portrays Spanish as a problem since those seeking bilingual information can not expect it to be present when and where they need it most (Ruíz, 1984; Tollefson, 2005). This study concludes with practical, data-based steps to improve the current situation facing DC’s public transportation context and serves as a model for responding to inadequate enactment of de jure policy in other language policy settings.

Keywords: Urban landscape, language access, critical-language policy, spanish, public transportation

Procedia PDF Downloads 48
129 Intelligent Crowd Management Systems in Trains

Authors: Sai S. Hari, Shriram Ramanujam, Unnati Trivedi

Abstract:

The advent of mass transit systems like rail, metro, maglev, and various other rail based transport has pacified the requirement of public transport for the masses to a great extent. However, the abatement of the demand does not necessarily mean it is managed efficiently, eloquently or in an encapsulating manner. The primary problem identified that the one this paper seeks to solve is the dipsomaniac like manner in which the compartments are occupied. This problem is solved by using a comparison of an empty train and an occupied one. The pixel data of an occupied train is compared to the pixel data of an empty train. This is done using canny edge detection technique. After the comparison it intimates the passengers at the consecutive stops which compartments are not occupied or have low occupancy. Thus, redirecting them and preventing overcrowding.

Keywords: canny edge detection, comparison, encapsulation, redirection

Procedia PDF Downloads 302
128 Measures of Reliability and Transportation Quality on an Urban Rail Transit Network in Case of Links’ Capacities Loss

Authors: Jie Liu, Jinqu Cheng, Qiyuan Peng, Yong Yin

Abstract:

Urban rail transit (URT) plays a significant role in dealing with traffic congestion and environmental problems in cities. However, equipment failure and obstruction of links often lead to URT links’ capacities loss in daily operation. It affects the reliability and transport service quality of URT network seriously. In order to measure the influence of links’ capacities loss on reliability and transport service quality of URT network, passengers are divided into three categories in case of links’ capacities loss. Passengers in category 1 are less affected by the loss of links’ capacities. Their travel is reliable since their travel quality is not significantly reduced. Passengers in category 2 are affected by the loss of links’ capacities heavily. Their travel is not reliable since their travel quality is reduced seriously. However, passengers in category 2 still can travel on URT. Passengers in category 3 can not travel on URT because their travel paths’ passenger flow exceeds capacities. Their travel is not reliable. Thus, the proportion of passengers in category 1 whose travel is reliable is defined as reliability indicator of URT network. The transport service quality of URT network is related to passengers’ travel time, passengers’ transfer times and whether seats are available to passengers. The generalized travel cost is a comprehensive reflection of travel time, transfer times and travel comfort. Therefore, passengers’ average generalized travel cost is used as transport service quality indicator of URT network. The impact of links’ capacities loss on transport service quality of URT network is measured with passengers’ relative average generalized travel cost with and without links’ capacities loss. The proportion of the passengers affected by links and betweenness of links are used to determine the important links in URT network. The stochastic user equilibrium distribution model based on the improved logit model is used to determine passengers’ categories and calculate passengers’ generalized travel cost in case of links’ capacities loss, which is solved with method of successive weighted averages algorithm. The reliability and transport service quality indicators of URT network are calculated with the solution result. Taking Wuhan Metro as a case, the reliability and transport service quality of Wuhan metro network is measured with indicators and method proposed in this paper. The result shows that using the proportion of the passengers affected by links can identify important links effectively which have great influence on reliability and transport service quality of URT network; The important links are mostly connected to transfer stations and the passenger flow of important links is high; With the increase of number of failure links and the proportion of capacity loss, the reliability of the network keeps decreasing, the proportion of passengers in category 3 keeps increasing and the proportion of passengers in category 2 increases at first and then decreases; When the number of failure links and the proportion of capacity loss increased to a certain level, the decline of transport service quality is weakened.

Keywords: urban rail transit network, reliability, transport service quality, links’ capacities loss, important links

Procedia PDF Downloads 103
127 An Ontology for Semantic Enrichment of RFID Systems

Authors: Haitham S. Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, Kamilia Hosny

Abstract:

Radio Frequency Identification (RFID) has become a key technology in the margining concept of Internet of Things (IoT). Naturally, business applications would require the deployment of various RFID systems that are developed by different vendors and use various data formats. This heterogeneity poses a real challenge in developing large-scale IoT systems with RFID as integration is becoming very complex and challenging. Semantic integration is a key approach to deal with this challenge. To do so, ontology for RFID systems need to be developed in order to annotated semantically RFID systems, and hence, facilitate their integration. Accordingly, in this paper, we propose ontology for RFID systems. The proposed ontology can be used to semantically enrich RFID systems, and hence, improve their usage and reasoning. The usage of the proposed ontology is explained through a simple scenario in the health care domain.

