Search results for: focus
750 Understanding Primary School Students’ Beliefs Regarding the Adoption of Pro-Environmental Behaviors
Authors: Astrid de Leeuw, Pierre Valois
Abstract:
Environmental education is the key to enhancing or changing students’ ways of thinking and acting in order to create an environmentally robust future for all. The present study investigates the beliefs of 812 primary school students, which merit consideration when developing educational interventions. Results of multiple regression analyses reveal that educational interventions should focus on promoting students’ feelings of control over pro-environmental behaviors (PEB). For example, schools could provide recycling bins on the premises. Furthermore, it is critical to develop positive attitudes in students by stressing the various benefits of PEB for keeping our planet clean and protecting wildlife. Unfortunately, our results indicate that students believe that PEB is boring and annoying. Suggestions are offered for making PEB more interesting and relevant. Further research is needed to test the effectiveness of interventions based on the present results.
Keywords: Pro-environmental behaviors, primary school students, theory of planned behavior, beliefs, educational interventions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2186749 Addressing Security Concerns of Data Exchange in AODV Protocol
Authors: Monis Akhlaq, M Noman Jafri, Muzammil A Khan, Baber Aslam
Abstract:
The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
Keywords: AODV, key management, security, wirelessnetworks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2094748 A Statistical Model for the Dynamics of Single Cathode Spot in Vacuum Cylindrical Cathode
Authors: Po-Wen Chen, Jin-Yu Wu, Md. Manirul Ali, Yang Peng, Chen-Te Chang, Der-Jun Jan
Abstract:
Dynamics of cathode spot has become a major part of vacuum arc discharge with its high academic interest and wide application potential. In this article, using a three-dimensional statistical model, we simulate the distribution of the ignition probability of a new cathode spot occurring in different magnetic pressure on old cathode spot surface and at different arcing time. This model for the ignition probability of a new cathode spot was proposed in two typical situations, one by the pure isotropic random walk in the absence of an external magnetic field, other by the retrograde motion in external magnetic field, in parallel with the cathode surface. We mainly focus on developed relationship between the ignition probability density distribution of a new cathode spot and the external magnetic field.Keywords: Cathode spot, vacuum arc discharge, transverse magnetic field, random walk.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1398747 Optimizing the Project Delivery Time with Time Cost Trade-offs
Authors: Wei Lo, Ming-En Kuo
Abstract:
While to minimize the overall project cost is always one of the objectives of construction managers, to obtain the maximum economic return is definitely one the ultimate goals of the project investors. As there is a trade-off relationship between the project time and cost, and the project delivery time directly affects the timing of economic recovery of an investment project, to provide a method that can quantify the relationship between the project delivery time and cost, and identify the optimal delivery time to maximize economic return has always been the focus of researchers and industrial practitioners. Using genetic algorithms, this study introduces an optimization model that can quantify the relationship between the project delivery time and cost and furthermore, determine the optimal delivery time to maximize the economic return of the project. The results provide objective quantification for accurately evaluating the project delivery time and cost, and facilitate the analysis of the economic return of a project.Keywords: Time-Cost Trade-Off, Genetic Algorithms, Resource Integration, Economic return.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1773746 Adoption of iPads Paving the Way to Changes in the Knowledge Practices within a School of Vocational Teacher Education
Authors: Päivi Aarreniemi-Jokipelto, Merja Alanko-Turunen
Abstract:
The possibilities of mobile technology generate new demands for vocational teacher trainers to transform their approach to work and to incorporate its usage into their ordinary educational practice. This paper presents findings of a focus discussion group (FDG) session on the usage of iPads within a school of vocational teacher education (SoVTE). It aims to clarify how the teacher trainers are using iPads and what has changed in their work during the usage of iPads. The analytical framework bases on content analysis and expansive learning cycle. It was not only found what kind of a role iPads played in their daily practices but it brought also into attention how a cultural change regarding the usage of social media and mobile technology was desperately needed in the whole work community. Thus, the FGD was abducted for developing the knowledge practices of the community of the SoVTE.Keywords: iPad, mobile learning, vocational teacher education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1823745 Developing a Campus Sustainability Assessment Framework for the National University of Malaysia
Authors: Z.F. Fadzil, H.S. Hashim, A.I. Che-Ani, S. Aziz
Abstract:
Campus sustainability is the goal of a university striving for sustainable development. This study found that of 17 popular approaches, two comprehensive campus sustainability assessment frameworks were developed in the context of Sustainability in Higher Education (SHE), and used by many university campuses around the world. Sustainability Tracking Assessment and Rating Systems (STARS) and the Campus Sustainability Assessment Framework (CSAF) approaches are more comprehensive than others. Therefore, the researchers examined aspects and elements used by CSAF and STARS in the approach to develop a campus sustainability assessment framework for Universiti Kebangsaan Malaysia (UKM). Documents analysis found that CSAF and STARS do not focus on physical development, especially the construction industry, as key elements of campus sustainability assessment. This finding is in accordance with the Sustainable UKM Programme which consists of three main components of sustainable community, ecosystem and physical development.
