Search results for: pull Request
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 401

Search results for: pull Request

161 Pull String to Stop: Public Utility Vehicle Modernization Program

Authors: Frederick Kobe O. Obar, Preity B. Quinzon, Trisha B. Tumbokon, Mario Joshua D. Marron, Kenichi Katsuo Kichiro A. Rimorin

Abstract:

The Public Utility Vehicle Modernization Program (PUVMP) is a program meant to reform the current state of the Philippines’ public transportation sector. This study determined the impact of the Public Utility Vehicle Modernization Program on San Fernando City, La Union's jeepney drivers, interviewing six individuals, three with traditional vehicles and three with modernized units. This study used a descriptive qualitative research design and employed purposive sampling to select the six participants suited for the study, who were then subjected to a semi-structured face-to-face interview. The gathered data was then analyzed through thematic analysis. The findings highlighted evidence that the jeepney drivers experienced abrupt and prevailing changes in their routine and in their everyday work. This study concludes that while the sentiment of the program was appreciated, it has changed the environment for jeepney drivers drastically, provoking many reactions. These changes have, of course, shifted the daily lives of the jeepney drivers significantly, but through adaptability, they found ways. Recommendations include flexible compliance policies, educational initiatives, and support for drivers, providing valuable insights for informed decision-making in the ongoing transportation modernization discussion. This study concluded that while the drivers are not opposed to reform, they are not entirely in approval of the current effects of the program as it is being implemented in their local area.

Keywords: transport reform, transport modernization, public transport, jeepney drivers, PUVMP, urban planning, public utility vehicles

Procedia PDF Downloads 26
160 MLProxy: SLA-Aware Reverse Proxy for Machine Learning Inference Serving on Serverless Computing Platforms

Authors: Nima Mahmoudi, Hamzeh Khazaei

Abstract:

Serving machine learning inference workloads on the cloud is still a challenging task at the production level. The optimal configuration of the inference workload to meet SLA requirements while optimizing the infrastructure costs is highly complicated due to the complex interaction between batch configuration, resource configurations, and variable arrival process. Serverless computing has emerged in recent years to automate most infrastructure management tasks. Workload batching has revealed the potential to improve the response time and cost-effectiveness of machine learning serving workloads. However, it has not yet been supported out of the box by serverless computing platforms. Our experiments have shown that for various machine learning workloads, batching can hugely improve the system’s efficiency by reducing the processing overhead per request. In this work, we present MLProxy, an adaptive reverse proxy to support efficient machine learning serving workloads on serverless computing systems. MLProxy supports adaptive batching to ensure SLA compliance while optimizing serverless costs. We performed rigorous experiments on Knative to demonstrate the effectiveness of MLProxy. We showed that MLProxy could reduce the cost of serverless deployment by up to 92% while reducing SLA violations by up to 99% that can be generalized across state-of-the-art model serving frameworks.

Keywords: serverless computing, machine learning, inference serving, Knative, google cloud run, optimization

Procedia PDF Downloads 135
159 Supply Chain Resource Optimization Model for E-Commerce Pure Players

Authors: Zair Firdaous, Fourka Mohamed, Elfelsoufi Zoubir

Abstract:

The arrival of e-commerce has changed the supply chain management on the operational level as well as on the organization and strategic and even tactical decisions of the companies. The optimization of resources is an issue that is needed on the tactical and operational strategic plan. This work considers the allocation of resources in the case of pure players that have launched online sales. The aim is to improve the level of customer satisfaction and maintaining the benefits of e-retailer and of its cooperators and reducing costs and risks. We first modeled the B2C chain with all operations that integrates and possible scenarios since online retailers offer a wide selection of personalized service. The personalized services that online shopping companies offer to the clients can be embodied in many aspects, such as the customizations of payment, the distribution methods, and after-sales service choices. Every aspect of customized service has several modes. At that time, we analyzed the optimization problems of supply chain resource in customized online shopping service mode. Then, we realized an optimization model and algorithm for the development based on the analysis of the of the B2C supply chain resources. It is a multi-objective optimization that considers the collaboration of resources in operations, time and costs but also the risks and the quality of services as well as dynamic and uncertain characters related to the request.

Keywords: supply chain resource, e-commerce, pure-players, optimization

Procedia PDF Downloads 227
158 The Effects of T-Walls on Urban Landscape and Quality of Life and Anti-Terror Design Concept in Kabul, Afghanistan

Authors: Fakhrullah Sarwari, Hiroko Ono

Abstract:

Kabul city has suffered a lot in 40 years of conflict of civil war and “The war on terror”. After the invasion of Afghanistan by the United States of America and its allies in 2001, the Taliban was removed from operational power, but The Taliban and other terrorist groups remained in remote areas of the country, they started suicide attacks and bombings. Hence to protect from these attacks officials surrounded their office buildings and houses with concrete blast walls. It gives a bad landscape to the city and creates traffic congestions. Our research contains; questionnaire, reviewing Kabul Municipality documents and literature review. Questionnaires were distributed to Kabul citizens to find out how people feel by seeing the T-Walls on Kabul streets? And what problems they face with T-Walls. “The T-Walls pull down commission” of Kabul Municipality documents were reviewed to find out what caused the failure of this commission. A literature review has been done to compare Kabul with Washington D.C on how they designed the city against terrorism threat without turning the cities into lock down. Bogota city of Columbia urban happiness movement is reviewed and compared with Kabul. The finding of research revealed that citizens of Kabul want security but not at the expense of public realm and creating the architecture of fear. It also indicates that increasing the T-walls do not give secure feeling but instead; it increases terror, hatred and affect people’s optimism. At the end, a series of recommendation is suggested on the issue.