Keywords: RFID, semantic technology, ontology, sparql query language, heterogeneity

Procedia PDF Downloads 439
126 Vendor Selection and Supply Quotas Determination by Using Revised Weighting Method and Multi-Objective Programming Methods

Authors: Tunjo Perič, Marin Fatović

Abstract:

In this paper a new methodology for vendor selection and supply quotas determination (VSSQD) is proposed. The problem of VSSQD is solved by the model that combines revised weighting method for determining the objective function coefficients, and a multiple objective linear programming (MOLP) method based on the cooperative game theory for VSSQD. The criteria used for VSSQD are: (1) purchase costs and (2) product quality supplied by individual vendors. The proposed methodology is tested on the example of flour purchase for a bakery with two decision makers.

Keywords: cooperative game theory, multiple objective linear programming, revised weighting method, vendor selection

Procedia PDF Downloads 328
125 Kosodum Tribal Dance Series, Series 1 Dhemsa and Rela: An Example of an Exceptional Inter-Organizational Cooperation for the Preservation of Tribal Dance Form

Authors: Vidya Meshram, Shrinivas Surpam, Akshay Kokode, Laxman Shedmake, Ramesh Parchake

Abstract:

Tribal dance form is an integral part of the tribal culture as they represent the traditional culture of the tribal community. This article provide the reasons for the need to preserve the tribal dance form of Indian tribal people as a part of the cultural heritage. This article describe our experience of co-ordination of three organization to conduct a dance performance of Gond Tribe artists in the Mumbai City. This is the part of the promotion of tribal artist at big platform, although the preservation and awareness of tribal dance form in the metro cities. This is an example of an exceptional Inter-Organizational Cooperation between Kosodum Welfare Private Limited, GondwanaJangomDhemsaRelaNrutya Dal &GondwanaMitraMandal, Mumbai, for the preservation of tribal dance form.

Keywords: tribal, art, culture, preservation

Procedia PDF Downloads 130
124 Antecedents of Online Trust Towards E-Retailers for Repeat Buyers: An Empirical Study in Indian Context

Authors: Prageet Aeron, Shilpi Jain

Abstract:

The present work explores the trust building mechanisms in the context of e-commerce vendors and reconciles trust as a cognitive as well as a knowledge-based mechanism in the framework which is developed. The paper conducts an empirical examination of the variables integrity, benevolence, and ability with trust as the dependent variable and propensity to trust as the mediating variable. Authors establish ability and integrity as primary antecedents as well as establish the central role of trust propensity in the online context for Indian buyers. Authors further identify that benevolence in the context of Indian buyers online behaviour seems insignificant, and this seems counter-intutive given the role of discounts in the Indian market. Lastly, authors conclude that the role of media and social influencers in building a perception of trust seems of little consequence.

Keywords: e-commerce, trust, e-retailers, propensity to trust

Procedia PDF Downloads 326
123 A Social Decision Support Mechanism for Group Purchasing

Authors: Lien-Fa Lin, Yung-Ming Li, Fu-Shun Hsieh

Abstract:

With the advancement of information technology and development of group commerce, people have obviously changed in their lifestyle. However, group commerce faces some challenging problems. The products or services provided by vendors do not satisfactorily reflect customers’ opinions, so that the sale and revenue of group commerce gradually become lower. On the other hand, the process for a formed customer group to reach group-purchasing consensus is time-consuming and the final decision is not the best choice for each group members. In this paper, we design a social decision support mechanism, by using group discussion message to recommend suitable options for group members and we consider social influence and personal preference to generate option ranking list. The proposed mechanism can enhance the group purchasing decision making efficiently and effectively and venders can provide group products or services according to the group option ranking list.