Keywords: Campus sustainability, campus sustainability assessment, sustainability assessment framework, sustainable campus
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3295744 Maintenance Management System for Upstream Operations in Oil and Gas Industry: Case Study
Authors: Wan Hasrulnizzam Wan Mahmood, Mohd Nizam Ab Rahman, Husiah Mazli, Baba Md Deros
Abstract:
This paper explores the plant maintenance management system that has been used by giant oil and gas company in Malaysia. The system also called as PMMS used to manage the upstream operations for more than 100 plants of the case study company. Moreover, from the observations, focus group discussion with PMMS personnel and application through simulation (SAP R/3), the paper reviews the step-by-step approach and the elements that required for the PMMS. The findings show that the PMMS integrates the overall business strategy in upstream operations that consist of asset management, work management and performance management. In addition, PMMS roles are to help operations personnel organize and plan their daily activities, to improve productivity and reduce equipment downtime and to help operations management analyze the facilities and create performance, and to provide and maintain the operational effectiveness of the facilities.
Keywords: Maintenance, Oil and Gas Industry, Upstream Operations
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12535743 Design of an Experimental Setup to Study the Drives of Battery Electric Vehicles
Authors: Valery Vodovozov, Zoja Raud, Tõnu Lehtla
Abstract:
This paper describes the design considerations of an experimental setup for research and exploring the drives of batteryfed electric vehicles. Effective setup composition and its components are discussed. With experimental setup described in this paper, durability and functional tests can be procured to the customers. Multiple experiments are performed in the form of steady-state system exploring, acceleration programs, multi-step tests (speed control, torque control), load collectives or close-to-reality driving tests (driving simulation). Main focus of the functional testing is on the measurements of power and energy efficiency and investigations in driving simulation mode, which are used for application purposes. In order to enable the examination of the drive trains beyond standard modes of operation, different other parameters can be studied also.Keywords: Electric drive, electric vehicle, propulsion, test bench.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2924742 Development of an Artificial Ear for Bone-Conducted Objective Occlusion Measurement
Authors: Yu Luan
Abstract:
The bone-conducted objective occlusion effect (OE) is characterized by a discomforting sensation of fullness experienced in an occluded ear. This phenomenon arises from various external stimuli, such as human speech, chewing, and walking, which generate vibrations transmitted through the body to the ear canal walls. The bone-conducted OE occurs due to the pressure build-up inside the occluded ear caused by sound radiating into the ear canal cavity from its walls. In the hearing aid industry, artificial ears are utilized as a tool for developing hearing aids. However, the currently available commercial artificial ears primarily focus on pure acoustics measurements, neglecting the bone-conducted vibration aspect. This research endeavors to develop an artificial ear specifically designed for bone-conducted occlusion measurements. Finite Element Analysis (FEA) modeling has been employed to gain insights into the behavior of the artificial ear.
Keywords: Artificial ear, bone conducted vibration, occlusion measurement, Finite Element Modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 187741 Innovativeness, Risk Taking, Focusing on Opportunity Attitudes on Nurse Managers and Nurses
Authors: Melek Kalkan, Hatice Odacı, Hatice Epli Koç
Abstract:
The aim of this study is to compare the innovativeness, risk taking, and focusing on opportunity of the nurse managers and nurses. The data are collected from nurse managers and nurses in Ondokuz Mayıs University, Faculty of Medicine Hospital and Karadeniz Technical University, Faculty of Medicine Hospital. The study sample consisted of 151 participants, 76 nurse managers (50.3%) and 75 nurses (49.7%). All participants have been assessed by Participant Information Form and Corporate Entrepreneurship Scale. In data analysis, independent t-test has applied. The results show that there are significant differences between nurse managers and nurses on innovativeness (t = 2.42, p < 0.05), risk taking (t = 3.62, p < 0.01), and focusing on opportunity (t = 2.16, p < 0.05). Consequently, it can be said that nurse managers have more innovativeness than nurses and tend to take more risks and focus more on opportunities.