Keywords: anti-terror design, Kabul, T-Walls, urban happiness

Procedia PDF Downloads 129
157 Simulation of Lean Principles Impact in a Multi-Product Supply Chain

Authors: Matteo Rossini, Alberto Portioli Staudacher

Abstract:

The market competition is moving from the single firm to the whole supply chain one because of increasing competition and growing need for operational efficiencies and customer orientation. Supply chain management allows companies to look beyond their organizational boundaries to develop and leverage resources and capabilities of their supply chain partners. This leads to create competitive advantages in the marketplace and because of this SCM has acquired strategic importance. Lean Approach is a management strategy that focuses on reducing every type of waste present in an organization. This approach is becoming more and more popular among supply chain managers. The supply chain application of lean approach is low diffused. It is not well studied which are the impacts of lean approach principles in a supply chain context. In literature there are only few studies simulating the lean approach performance in single products supply chain. This research work studies the impacts of lean principles implementation along a supply chain. To achieve this, a simulation model of a three-echelon multiproduct product supply chain has been built. Kanban system (and several priority policies) and setup time reduction degrees are implemented in the lean-configured supply chain to apply pull and lot-sizing decrease principles respectively. To evaluate the benefits of lean approach, lean supply chain is compared with an EOQ-configured supply chain. The simulation results show that Kanban system and setup-time reduction improve inventory stock level. They also show that logistics efforts are affected to lean implementation degree. The paper concludes describing performances of lean supply chain in different contexts.

Keywords: inventory policy, Kanban, lean supply chain, simulation study, supply chain management, planning

Procedia PDF Downloads 331
156 Sexual Health and Sexual Risk Behavior of the Youth with HIV Positive in Northeastern Part, Thailand

Authors: Orathai Srithongtham, Ubonsri Thabuddha

Abstract:

The youth with HIV positive is not difference from the general youth in term of sexual needs. Sexual health is crucial the most to support the youth with HIV positive to be sexual well-being. This study aims to elucidate the sexual health on protection from STDs (Sexual Transmitted Diseases) and HIV transmission and to explain sexual risk behavior of the youth with HIV positive. The target group was the youth with HIV positive about 23 cases from two provinces in northeastern part of Thailand. Qualitative method was applied for collecting data by in-depth interview. Content analysis was use for data analysis. The youth with HIV positive was protection from STDs and HIV transmission by using the condom during sexual activity. The reason to deny the condom use were ashamed, condom is not a part of life, no have fit size, and the youth fear to stigmatized as a mental disorder and fear to stigmatized as going to fuck someone. The youth who trust with nurse in clinic was dare to request the condom by face. Sexual activity without condom use is sexual risk behavior. The major causes were couple trust and the sexual enjoyment first and sexual active competition with friend without condom use. The concern on HIV was the boyfriend or girlfriend not accepts the HIV positive people, worry about the HIV transmutation, and finally not compliance to ARV drug. The youth with HIV positive was lacking of the knowledge on sexual health on the issues of access to condom and the concern to keep on relationship with the boyfriend or girlfriend. This concern issues was led to the non-adherence of ARV drug and HIV distribution. To provide the sexual health service is more essential to the youth with HIV positive.

Keywords: sexual health, sexual risk behavior, youth, HIV

Procedia PDF Downloads 449
155 Optimisation of B2C Supply Chain Resource Allocation

Authors: Firdaous Zair, Zoubir Elfelsoufi, Mohammed Fourka

Abstract:

The allocation of resources is an issue that is needed on the tactical and operational strategic plan. This work considers the allocation of resources in the case of pure players, manufacturers and Click & Mortars that have launched online sales. The aim is to improve the level of customer satisfaction and maintaining the benefits of e-retailer and of its cooperators and reducing costs and risks. Our contribution is a decision support system and tool for improving the allocation of resources in logistics chains e-commerce B2C context. We first modeled the B2C chain with all operations that integrates and possible scenarios since online retailers offer a wide selection of personalized service. The personalized services that online shopping companies offer to the clients can be embodied in many aspects, such as the customizations of payment, the distribution methods, and after-sales service choices. In addition, every aspect of customized service has several modes. At that time, we analyzed the optimization problems of supply chain resource allocation in customized online shopping service mode, which is different from the supply chain resource allocation under traditional manufacturing or service circumstances. Then we realized an optimization model and algorithm for the development based on the analysis of the allocation of the B2C supply chain resources. It is a multi-objective optimization that considers the collaboration of resources in operations, time and costs but also the risks and the quality of services as well as dynamic and uncertain characters related to the request.