Keywords: social network, group decision, text mining, group commerce

Procedia PDF Downloads 460
122 Optimizing Usability Testing with Collaborative Method in an E-Commerce Ecosystem

Authors: Markandeya Kunchi

Abstract:

Usability testing (UT) is one of the vital steps in the User-centred design (UCD) process when designing a product. In an e-commerce ecosystem, UT becomes primary as new products, features, and services are launched very frequently. And, there are losses attached to the company if an unusable and inefficient product is put out to market and is rejected by customers. This paper tries to answer why UT is important in the product life-cycle of an E-commerce ecosystem. Secondary user research was conducted to find out work patterns, development methods, type of stakeholders, and technology constraints, etc. of a typical E-commerce company. Qualitative user interviews were conducted with product managers and designers to find out the structure, project planning, product management method and role of the design team in a mid-level company. The paper tries to address the usual apprehensions of the company to inculcate UT within the team. As well, it stresses upon factors like monetary resources, lack of usability expert, narrow timelines, and lack of understanding of higher management as some primary reasons. Outsourcing UT to vendors is also very prevalent with mid-level e-commerce companies, but it has its own severe repercussions like very little team involvement, huge cost, misinterpretation of the findings, elongated timelines, and lack of empathy towards the customer, etc. The shortfalls of the unavailability of a UT process in place within the team and conducting UT through vendors are bad user experiences for customers while interacting with the product, badly designed products which are neither useful and nor utilitarian. As a result, companies see dipping conversions rates in apps and websites, huge bounce rates and increased uninstall rates. Thus, there was a need for a more lean UT system in place which could solve all these issues for the company. This paper highlights on optimizing the UT process with a collaborative method. The degree of optimization and structure of collaborative method is the highlight of this paper. Collaborative method of UT is one in which the centralised design team of the company takes for conducting and analysing the UT. The UT is usually a formative kind where designers take findings into account and uses in the ideation process. The success of collaborative method of UT is due to its ability to sync with the product management method employed by the company or team. The collaborative methods focus on engaging various teams (design, marketing, product, administration, IT, etc.) each with its own defined roles and responsibility in conducting a smooth UT with users In-house. The paper finally highlights the positive results of collaborative UT method after conducting more than 100 In-lab interviews with users across the different lines of businesses. Some of which are the improvement of interaction between stakeholders and the design team, empathy towards users, improved design iteration, better sanity check of design solutions, optimization of time and money, effective and efficient design solution. The future scope of collaborative UT is to make this method leaner, by reducing the number of days to complete the entire project starting from planning between teams to publishing the UT report.

Keywords: collaborative method, e-commerce, product management method, usability testing

Procedia PDF Downloads 94
121 An Approach to Manage and Evaluate Asset Performance

Authors: Mohammed Saif Al-Saidi, John P. T. Mo

Abstract:

Modern engineering assets are complex and very high in value. They are expected to function for years to come, with ability to handle the change in technology and ageing modification. The aging of an engineering asset and continues increase of vendors and contractors numbers forces the asset operation management (or Owner) to design an asset system which can capture these changes. Furthermore, an accurate performance measurement and risk evaluation processes are highly needed. Therefore, this paper explores the nature of the asset management system performance evaluation for an engineering asset based on the System Support Engineering (SSE) principles. The research work explores the asset support system from a range of perspectives, interviewing managers from across a refinery organisation. The factors contributing to complexity of an asset management system are described in context which clusters them into several key areas. It is proposed that SSE framework may then be used as a tool for analysis and management of asset. The paper will conclude with discussion of potential application of the framework and opportunities for future research.

Keywords: asset management, performance, evaluation, modern engineering, System Support Engineering (SSE)

Procedia PDF Downloads 653
120 Flow Conservation Framework for Monitoring Software Defined Networks

Authors: Jesús Antonio Puente Fernández, Luis Javier Garcia Villalba

Abstract:

New trends on streaming videos such as series or films require a high demand of network resources. This fact results in a huge problem within traditional IP networks due to the rigidity of its architecture. In this way, Software Defined Networks (SDN) is a new concept of network architecture that intends to be more flexible and it simplifies the management in networks with respect to the existing ones. These aspects are possible due to the separation of control plane (controller) and data plane (switches). Taking the advantage of this separated control, it is easy to deploy a monitoring tool independent of device vendors since the existing ones are dependent on the installation of specialized and expensive hardware. In this paper, we propose a framework that optimizes the traffic monitoring in SDN networks that decreases the number of monitoring queries to improve the network traffic and also reduces the overload. The performed experiments (with and without the optimization) using a video streaming delivery between two hosts demonstrate the feasibility of our monitoring proposal.