Keywords: Focusing on opportunity attitudes, innovativeness, risk taking, nurse.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2477740 Impact of Egypt’s Energy Demand on Oil and Gas Power Systems Environment
Authors: Moustafa Osman Mohamed
Abstract:
This paper will explore the influence of energy sector in Arab Republic of Egypt which has shared its responsibilities of many environmental challenges as the second largest economy in the Middle East (after Iran). Air and water pollution, desertification, inadequate disposal of solid waste and damage to coral reefs are serious problems that influence environmental management in Egypt. The intensive reliance of high population density and strong industrial growth are wearing Egypt's resources, and the rapidly-growing population has forced Egypt to breakdown agricultural land to residential and relevant use of commercial ingestion. The depletion effects of natural resources impose the government to apply innovation techniques in emission control and focus on sustainability. The cogeneration will be presented to control thermal losses and increase efficiency of energy power system.
Keywords: Cogeneration, energy indicators, power plant, electricity, environmental loads, environmental impact assessment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1494739 Image Segmentation Based on Graph Theoretical Approach to Improve the Quality of Image Segmentation
Authors: Deepthi Narayan, Srikanta Murthy K., G. Hemantha Kumar
Abstract:
Graph based image segmentation techniques are considered to be one of the most efficient segmentation techniques which are mainly used as time & space efficient methods for real time applications. How ever, there is need to focus on improving the quality of segmented images obtained from the earlier graph based methods. This paper proposes an improvement to the graph based image segmentation methods already described in the literature. We contribute to the existing method by proposing the use of a weighted Euclidean distance to calculate the edge weight which is the key element in building the graph. We also propose a slight modification of the segmentation method already described in the literature, which results in selection of more prominent edges in the graph. The experimental results show the improvement in the segmentation quality as compared to the methods that already exist, with a slight compromise in efficiency.Keywords: Graph based image segmentation, threshold, Weighted Euclidean distance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563738 Comparative Analysis of Farm Enterprises Performance in Two Agro-Ecological Feuding Zone of Nigeria
Authors: Bolarinwa K.K., Oyeyinka R.A
Abstract:
The two agro-ecological zones became the focus of the study because of violent nature of the incessant conflict in the zones. The available register of farmers association was the sampling frame work where ten percent (61) farmers per state were randomly sampled. Data were collected and analysed using z-test. The research findings revealed tree crops and grains production enterprises ranked higher in Osun (rain fed zones) and Taraba states (savannah zones) respectively. Osun state entrepreneur felt the effect of the conflict on their enterprises more than Tarba state. The reasons adduced for severity of the conflict on enterprises are majority (77.0%) migrated and (75.5%) of them were not allowed to enter their farms during and when conflict deescalated unlike situation in Taraba state. The different in enterprises production level between the two agroecological zone was statistically significant at p<0.05. The conflict had severe impact on farm enterprises.Keywords: Conflict, severity, entrepreneurs, farm enterprises and production level.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2040737 Relationship between Facebook Usage and the Student Engagement of Sri Lankan Management Undergraduates
Authors: L. C. H. Jayarathna, W. M. N. Fernando
Abstract:
Academics and researchers are interested in the effects of social media on college students, with a specific focus on the most popular social media website; Facebook. Previous studied have found contradictory result on the relationship between Facebook usage and the student engagement with positive, detrimental and no significant relationships. However, these studies were limited to western higher education system. This paper fills a gap in the literature by using a sample (300) of Sri Lankan management undergraduates to examine the relationship between Facebook usage and student engagement. Student engagement was measured 35 item scale based on the National Survey of Student Engagement and Facebook usage by Facebook intensity scale. Descriptive statistics, path analysis and structural equation modeling were applied as statistical tools and techniques. Results indicate that student engagement scale was significantly negatively related with the Facebook usage with the influence from student engagement on Facebook usage.