Keywords: e-commerce, supply chain, B2C, optimisation, resource allocation

Procedia PDF Downloads 246
154 Data-Driven Floodplain Management and Regulation in Florida

Authors: Susanna Pho

Abstract:

With the rise in frequency of high impact flooding events and continued growth across the state, communities in Florida are increasingly turning to innovative higher regulatory standards to keep residents safe. Using models and maps that take future conditions into account can help coastal communities at high risk of flooding adapt, but the associated responsibilities of enforcing and educating stakeholders about floodplain management can be a barrier to adoption. This is especially true in communities that are already managing multiple maps, as adding more regulatory mapping may overwhelm resource-constrained building departments. Without effective workflow solutions, even small tasks like communicating regulations to residents or determining the most restrictive mapping for a permit application can become challenging when dealing with complex maps. Using the case study of Forerunner’s work with a partner community, this session will outline how the community combines technology with robust outreach strategies to boost resident communication. We’ll discuss how software like Forerunner can help communities pull together disparate datasets and mobilize information for property-specific outreach to provide smarter resources to a variety of stakeholders. it’ll explore how incorporating digital workflows into outreach can ensure faster response time, better compliance enforcement, and stronger data continuity. The presentation will also include suggestions on how other communities might be able to leverage data to strengthen their floodplain management programs.

Keywords: floodplain management, flood response, flood risk adaptation, flood protection - products and processes, flood risk assessment and recovery, innovative approaches

Procedia PDF Downloads 32
153 Community Interpreting in the Process of Asylum Seeking in Brazil

Authors: Fernanda Garcia

Abstract:

With the recent growth of refugees in the world, there has been an exponential increase in requests for asylum seeking in Brazil. When asylum seekers arrive in the country, the government initiates a process to evaluate the case, which will serve as grounds to determine the refugee status of the asylum seekers. During this process, an interview where the migrant has the chance to tell their story takes place. The aim of this article is to analyse how community interpreting is conducted in Brazil with regard to asylum seeking, as well as to analyse the role of the interpreter in the context of these official interviews to request refuge in Brazil. We investigate how the presence of an interpreter influences this interview, but more specifically, we study some of the linguistic techniques used by the interpreter in order to make the interaction more effective, as well as the challenges and difficulties they encounter during the interview. To do so, surveys with the interpreters took place, in addition to on-site observations. The interpreters involved in this research are volunteers as part of an extra-curricular extension programme from the University of Brasilia, in Brazil. Community Interpreting is a somewhat new field in Brazil, still facing several obstacles, such as the lack of professional community interpreters. This research illustrates some of these issues and, thus, has the potential to foster Brazilian literature in the matter as well as help understand the role of the interpreter in the interview to seek asylum in Brazil. The refugees’ situation in the world is certainly a pressing matter, and the language barrier is an issue of great importance. Hence, translation and interpretation studies have a fundamental role in this area, when it comes to contributing to a more inclusive world to those in need.

Keywords: asylum seeking, community interpreting, interviews, refugees

Procedia PDF Downloads 113
152 Facets of an Upcoming Urban Industrial Hub: A Case Study of Gurgaon-Manesar

Authors: Raman Kumar Singh

Abstract:

Urbanization and economic growth are considered to be the most striking features of the past century. There is currently a radical demographic shift in progress worldwide, wherein people are moving from rural to urban areas at an increasing rate. The UN-Habitat report 2005 indicates that in 2025, 61 per cent of the 5 billion world population will reside in the urban areas with about 85 per cent of the development process taking place in the urban hinterlands widely referred to as ‘peri-urban’, ‘suburbs’, ‘urban fringe’, ‘city edge’, ‘metropolitan shadow’, or ‘urban sprawl’. In this context the study is broadly concerned with understanding the development of the industrial hub in the Gurgaon and its impact on the immediate neighbourhood. However studies have revealed that with the increase of industrial development the growth pattern changes rapidly, not only the growth of the urban area but the overall economy shifts from more agrarian to non-agrarian, with the change in the occupational pattern of the people. The process is mainly known as tertiarization, where a number of tertiary activities increase in comparison to primary or secondary. The change in the occupational pattern creates a pull factor on its immediate neighbourhood, which triggers the in- migrations from the rural areas as people come in the core urban area in search of the better job opportunities and increased standards of living. But this gives way to the unplanned growth of the urban fringe and the villages which tend to accommodate the migrants and in turn the pressure on the socio-economic infrastructure increases. Therefore, it becomes increasing necessary for the government institution and policy level intervention to provide an overall socio-economic growth along with rapid industrial growth.