Keywords: optimization, monitoring, software defined networking, statistics, query

Procedia PDF Downloads 295
119 A Comparative Evaluation on the Quality of Products and Quality of Services of the Five Selected Fast Food Restaurants in Manila

Authors: M. Pagasa Nanette Rotairo

Abstract:

The research focuses on the effectiveness, responsiveness, adequacy, and appropriateness of customer service of selected fast food restaurant using William Dunn’s four evaluation criteria tantamount to the focus of the research. Due to efficiency the fast food restaurants offer and the increasing demand for acquiring its services, the researcher conducted a study on the effectiveness of customer service of five popular restaurants in Metro Manila. Using descriptive method, the research is furthered in par with evaluation and implementation of different instruments effective for data gathering to further scientific judgment. Results of this research indicate that consumers consider the quality service as the major reason in patronizing fast food restaurants while they consider cleanliness and customer satisfaction as their least concern. Details of this study provided support on how the proposed operational model can further improve the services of fast food restaurants.

Keywords: customer satisfaction, customer service, restaurant management, business operations

Procedia PDF Downloads 184
118 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 97
117 Shield Tunnel Excavation Simulation of a Case Study Using a So-Called 'Stress Relaxation' Method

Authors: Shengwei Zhu, Alireza Afshani, Hirokazu Akagi

Abstract:

Ground surface settlement induced by shield tunneling is addressing increasing attention as shield tunneling becomes a popular construction technique for tunnels in urban areas. This paper discusses a 2D longitudinal FEM simulation of a tunneling case study in Japan (Tokyo Metro Yurakucho Line). Tunneling-induced field data was already collected and is used here for comparison and evaluating purposes. In this model, earth pressure, face pressure, backfilling grouting, elastic tunnel lining, and Mohr-Coulomb failure criterion for soil elements are considered. A method called ‘stress relaxation’ is also exploited to simulate the gradual tunneling excavation. Ground surface settlements obtained from numerical results using the introduced method are then compared with the measurement data.

Keywords: 2D longitudinal FEM model, tunneling case study, stress relaxation, shield tunneling excavation

Procedia PDF Downloads 307
116 Computed Tomography Brain and Inpatient Falls: An Audit Evaluating the Indications and Outcomes

Authors: Zain Khan, Steve Ahn, Kathy Monypenny, James Fink

Abstract:

In Australian public hospitals, there were approximately 34,000 reported inpatient falls between 2015 to 2016. The gold standard for diagnosing intracranial injury is non-contrast enhanced brain computed tomography (CTB). Over a three-month timeframe, a total of one hundred and eighty (180) falls were documented between the hours of 4pm and 8am at a large metro hospital. Only three (3) of these scans demonstrated a positive intra-cranial finding. The rationale for scanning varied. The common indications included a fall with head strike, the presence of blood thinning medication, loss of consciousness, reduced Glasgow Coma Scale (GCS), vomiting and new neurological findings. There are several validated tools to aid in decision-making around ordering CTB scans in the acute setting, but no such accepted tool exists for the inpatient space. With further data collection, spanning a greater length of time and through involving multiple centres, work can be done towards generating such a tool that can be utilized for inpatient falls.

Keywords: computed tomography, falls, inpatient, intracranial hemorrhage

Procedia PDF Downloads 138
115 Practices of Lean Manufacturing in the Autoparts: Brazilian Industry Overview

Authors: Guilherme Gorgulho, Carlos Roberto Camello Lima

Abstract:

Over the past five years between 2011 and 2015, the license plate of cars, light commercial vehicles, trucks and buses have suffered retraction. This sector's decline can be explained by economic and national policy in the Brazilian industry operates. In parallel to the reduction of sales and license plate of vehicles, their suppliers are also affected influencing its results, among these vendors, there is the auto parts sector. The existence of international companies, and featured strongly in Asia and Mexico due to low production costs, encourage companies to constantly seek continuous improvement and operational efficiency. Under this argument, the decision making based on lean manufacturing tools it is essential for the management of operations. The purpose of this article is to analyze between lean practices in Brazilian auto parts industries, through the application of a questionnaire with employees who practice lean thinking in organizations. The purpose is to confront the extracted data in the questionnaires, and debate on which of lean tools help organizations as a competitive advantage.