Keywords: Facebook Intensity, Social Networking Sites, Student Engagement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3748736 Core Issues Affecting Software Architecture in Enterprise Projects
Authors: Halûk Gümüşkaya
Abstract:
In this paper we analyze the core issues affecting software architecture in enterprise projects where a large number of people at different backgrounds are involved and complex business, management and technical problems exist. We first give general features of typical enterprise projects and then present foundations of software architectures. The detailed analysis of core issues affecting software architecture in software development phases is given. We focus on three main areas in each development phase: people, process, and management related issues, structural (product) issues, and technology related issues. After we point out core issues and problems in these main areas, we give recommendations for designing good architecture. We observed these core issues and the importance of following the best software development practices and also developed some novel practices in many big enterprise commercial and military projects in about 10 years of experience.Keywords: Software architecture, enterprise projects.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3605735 Media and Information Literacy (MIL) for Thai Youths
Authors: Waralak Vongdoiwang Siricharoen, Nattanun Siricharoen
Abstract:
The objectives of this study are to determine the role of media that influence the values, attitudes and behaviors of Thai youths. Analytical qualitative research techniques were used for this purpose. Data collection based techniques was used which were individual interviews and focus group discussions with journalists, sample of high school and university students, and parents. The results show that “Social Media" is still the most popular media for Thai youths. It is also still in the hands of the marketing business and it can motivate Thai youths to do so many things. The main reasons of media exposure are to find quality information that they want quickly, get satisfaction and can use social media to get more exciting and to build communities. They believe that the need for media and information literacy skills is defined as making judgments, personal integrity, training of family and the behavior of close friends.
Keywords: Media and Information Literacy, Making Judgments, Personal integrity, Behavior of close friends
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2789734 The Impact of Seasonality on Rainfall Patterns: A Case Study
Authors: Priti Kaushik, Randhir Singh Baghel, Somil Khandelwal
Abstract:
This study uses whole-year data from Rajasthan, India, at the meteorological divisional level to analyze and evaluate long-term spatiotemporal trends in rainfall and looked at the data from each of the thirteen tehsils in the Jaipur district to see how the rainfall pattern has altered over the last 10 years. Data on daily rainfall from the Indian Meteorological Department (IMD) in Jaipur are available for the years 2012 through 2021. We mainly focus on comparing data of tehsil wise in the Jaipur district, Rajasthan, India. Also analyzed is the fact that July and August always see higher rainfall than any other month. Rainfall usually starts to rise around week 25th and peaks in weeks 32nd or 33rd. They showed that on several occasions, 2017 saw the least amount of rainfall during a long span of 10 years. The greatest rain fell between 2012 and 2021 in 2013, 2019, and 2020.
Keywords: Data analysis, extreme events, rainfall, descriptive case studies, precipitation temperature.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 190733 Design of Roller Compacting Concrete Pavement
Authors: O. Zarrin, M. Ramezan Shirazi
Abstract:
The quality of concrete is usually defined by compressive strength, but flexural strength is the most important characteristic of concrete in a pavement which control the mix design of concrete instead of compressive strength. Therefore, the aggregates which are selected for the pavements are affected by higher flexural strength. Roller Compacting Concrete Pavement (RCCP) is not a new construction method. The other characteristic of this method is no bleeding and less shrinkage due to the lower amount of water. For this purpose, a roller is needed for placing and compacting. The surface of RCCP is not smooth; therefore, the most common use of this pavement is in an industrial zone with slower traffic speed which requires durable and tough pavement. For preparing a smoother surface, it can be achieved by asphalt paver. RCCP decrease the finishing cost because there are no bars, formwork, and the lesser labor need for placing the concrete. In this paper, different aspect of RCCP such as mix design, flexural, compressive strength and focus on the different part of RCCP on detail have been investigated.Keywords: Flexural Strength, Compressive Strength, Pavement, Asphalt.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2064732 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain
Authors: Tarun Chand, Michael Jurczyk
Abstract:
With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries; these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.
Keywords: Blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 69731 Modular Data and Calculation Framework for a Technology-Based Mapping of the Manufacturing Process According to the Value Stream Management Approach
Authors: Tim Wollert, Fabian Behrendt
Abstract:
Value Stream Management (VSM) is a widely used methodology in the context of Lean Management for improving end-to-end material and information flows from a supplier to a customer from a company’s perspective. Whereas the design principles, e.g. Pull, value-adding, customer-orientation and further ones are still valid against the background of an increasing digitalized and dynamic environment, the methodology itself for mapping a value stream is characterized as time- and resource-intensive due to the high degree of manual activities. The digitalization of processes in the context of Industry 4.0 enables new opportunities to reduce these manual efforts and make the VSM approach more agile. The paper at hand aims at providing a modular data and calculation framework, utilizing the available business data, provided by information and communication technologies for automizing the value stream mapping process with focus on the manufacturing process.