Keywords: policy intervention, urban morphology, urban industrial hub, livelihood transformation

Procedia PDF Downloads 337
151 Geospatial Land Suitability Modeling for Biofuel Crop Using AHP

Authors: Naruemon Phongaksorn

Abstract:

The biofuel consumption has increased significantly over the decade resulting in the increasing request on agricultural land for biofuel feedstocks. However, the biofuel feedstocks are already stressed of having low productivity owing to inappropriate agricultural practices without considering suitability of crop land. This research evaluates the land suitability using GIS-integrated Analytic Hierarchy Processing (AHP) of biofuel crops: cassava, at Chachoengsao province, in Thailand. AHP method that has been widely accepted for land use planning. The objective of this study is compared between AHP method and the most limiting group of land characteristics method (classical approach). The reliable results of the land evaluation were tested against the crop performance assessed by the field investigation in 2015. In addition to the socio-economic land suitability, the expected availability of raw materials for biofuel production to meet the local biofuel demand, are also estimated. The results showed that the AHP could classify and map the physical land suitability with 10% higher overall accuracy than the classical approach. The Chachoengsao province showed high and moderate socio-economic land suitability for cassava. Conditions in the Chachoengsao province were also favorable for cassava plantation, as the expected raw material needed to support ethanol production matched that of ethanol plant capacity of this province. The GIS integrated AHP for biofuel crops land suitability evaluation appears to be a practical way of sustainably meeting biofuel production demand.

Keywords: Analytic Hierarchy Processing (AHP), Cassava, Geographic Information Systems, Land suitability

Procedia PDF Downloads 166
150 Indian Emigration to Gulf Countries: Opportunities and Challenges

Authors: Sudhaveni Naresh

Abstract:

International migration is an important subject and gaining more significance andinterest among scholars in recent years. It is defined as crossing of the boundaries of political or administrative units for a certain minimum period for reasons such as education, employment, etc.International migration is not new for India because it has a long history with the Gulf region since ancient period. India is also one of the largest migrant-sending countries after China in the world. Migration towards the Gulf region became more prominent during early 1970s due to oil boom which led to rapid increase in the demand for foreign labour. Of 25 million Indian emigrants are living across the world, about six million Indian emigrants working in the Gulf. Most of these migrants were either unskilled or semi-skilled. Both the pull and push factors behind labour emigrate to Gulf countries. India is world’s leading receiver of remittances and the flow of remittances to India has been increasing steadily since the 1970s. In 2011-12, it was about 4 percent of GDP.Emigrants play a significant role in the economic development and growth of the country via the remittances and knowledge and skill transfer. Scholars see remittances as vital tool in the development for origin country. This paper examines the recent trend and pattern of migration from India to Gulf countries and explores impact of remittances on emigrants’ families at home country. It also highlights opportunities, challenges and the need for strengthening multilateral cooperation to transform migration into an efficient, orderly and humane process.The study propose to undertake a primary survey for this purpose. Both quantitative and qualitative research methods will be used to study the above issues.

Keywords: development, international migration, remittances, unskilled labour

Procedia PDF Downloads 263
149 Correlation between Physical Fitness and Performance and Grade of Table Tennis of Middle School Students

Authors: Yisong Cong, Mingming Guo, Xiaozan Wang, Yizhi Zhang, Qingqing Yuan

Abstract:

This study is to test the correlation between the Physical Fitness (PF) of middle school students and their performance and sports grade of table tennis. Methods: 398 middle school students from Shanghai Tongji No.2 Middle School participated in the study, including 232 boys and 166 girls. Each participant participated in the Chinese Students’ Physical Fitness Test (CSPFT), including BMI, 50-meter running, vital capacity, sitting body flexion, standing long jump, 800-meter running, 1000-meter running, pull-ups, and sit-ups. Test scores were converted to a percentage score according to the CSPFT guidelines. In addition, each student participated in the Nation Junior Table Tennis grade test, and completed the table tennis sports grade assessment of 1-9. Results: There is a significant positive correlation between the scores of multiple PF tests and the total scores of table tennis, such as BMI (r = 0.15, p < 0.01), standing long jump (r = 0.15, p < 0.05), 800-meter run (r = 0.02, p <0.01); The scores of multiple PF are positively correlated with table tennis grade, such as vital capacity (r = 0.1, p < 0.01) and 50-meter running (r = 0.18, p < 0.05). At the same time, the sit-ups performance showed a significant negative correlation with the table tennis performance (r = -0.08, p < 0.01); There is no significant correlation between the other PF indicators and the performance and grade of table tennis. Conclusions: This study shows that there is a corresponding relationship between some PF indicators of middle school students and their table tennis performance and table tennis grade,but the specific form and reason of the relationship need to be further explored.

Keywords: middle school students, physical fitness, table tennis grade, table tennis performance

Procedia PDF Downloads 120
148 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 223
147 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu

Abstract:

Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.

Keywords: android, API Calls, machine learning, permissions combination

Procedia PDF Downloads 306
146 Distributed Real-Time Range Query Approximation in a Streaming Environment

Authors: Simon Keller, Rainer Mueller

Abstract:

Continuous range queries are a common means to handle mobile clients in high-density areas. Most existing approaches focus on settings in which the range queries for location-based services are more or less static, whereas the mobile clients in the ranges move. We focus on a category called dynamic real-time range queries (DRRQ), assuming that both, clients requested by the query and the inquirers, are mobile. In consequence, the query parameters and the query results continuously change. This leads to two requirements: the ability to deal with an arbitrarily high number of mobile nodes (scalability) and the real-time delivery of range query results. In this paper, we present the highly decentralized solution adaptive quad streaming (AQS) for the requirements of DRRQs. AQS approximates the query results in favor of a controlled real-time delivery and guaranteed scalability. While prior works commonly optimize data structures on the involved servers, we use AQS to focus on a highly distributed cell structure without data structures automatically adapting to changing client distributions. Instead of the commonly used request-response approach, we apply a lightweight streaming method in which no bidirectional communication and no storage or maintenance of queries are required at all.