Keywords: autoparts, brazilian industry, lean practices, survey

Procedia PDF Downloads 295
114 Coconut Shells as the Alternative Equipment for Foot Reflexology

Authors: Nichanant Sermsri, Chananchida Yuktirat

Abstract:

This research was the experimental research. Its purpose was to find out how coconut shells can be adapted to be equipment for foot and calf reflexology. The sample group was 58 female street vendors in Thewet Market, Dusit District, Bangkok, selected by selection criteria and voluntary. The data collecting tool in this research was the Visual Analogue Scale. The massaging tool made from coconut shells (designed and produced by the research team) was the key equipment for this research. The duration of the research was 1 month. The research team assessed the level of exhaustion and heart rate among sample group before and after the massage, then analyzed the data by mean, standard deviation and paired sample t-test. We found out from the research that 1) The level of exhaustion decreased 4.529 levels after the massage. The standard deviation was 1.6195. The heart rates went down 11.67 times/minute. The standard deviation was 6.742. 2) The level of exhaustion and heart rate after the massage decreased with the statistically significance at 0.01.

Keywords: foot reflexology, massaging plate, coconut shells, ecological sciences

Procedia PDF Downloads 165
113 A Genetic Algorithm Based Ensemble Method with Pairwise Consensus Score on Malware Cacophonous Labels

Authors: Shih-Yu Wang, Shun-Wen Hsiao

Abstract:

In the field of cybersecurity, there exists many vendors giving malware samples classified results, namely naming after the label that contains some important information which is also called AV label. Lots of researchers relay on AV labels for research. Unfortunately, AV labels are too cluttered. They do not have a fixed format and fixed naming rules because the naming results were based on each classifiers' viewpoints. A way to fix the problem is taking a majority vote. However, voting can sometimes create problems of bias. Thus, we create a novel ensemble approach which does not rely on the cacophonous naming result but depend on group identification to aggregate everyone's opinion. To achieve this purpose, we develop an scoring system called Pairwise Consensus Score (PCS) to calculate result similarity. The entire method architecture combine Genetic Algorithm and PCS to find maximum consensus in the group. Experimental results revealed that our method outperformed the majority voting by 10% in term of the score.

Keywords: genetic algorithm, ensemble learning, malware family, malware labeling, AV labels

Procedia PDF Downloads 59
112 Unified Public Transportation System for Mumbai Using Radio Frequency Identification

Authors: Saurabh Parkhedkar, Rajanikant Tenguria

Abstract:

The paper proposes revamping the public transportation system in Mumbai with the use of Radio Frequency Identification (RFID) technology in order to provide better integration and compatibility across various modes of transport. In Mumbai, mass transport system suffers from poor inter-compatible ticketing system, subpar money collection techniques, and lack of planning for optimum utilization of resources. Development of suburbs and growth in population will result in growing demand for mass transportation networks. Hence, the growing demand for the already overburdened public transportation system is only going to worsen the scenario. Thus, a superior system is essential in order to regulate, manage and supervise future transportation needs. The proposed RFID based system integrates Mumbai Suburban Railway, BEST (Brihanmumbai Electric Supply and Transport Undertaking transport wing) Bus, Mumbai Monorail and Mumbai Metro systems into a Unified Public Transportation System (UPTS). The UTPS takes into account various drawbacks of the present day system and offers solution, suitable for the modern age Mumbai.

Keywords: urbanization, transportation, RFID, Mumbai, public transportation, smart city.

Procedia PDF Downloads 380
111 Examining Customer Acceptance of Chatbots in B2B Customer Service: A Factorial Survey

Authors: Kathrin Endres, Daniela Greven

Abstract:

Although chatbots are a widely known and established communication instrument in B2C customer services, B2B industries still hesitate to implement chatbots due to the incertitude of customer acceptance. While many studies examine the chatbot acceptance of B2C consumers, few studies are focusing on the B2B sector, where the customer is represented by a buying center consisting of several stakeholders. This study investigates the challenges of chatbot acceptance in B2B industries compared to challenges of chatbot acceptance from current B2C literature by interviewing experts from German chatbot vendors. The results show many similarities between the customer requirements of B2B customers and B2C consumers. Still, due to several stakeholders involved in the buying center, the features of the chatbot users are more diverse but obfuscated at the same time. Using a factorial survey, this study further examines the customer acceptance of varying situations of B2B chatbot designs based on the chatbot variables transparency, fault tolerance, complexity of products, value of products, as well as transfer to live chat service employees. The findings show that all variables influence the propensity to use the chatbot. The results contribute to a better understanding of how firms in B2B industries can design chatbots to advance their customer service and enhance customer satisfaction.