Keywords: Industry 4.0, lean management 4.0, value stream management 4.0, value stream mapping.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 369730 iDENTM Phones Automated Stress Testing
Authors: Wei Hoo Chong
Abstract:
System testing is actually done to the entire system against the Functional Requirement Specification and/or the System Requirement Specification. Moreover, it is an investigatory testing phase, where the focus is to have almost a destructive attitude and test not only the design, but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software/hardware requirements specifications. In Motorola®, Automated Testing is one of the testing methodologies uses by GSG-iSGT (Global Software Group - iDEN TM Subcriber Group-Test) to increase the testing volume, productivity and reduce test cycle-time in iDEN TM phones testing. Testing is able to produce more robust products before release to the market. In this paper, iHopper is proposed as a tool to perform stress test on iDEN TM phonse. We will discuss the value that automation has brought to iDEN TM Phone testing such as improving software quality in the iDEN TM phone together with some metrics. We will also look into the advantages of the proposed system and some discussion of the future work as well.Keywords: Testing, automated testing, stress testing, software quality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1490729 Robust Coherent Noise Suppression by Point Estimation of the Cauchy Location Parameter
Authors: Ephraim Gower, Thato Tsalaile, Monageng Kgwadi, Malcolm Hawksford.
Abstract:
This paper introduces a new point estimation algorithm, with particular focus on coherent noise suppression, given several measurements of the device under test where it is assumed that 1) the noise is first-order stationery and 2) the device under test is linear and time-invariant. The algorithm exploits the robustness of the Pitman estimator of the Cauchy location parameter through the initial scaling of the test signal by a centred Gaussian variable of predetermined variance. It is illustrated through mathematical derivations and simulation results that the proposed algorithm is more accurate and consistently robust to outliers for different tailed density functions than the conventional methods of sample mean (coherent averaging technique) and sample median search.
Keywords: Central limit theorem, Fisher-Cramer Rao, gamma function, Pitman estimator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1922728 Abnormal IP Packets on 3G Mobile Data Networks
Authors: Joo-Hyung Oh, Dongwan Kang, JunHyung Cho, Chaetae Im
Abstract:
As the mobile Internet has become widespread in recent years, communication based on mobile networks is increasing. As a result, security threats have been posed with regard to the abnormal traffic of mobile networks, but mobile security has been handled with focus on threats posed by mobile malicious codes, and researches on security threats to the mobile network itself have not attracted much attention. In mobile networks, the IP address of the data packet is a very important factor for billing purposes. If one mobile terminal use an incorrect IP address that either does not exist or could be assigned to another mobile terminal, billing policy will cause problems. We monitor and analyze 3G mobile data networks traffics for a period of time and finds some abnormal IP packets. In this paper, we analyze the reason for abnormal IP packets on 3G Mobile Data Networks. And we also propose an algorithm based on IP address table that contains addresses currently in use within the mobile data network to detect abnormal IP packets.
Keywords: WCDMA, 3G, Abnormal IP address, Mobile Data Network Attack
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2337727 An Empirical Investigation of Big Data Analytics: The Financial Performance of Users versus Vendors
Authors: Evisa Mitrou, Nicholas Tsitsianis, Supriya Shinde
Abstract:
In the age of digitisation and globalisation, businesses have shifted online and are investing in big data analytics (BDA) to respond to changing market conditions and sustain their performance. Our study shifts the focus from the adoption of BDA to the impact of BDA on financial performance. We explore the financial performance of both BDA-vendors (business-to-business) and BDA-clients (business-to-customer). We distinguish between the five BDA-technologies (big-data-as-a-service (BDaaS), descriptive, diagnostic, predictive, and prescriptive analytics) and discuss them individually. Further, we use four perspectives (internal business process, learning and growth, customer, and finance) and discuss the significance of how each of the five BDA-technologies affect the performance measures of these four perspectives. We also present the analysis of employee engagement, average turnover, average net income, and average net assets for BDA-clients and BDA-vendors. Our study also explores the effect of the COVID-19 pandemic on business continuity for both BDA-vendors and BDA-clients.