Keywords: approximation of client distributions, continuous spatial range queries, mobile objects, streaming-based decentralization in spatial mobile environments

Procedia PDF Downloads 115
145 Comparing Machine Learning Estimation of Fuel Consumption of Heavy-Duty Vehicles

Authors: Victor Bodell, Lukas Ekstrom, Somayeh Aghanavesi

Abstract:

Fuel consumption (FC) is one of the key factors in determining expenses of operating a heavy-duty vehicle. A customer may therefore request an estimate of the FC of a desired vehicle. The modular design of heavy-duty vehicles allows their construction by specifying the building blocks, such as gear box, engine and chassis type. If the combination of building blocks is unprecedented, it is unfeasible to measure the FC, since this would first r equire the construction of the vehicle. This paper proposes a machine learning approach to predict FC. This study uses around 40,000 vehicles specific and o perational e nvironmental c onditions i nformation, such as road slopes and driver profiles. A ll v ehicles h ave d iesel engines and a mileage of more than 20,000 km. The data is used to investigate the accuracy of machine learning algorithms Linear regression (LR), K-nearest neighbor (KNN) and Artificial n eural n etworks (ANN) in predicting fuel consumption for heavy-duty vehicles. Performance of the algorithms is evaluated by reporting the prediction error on both simulated data and operational measurements. The performance of the algorithms is compared using nested cross-validation and statistical hypothesis testing. The statistical evaluation procedure finds that ANNs have the lowest prediction error compared to LR and KNN in estimating fuel consumption on both simulated and operational data. The models have a mean relative prediction error of 0.3% on simulated data, and 4.2% on operational data.

Keywords: artificial neural networks, fuel consumption, friedman test, machine learning, statistical hypothesis testing

Procedia PDF Downloads 145
144 Intrathecal Sufentanil or Fentanyl as Adjuvants to Low Dose Bupivacaine in Endoscopic Urological Procedures

Authors: Shikha Gupta, Suneet Kathuria, Supriya Sampley, Sunil Katyal

Abstract:

Opioids are being increasingly used these days as adjuvants to local anesthetics in spinal anesthesia. The aim of this prospective, randomized, double‑blind study is to compare the effects of adding sufentanil or fentanyl to low dose bupivacaine in spinal anesthesia for endoscopic urological procedures. A total of 90 elective endoscopic urological surgery patients, 40‑80 years old, received spinal anesthesia with 7.5 mg hyperbaric bupivacaine 0.5% (Group A) or by adding sufentanil 10 μg (Group B) or fentanyl 25 μg (Group C) to 5 mg hyperbaric bupivacaine 0.5%. These groups were compared in terms of the quality of spinal anesthesia as well as analgesia. Analysis of variance and Chi‑square test were used for Statistical analysis. The onset of sensory and motor blockade was significantly rapid in Group A as compared with Groups B and C. The maximum upper level of sensory block was higher in Group A patients than Groups B and C patients. Quality of analgesia was significantly better and prolonged in sufentanil group as compared with other two groups. Motor block was more intense and prolonged in Group A as compared with Groups B and C patients. Request for post‑operative analgesic was significantly delayed in Group B patients. Hence in conclusions, spinal anesthesia for endoscopic urological procedures in elderly patients using low dose bupivacaine (5 mg) combined with 10 μg sufentanil is associated with a lower incidence of hemodynamic instability, better quality and prolonged duration as compared to that by adding 25 μg fentanyl.

Keywords: adjuvants, bupivacaine, fentanyl, intrathecal, low dose spinal, sufentanil

Procedia PDF Downloads 352
143 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 230
142 A Research on the Benefits of Drone Usage in Industry by Determining Companies Using Drone in the World

Authors: Ahmet Akdemir, Güzide Karakuş, Leyla Polat

Abstract:

Aviation that has been arisen in accordance with flying request that is existing inside of people, has not only made life easier by making a great contribution to humanity; it has also accelerated globalization by reducing distances between countries. It is seen that the growth rate of aviation industry has reached the undreamed level when it is looked back on. Today, the last point in aviation is unmanned aerial vehicles that are self-ventilating and move in desired coordinates without any onboard pilot. For those vehicles, there are two different control systems are developed. In the first type of control, an unmanned aerial vehicle (UAV) moves according to instructions of a remote control. UAV that moves with a remote control is named as drone; it can be used personally. In the second one, there is a flight plan that is programmed and placed inside of UAV before flight. Recently, drones have started to be used in unimagined areas and utilize specific, important benefits for any industry. Within this framework, this study answers the question that is drone usage would be beneficial for businesses or not. To answer this question, applied basic methodologies are determining businesses using drone in the world, their purposes to use drone, and then, comparing their economy as before drone and after drone. In the end of this study, it is seen that many companies in different business areas use drone in logistics support, and it makes their work easier than before. This paper has contributed to academic literature about this subject, and it has introduced the benefits of drone usage for businesses. In addition, it has encouraged businesses that they keep pace with this technological age by following the developments about drones.