Keywords: chatbots, technology acceptance, B2B customer service, customer satisfaction

Procedia PDF Downloads 81
110 Between Dark and Light: The Construction and the Exclusion of Memory of Prison Heritage in Post-Soviet Period

Authors: Guo Cyuan Deng

Abstract:

This study represents how the Soviet-occupied dark memory in Baltic countries were interpreted and represented by examining the way of management of prison heritage. Based on the formulation of a dark-tourism spectrum which Philip Stone proposed, the Patarei prison in Estonia and the Karosta prison in Latvia are compared, and it is thought that both prisons, which had experienced similar colonial history, face different tourism operation in the present. The former is being run by NGO and remain the situation of “empty" by art intervening. However, the Estonia government attempt to get the operation of museum and transform it to anti-Soviet museum in order show national identity. By contrast, the latter is being managed by private company, whom transformed the prison to "dark fun factories" by entertainment activities in order to private capital accumulation. Moreover, it is not only indicated that both prisons exclude the minority's memory, but also the flaws of dark-tourism spectrum which divide the dark and light are discussed. Finally, given the nature and function of dark heritage, the concept "le métro" is used to supplement Stone's spectrum.

Keywords: dark tourism, prison heritage, Post-Soviet, Baltic countries, national identities

Procedia PDF Downloads 283
109 Flood Susceptibility Assessment of Mandaluyong City Using Analytic Hierarchy Process

Authors: Keigh D. Guinto, Ma. Romina M. Santos

Abstract:

One of the most catastrophic natural disasters in the Philippines is floods. Twelve (12) million people reside in Metro Manila, National Capital Region (NCR), prone to flooding. A flood can cause widespread devastation resulting in damaged properties and infrastructures and loss of life. By using the analytical hierarchy process, six (6) parameters were selected, namely elevation, slope, lithology, distance from the river, river network density, and flow accumulation. Ranking of these parameters demonstrates that distance from the river with 25.31% and river density with 17.30% ranked the highest causative factor to flooding. This is followed by flow accumulation with 16.72%, elevation with 15.33%, slope with 13.53%, and the least flood causative factor is lithology with 11.8%. The generated flood susceptibility map of Mandaluyong has three (3) classes: high susceptibility, moderate susceptibility, and low susceptibility. The flood susceptibility map generated in this study can be used as an aid for planning flood mitigation, land use planning, and general public awareness. This study can also be used for emergency management and can be applied in the disaster risk management of Mandaluyong.

Keywords: analytical hierarchy process, assessment, flood, geographic information system

Procedia PDF Downloads 162
108 Thai Perception on Litecoin Value

Authors: Toby Gibbs, Suwaree Yordchim

Abstract:

This research analyzes factors affecting the success of Litecoin Value within Thailand and develops a guideline for self-reliance for effective business implementation. Samples in this study included 119 people through surveys. The results revealed four main factors affecting the success as follows: 1) Future Career training should be pursued in applied Litecoin development. 2) Didn't grasp the concept of a digital currency or see the benefit of a digital currency. 3) There is a great need to educate the next generation of learners on the benefits of Litecoin within the community. 4) A great majority didn't know what Litecoin was. The guideline for self-reliance planning consisted of 4 aspects: 1) Development planning: by arranging meet up groups to conduct further education on Litecoin and share solutions on adoption into every day usage. Local communities need to develop awareness of the usefulness of Litecoin and share the value of Litecoin among friends and family. 2) Computer Science and Business Management staff should develop skills to expand on the benefits of Litecoin within their departments. 3) Further research should be pursued on how Litecoin Value can improve business and tourism within Thailand. 4) Local communities should focus on developing Litecoin awareness by encouraging street vendors to accept Litecoin as another form of payment for services rendered.

Keywords: litecoin, mining, confirmations, payment method

Procedia PDF Downloads 162
107 Maintaining Organizational Harmony: The Way Forward in Ghanaian Basic Schools

Authors: Dominic Kwaku Danso Mensah

Abstract:

The study examined conflict management strategies among head teachers and teachers in selected basic schools in Okai-Koi sub metro in the greater region of Ghana. In all, 270 participants were engaged in the study, comprising 237 teachers, 32 head teachers, and one officer in charge of the Metropolis. The study employed descriptive survey while using purposive and simple random sampling techniques to sample participants. Interview guides and questionnaires were the main instruments used for gathering primary data. The study found that conflict is inevitable in the schools. Conflicts in schools are usually subtle and hardly noticed by outsiders even though they occur on daily basis. The causes of conflict include among other things, high expectation from head teachers, inability to attain goals set, communication from head teachers and power struggle. The study found out that, in managing and resolving conflicts, issues such as identifying and focusing on the problem, building of trust and cooperation, clarifying goals and objectives were seen to be effective means of managing conflict and recommended that management should design and develop conflict management strategies to quickly resolve conflict.