Keywords: BDA-clients, BDA-vendors, big data analytics, financial performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 613726 Parametric Transition as a Spiral Curve and Its Application in Spur Gear Tooth with FEA
Authors: S. H. Yahaya, J. M. Ali, T.A. Abdullah
Abstract:
The exploration of this paper will focus on the Cshaped transition curve. This curve is designed by using the concept of circle to circle where one circle lies inside other. The degree of smoothness employed is curvature continuity. The function used in designing the C-curve is Bézier-like cubic function. This function has a low degree, flexible for the interactive design of curves and surfaces and has a shape parameter. The shape parameter is used to control the C-shape curve. Once the C-shaped curve design is completed, this curve will be applied to design spur gear tooth. After the tooth design procedure is finished, the design will be analyzed by using Finite Element Analysis (FEA). This analysis is used to find out the applicability of the tooth design and the gear material that chosen. In this research, Cast Iron 4.5 % Carbon, ASTM A-48 is selected as a gear material.Keywords: Bézier-like cubic function, Curvature continuity, Cshapedtransition curve, Spur gear tooth.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2340725 Classifier Combination Approach in Motion Imagery Signals Processing for Brain Computer Interface
Authors: Homayoon Zarshenas, Mahdi Bamdad, Hadi Grailu, Akbar A. Shakoori
Abstract:
In this study we focus on improvement performance of a cue based Motor Imagery Brain Computer Interface (BCI). For this purpose, data fusion approach is used on results of different classifiers to make the best decision. At first step Distinction Sensitive Learning Vector Quantization method is used as a feature selection method to determine most informative frequencies in recorded signals and its performance is evaluated by frequency search method. Then informative features are extracted by packet wavelet transform. In next step 5 different types of classification methods are applied. The methodologies are tested on BCI Competition II dataset III, the best obtained accuracy is 85% and the best kappa value is 0.8. At final step ordered weighted averaging (OWA) method is used to provide a proper aggregation classifiers outputs. Using OWA enhanced system accuracy to 95% and kappa value to 0.9. Applying OWA just uses 50 milliseconds for performing calculation.Keywords: BCI, EEG, Classifier, Fuzzy operator, OWA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1876724 Tax Morale Dimensions Analysis in Portugal and Spain
Authors: Cristina Sá, Carlos Gomes, António Martins
Abstract:
The reasons that explain different behaviors towards tax obligations in similar countries are not completely understood yet. The main purpose of this paper is to identify and compare the factors that influence tax morale levels in Portugal and Spain. We use data from European Values Study (EVS). Using a sample of 2,652 individuals, a factor analysis was used to extract the underlying dimensions of tax morale of Portuguese and Spanish taxpayers. Based on a factor analysis, the results of this paper show that sociological and behavioral factors, psychological factors and political factors are important for a good understanding of taxpayers’ behavior in Iberian Peninsula. This paper added value relies on the analyses of a wide range of variables and on the comparison between Portugal and Spain. Our conclusions provided insights that tax authorities and politicians can use to better focus their strategies and actions in order to increase compliance, reduce tax evasion, fight underground economy and increase country´s competitiveness.Keywords: Compliance, tax morale, Portugal, Spain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1002723 Prerequisites to Increase the Purchase Intent fora Socially Responsible Company –Development of a Scale
Authors: Tutku Eker Iscioglu
Abstract:
Increasing attention has been given in academia to the concept of corporate social responsibility. Also, the number of companies that undertake social responsibility initiatives has been boosting day by day since behaving in a socially responsible manner brings a lot to the companies. Literature provides various benefits of social responsibility and under which situations these benefits could be realized. However, most of these studies focus on one aspect of the consequences of behaving in a socially responsible manner and there is no study that unifies the conditions that a company should fulfill to make customers prefer its brand. This study aims to fill this gap. More specifically, the purpose of this study is to identify the conditions that a socially responsible company should fulfill in order to attract customers. To this end, a scale is developed and its reliability and validity is assessed through the method of Multitrait- Multimethod Matrix.
Keywords: Consumers, Corporate Social Responsibility, Multitrait-Multimethod Matrix, Scale Development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1507722 A Method to Annotate Programs with High-Level Knowledge of Computation
Authors: Nobuhiko Hishinuma, Jun Igari, Rentaro Yoshioka
Abstract:
When programming in languages such as C, Java, etc., it is difficult to reconstruct the programmer's ideas only from the program code. This occurs mainly because, much of the programmer's ideas behind the implementation are not recorded in the code during implementation. For example, physical aspects of computation such as spatial structures, activities, and meaning of variables are not required as instructions to the computer and are often excluded. This makes the future reconstruction of the original ideas difficult. AIDA, which is a multimedia programming language based on the cyberFilm model, can solve these problems allowing to describe ideas behind programs using advanced annotation methods as a natural extension to programming. In this paper, a development environment that implements the AIDA language is presented with a focus on the annotation methods. In particular, an actual scientific numerical computation code is created and the effects of the annotation methods are analyzed.Keywords: cyberFilm, development environment, knowledge engineering, multimedia programming language
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1282721 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks
Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi
Abstract:
Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.
Keywords: Fiber-Wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2124