Keywords: aviation, drone, drone in business, unmanned aerial vehicle

Procedia PDF Downloads 216
141 Knowledge Transformation Flow (KTF) of Visually Impaired Students: The Virtual Knowledge System as a New Service Innovation

Authors: Chatcai Tangsri, Onjaree Na-Takuatoong

Abstract:

This paper aims to present the key factors that support the decision to use the technology and to present the knowledge transformation flow of visually impaired students after the use of virtual knowledge system as proposed as a new service innovation to universities in Thailand. Correspondents of 27 visually impaired students are involved in this research. Total of 25 students are selected from the University that mainly conducts non-classroom teaching environment; while another 2 visually impaired students are selected from classroom teaching environment. All of them are fully involved in the study along 8 weeks duration. All correspondents are classified into 5 small groups in various conditions. The research results revealed that the involvement from knowledge facilitator can push out for the behavioral actual use of the virtual knowledge system although there is no any developed intention to use behaviors. Secondly, the situations that the visually impaired students inadequate of the knowledge sources that usually provided by assistants i.e. peers, audio files etc. In this case, they will use the virtual knowledge system for both knowledge access and knowledge transfer request. With this evidence, the need of knowledge would play a stronger role than all technology acceptance factors. Finally, this paper revealed that the knowledge transfer in the normal method that students have a chance to physically meet up is still confirmed as their preference method. In term of other aspects of technology acceptance, it will be discussed together with challenges and recommendations at the end of this paper.

Keywords: knowledge system, visually impaired students, higher education, knowledge management enable technology, synchronous/asynchronous knowledge access, synchronous/asynchronous knowledge transfer

Procedia PDF Downloads 327
140 Bottleneck Modeling in Information Technology Service Management

Authors: Abhinay Puvvala, Veerendra Kumar Rai

Abstract:

A bottleneck situation arises when the outflow is lesser than the inflow in a pipe-like setup. A more practical interpretation of bottlenecks emphasizes on the realization of Service Level Objectives (SLOs) at given workloads. Our approach detects two key aspects of bottlenecks – when and where. To identify ‘when’ we continuously poll on certain key metrics such as resource utilization, processing time, request backlog and throughput at a system level. Further, when the slope of the expected sojourn time at a workload is greater than ‘K’ times the slope of expected sojourn time at the previous step of the workload while the workload is being gradually increased in discrete steps, a bottleneck situation arises. ‘K’ defines the threshold condition and is computed based on the system’s service level objectives. The second aspect of our approach is to identify the location of the bottleneck. In multi-tier systems with a complex network of layers, it is a challenging problem to locate bottleneck that affects the overall system performance. We stage the system by varying workload incrementally to draw a correlation between load increase and system performance to the point where Service Level Objectives are violated. During the staging process, multiple metrics are monitored at hardware and application levels. The correlations are drawn between metrics and the overall system performance. These correlations along with the Service Level Objectives are used to arrive at the threshold conditions for each of these metrics. Subsequently, the same method used to identify when a bottleneck occurs is used on metrics data with threshold conditions to locate bottlenecks.

Keywords: bottleneck, workload, service level objectives (SLOs), throughput, system performance

Procedia PDF Downloads 203
139 A Controlled Natural Language Assisted Approach for the Design and Automated Processing of Service Level Agreements

Authors: Christopher Schwarz, Katrin Riegler, Erwin Zinser

Abstract:

The management of outsourcing relationships between IT service providers and their customers proofs to be a critical issue that has to be stipulated by means of Service Level Agreements (SLAs). Since service requirements differ from customer to customer, SLA content and language structures vary largely, standardized SLA templates may not be used and an automated processing of SLA content is not possible. Hence, SLA management is usually a time-consuming and inefficient manual process. For overcoming these challenges, this paper presents an innovative and ITIL V3-conform approach for automated SLA design and management using controlled natural language in enterprise collaboration portals. The proposed novel concept is based on a self-developed controlled natural language that follows a subject-predicate-object approach to specify well-defined SLA content structures that act as templates for customized contracts and support automated SLA processing. The derived results eventually enable IT service providers to automate several SLA request, approval and negotiation processes by means of workflows and business rules within an enterprise collaboration portal. The illustrated prototypical realization gives evidence of the practical relevance in service-oriented scenarios as well as the high flexibility and adaptability of the presented model. Thus, the prototype enables the automated creation of well defined, customized SLA documents, providing a knowledge representation that is both human understandable and machine processable.