Keywords: basic education, conflict management, organizational harmony, power

Procedia PDF Downloads 258
106 E-Government Continuance Intention of Media Psychology: Some Insights from Psychographic Characteristics

Authors: Azlina Binti Abu Bakar, Fahmi Zaidi Bin Abdul Razak, Wan Salihin Wong Abdullah

Abstract:

Psychographic is a psychological study of values, attitudes, interests and it is used mostly in prediction, opinion research and social research. This study predicts the influence of performance expectancy, effort expectancy, social influence and facilitating condition on e-government acceptance among Malaysian citizens. The survey responses of 543 e-government users have been validated and analyzed by means of covariance-based Structural Equation Modeling. The findings indicate that e-government acceptance among Malaysian citizens are mainly influenced by performance expectancy (β = 0.66, t = 11.53, p < 0.01) and social influence (β = 0.20, t = 4.23, p < 0.01). Surprisingly, there is no significant effect of facilitating condition and effort expectancy on e-government continuance intention (β = 0.01, t = 0.27, p > 0.05; β = -0.01, t = -0.40, p > 0.05). This study offers government and vendors a frame of reference to analyze citizen’s situation before initiating new innovations. In case of Malaysian e-government technology, adoption strategies should be built around fostering level of citizens’ technological expectation and social influence on e-government usage.

Keywords: continuance intention, Malaysian citizen, media psychology, structural equation modeling

Procedia PDF Downloads 288
105 Thai Perception on Bitcoin Value

Authors: Toby Gibbs, Suwaree Yordchim

Abstract:

This research analyzes factors affecting the success of Litecoin Value within Thailand and develops a guideline for self-reliance for effective business implementation. Samples in this study included 119 people through surveys. The results revealed four main factors affecting the success as follows: 1) Future Career training should be pursued in applied Litecoin development. 2) Didn't grasp the concept of a digital currency or see the benefit of a digital currency. 3) There is a great need to educate the next generation of learners on the benefits of Litecoin within the community. 4) A great majority didn't know what Litecoin was. The guideline for self-reliance planning consisted of 4 aspects: 1) Development planning: by arranging meet up groups to conduct further education on Litecoin and share solutions on adoption into every day usage. Local communities need to develop awareness of the usefulness of Litecoin and share the value of Litecoin among friends and family. 2) Computer Science and Business Management staff should develop skills to expand on the benefits of Litecoin within their departments. 3) Further research should be pursued on how Litecoin Value can improve business and tourism within Thailand. 4) Local communities should focus on developing Litecoin awareness by encouraging street vendors to accept Litecoin as another form of payment for services rendered.

Keywords: bitcoin, cryptocurrency, decentralized, business implementation

Procedia PDF Downloads 262
104 Gawa Gawa Lang ‘Yan: A Qualitative Study of the Perception of Mental Health between Generations X and Z in Metro Manila, Philippines

Authors: Pierre Angelo Alino, Rafael Alejandro Ang, Maria Carmela Espanol, Dominic Gerard Ferreol, Jendrietch Adrian Lopez

Abstract:

This study aims to explore the differences in perception between Generation X and Generation Z towards mental health and mental health illnesses. Through this study, the researchers seek to identify and explore the differences that exist in the generational perception and determine the possible factors that influence the difference in perception. In order to achieve this, we conducted two focus group discussions (FGD), one composed of Generation X and the other composed of Generation Z. Participants for both focus group discussions were recruited through purposive sampling and online recruitment methods. In these discussions, they were asked questions relating to their personal history, experiences with mental health, and related illnesses, as well as their opinions regarding the subject matter. Afterwhich, we analyzed our data through a thematic analysis. Our study’s findings indicate notable differences in the perception of mental health as well as mental illness between the members of Generations X and Z. Additionally, factors such as culture, personal history, and intimate relationships influence the perceptions of mental health between generation groups.

Keywords: generational difference, mental health, mental health illness, perception

Procedia PDF Downloads 160