Keywords: automated processing, controlled natural language, knowledge representation, information technology outsourcing, service level management

Procedia PDF Downloads 396
138 Structural Characterization of TIR Domains Interaction

Authors: Sara Przetocka, Krzysztof Żak, Grzegorz Dubin, Tadeusz Holak

Abstract:

Toll-like receptors (TLRs) play central role in the innate immune response and inflammation by recognizing pathogen-associated molecular patterns (PAMPs). A fundamental basis of TLR signalling is dependent upon the recruitment and association of adaptor molecules that contain the structurally conserved Toll/interleukin-1 receptor (TIR) domain. MyD88 (myeloid differentiation primary response gene 88) is the universal adaptor for TLRs and cooperates with Mal (MyD88 adapter-like protein, also known as TIRAP) in TLR4 response which is predominantly used in inflammation, host defence and carcinogenesis. Up to date two possible models of MyD88, Mal and TLR4 interactions have been proposed. The aim of our studies is to confirm or abolish presented models and accomplish the full structural characterisation of TIR domains interaction. Using molecular cloning methods we obtained several construct of MyD88 and Mal TIR domain with GST or 6xHis tag. Gel filtration method as well as pull-down analysis confirmed that recombinant TIR domains from MyD88 and Mal are binding in complexes. To examine whether obtained complexes are homo- or heterodimers we carried out cross-linking reaction of TIR domains with BS3 compound combined with mass spectrometry. To investigate which amino acid residues are involved in this interaction the NMR titration experiments were performed. 15N MyD88-TIR solution was complemented with non-labelled Mal-TIR. The results undoubtedly indicate that MyD88-TIR interact with Mal-TIR. Moreover 2D spectra demonstrated that simultaneously Mal-TIR self-dimerization occurs which is necessary to create proper scaffold for Mal-TIR and MyD88-TIR interaction. Final step of this study will be crystallization of MyD88 and Mal TIR domains complex. This crystal structure and characterisation of its interface will have an impact in understanding the TLR signalling pathway and possibly will be used in development of new anti-cancer treatment.

Keywords: cancer, MyD88, TIR domains, Toll-like receptors

Procedia PDF Downloads 259
137 Driver Readiness in Autonomous Vehicle Take-Overs

Authors: Abdurrahman Arslanyilmaz, Salman Al Matouq, Durmus V. Doner

Abstract:

Level 3 autonomous vehicles are able to take full responsibility over the control of the vehicle unless a system boundary is reached or a system failure occurs, in which case, the driver is expected to take-over the control of the vehicle. While this happens, the driver is often not aware of the traffic situation or is engaged in a secondary task. Factors affecting the duration and quality of take-overs in these situations have included secondary task type and nature, traffic density, take-over request (TOR) time, and TOR warning type and modality. However, to the best of the authors’ knowledge, no prior study examined time buffer for TORs when a system failure occurs immediately before intersections. The first objective of this study is to investigate the effect of time buffer (3 and 7 seconds) on the duration and quality of take-overs when a system failure occurs just prior to intersections. In addition, eye-tracking has become one of the most popular methods to report what individuals view, in what order, for how long, and how often, and it has been utilized in driving simulations with various objectives. However, to the extent of authors’ knowledge, none has compared drivers’ eye gaze behavior in the two different time buffers in order to examine drivers’ attention and comprehension of salient information. The second objective is to understand the driver’s attentional focus on comprehension of salient traffic-related information presented on different parts of the dashboard and on the roads.

Keywords: autonomous vehicles, driving simulation, eye gaze, attention, comprehension, take-over duration, take-over quality, time buffer

Procedia PDF Downloads 100
136 An Extensible Software Infrastructure for Computer Aided Custom Monitoring of Patients in Smart Homes

Authors: Ritwik Dutta, Marylin Wolf

Abstract:

This paper describes the trade-offs and the design from scratch of a self-contained, easy-to-use health dashboard software system that provides customizable data tracking for patients in smart homes. The system is made up of different software modules and comprises a front-end and a back-end component. Built with HTML, CSS, and JavaScript, the front-end allows adding users, logging into the system, selecting metrics, and specifying health goals. The back-end consists of a NoSQL Mongo database, a Python script, and a SimpleHTTPServer written in Python. The database stores user profiles and health data in JSON format. The Python script makes use of the PyMongo driver library to query the database and displays formatted data as a daily snapshot of user health metrics against target goals. Any number of standard and custom metrics can be added to the system, and corresponding health data can be fed automatically, via sensor APIs or manually, as text or picture data files. A real-time METAR request API permits correlating weather data with patient health, and an advanced query system is implemented to allow trend analysis of selected health metrics over custom time intervals. Available on the GitHub repository system, the project is free to use for academic purposes of learning and experimenting, or practical purposes by building on it.

Keywords: flask, Java, JavaScript, health monitoring, long-term care, Mongo, Python, smart home, software engineering, webserver

Procedia PDF Downloads 364
135 Cultural Self-Efficacy of Child Protection Social Workers in Norway: Barriers and Opportunities in Working with Migrant Families

Authors: Justyna Mroczkowska

Abstract:

Social worker's ability to provide culturally sensitive assistance in child protection is taken for granted; given limited training opportunities and lack of clear guidance, practitioners report working with migrant families more demanding in comparison to working with native families. In this study, the author developed and factor analyzed the Norwegian Cultural Self-Efficacy Scale to describe the level of cultural capability among Norwegian child protection professionals. The study aimed to determine the main influencing factors to cultural efficacy and examine the relationship between self-efficacy and perceived difficulty in working with migrant families. The scale was administered to child protection workers in Norway (N=251), and the reliability of the scale measured by Cronbach's alpha coefficient was .904. The confirmatory factor analysis of social work cultural self-efficacy found support for four separate but correlated subscales: Assessment, Communication, Support Request, and Teamwork. Regression analyses found the experience in working with migrant families, training and support from external agencies, and colleague support to be significant predictors of cultural self-efficacy. Self-efficacy in assessment skills and self-efficacy in communication skills were moderately related to the perceived difficulty to work with migrant families. The findings conclude with previous research and highlight the need for both professional development programs and institutional resources to be provided to support the practitioner's preparation for multicultural practice in child protection.

Keywords: child protection, cultural self-efficacy, cultural competency, migration, resources

Procedia PDF Downloads 108
134 Process Optimization and Automation of Information Technology Services in a Heterogenic Digital Environment

Authors: Tasneem Halawani, Yamen Khateeb

Abstract:

With customers’ ever-increasing expectations for fast services provisioning for all their business needs, information technology (IT) organizations, as business partners, have to cope with this demanding environment and deliver their services in the most effective and efficient way. The purpose of this paper is to identify optimization and automation opportunities for the top requested IT services in a heterogenic digital environment and widely spread customer base. In collaboration with systems, processes, and subject matter experts (SMEs), the processes in scope were approached by analyzing four-year related historical data, identifying and surveying stakeholders, modeling the as-is processes, and studying systems integration/automation capabilities. This effort resulted in identifying several pain areas, including standardization, unnecessary customer and IT involvement, manual steps, systems integration, and performance measurement. These pain areas were addressed by standardizing the top five requested IT services, eliminating/automating 43 steps, and utilizing a single platform for end-to-end process execution. In conclusion, the optimization of IT service request processes in a heterogenic digital environment and widely spread customer base is challenging, yet achievable without compromising the service quality and customers’ added value. Further studies can focus on measuring the value of the eliminated/automated process steps to quantify the enhancement impact. Moreover, a similar approach can be utilized to optimize other IT service requests, with a focus on business criticality.

Keywords: automation, customer value, heterogenic, integration, IT services, optimization, processes

Procedia PDF Downloads 84
133 A Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State

Authors: Abimbola Olaotan Akinsete

Abstract:

Government all over the world has intensified efforts in making internet and resource centres readily available in public institutions and centres for the advancement of humanity and working processes. Information and communication resource centre will not only help in the reduction of task that are presumed to be herculean. This centres influenced the working rate and productivity of both staffs and students and its benefit. The utilization of the internet and information resource centre will not only speed up service delivery, working time and efficiency of the system. Information and Communication Technology plays significant roles in presenting equalization strategy for developing university community and improving educational service delivery. This equalization will not only advance, accelerate and ensure results are accessed electronically, ensuring the transfer and confirmation of students’ academic records and their results in the world without physically available to request for these services. This study seeks to make Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State. The study employ descriptive survey design method in identifying hindrances of the non-utilization of technology in the service delivery in the university. Findings revealed that the adoption of internet and resource centre in the Exams and Records unit of the University shall help in delivering more in students’ records/results processing.

Keywords: internet, resource, centre, policy and service delivery

Procedia PDF Downloads 70
132 An Assessment into the Drift in Direction of International Migration of Labor: Changing Aspirations for Religiosity and Cultural Assimilation

Authors: Syed Toqueer Akhter, Rabia Zulfiqar

Abstract:

This paper attempts to trace the determining factor- as far as individual preferences and expectations are concerned- of what causes the direction of international migration to drift in certain ways owing to factors such as Religiosity and Cultural Assimilation. The narrative on migration has graduated from the age long ‘push/pull’ debate to that of complex factors that may vary across each individual. We explore the longstanding factor of religiosity widely acknowledged in mentioned literature as a key variable in the assessment of migration, wherein the impact of religiosity in the form of a drift into the intent of migration has been analyzed. A more conventional factor cultural assimilation is used in a contemporary way to estimate how it plays a role in affecting the drift in direction. In particular what our research aims at achieving is to isolate the effect our key variables: Cultural Assimilation and Religiosity have on direction of migration, and to explore how they interplay as a composite unit- and how we may be able to justify the change in behavior displayed by these key variables. In order to establish a true sense of what drives individual choices we employ the method of survey research and use a questionnaire to conduct primary research. The questionnaire was divided into six sections covering subjects including household characteristics, perceptions and inclinations of the respondents relevant to our study. Religiosity was quantified using a proxy of Migration Network that utilized secondary data to estimate religious hubs in recipient countries. To estimate the relationship between Intent of Migration and its variants three competing econometric models namely: the Ordered Probit Model, the Ordered Logit Model and the Tobit Model were employed. For every model that included our key variables, a highly significant relationship with the intent of migration was estimated.

Keywords: international migration, drift in direction, cultural assimilation, religiosity, ordered probit model

Procedia PDF Downloads 282