Search results for: public listed housing developers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1438

Search results for: public listed housing developers

988 An Experiment of Three-Dimensional Point Clouds Using GoPro

Authors: Jong-hwa Kim, Mu-wook Pyeon, Yang-dam Eo, Ill-woong Jang

Abstract:

Construction of geo-spatial information recently tends to develop as multi-dimensional geo-spatial information. People constructing spatial information is also expanding its area to the general public from some experts. As well as, studies are in progress using a variety of devices, with the aim of near real-time update. In this paper, getting the stereo images using GoPro device used widely also to the general public as well as experts. And correcting the distortion of the images, then by using SIFT, DLT, is acquired the point clouds. It presented a possibility that on the basis of this experiment, using a video device that is readily available in real life, to create a real-time digital map.

Keywords: GoPro, SIFT, DLT, Point Clouds.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3292
987 Secure Block-Based Video Authentication with Localization and Self-Recovery

Authors: Ammar M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, Bernd Michaelis

Abstract:

Because of the great advance in multimedia technology, digital multimedia is vulnerable to malicious manipulations. In this paper, a public key self-recovery block-based video authentication technique is proposed which can not only precisely localize the alteration detection but also recover the missing data with high reliability. In the proposed block-based technique, multiple description coding MDC is used to generate two codes (two descriptions) for each block. Although one block code (one description) is enough to rebuild the altered block, the altered block is rebuilt with better quality by the two block descriptions. So using MDC increases the ratability of recovering data. A block signature is computed using a cryptographic hash function and a doubly linked chain is utilized to embed the block signature copies and the block descriptions into the LSBs of distant blocks and the block itself. The doubly linked chain scheme gives the proposed technique the capability to thwart vector quantization attacks. In our proposed technique , anyone can check the authenticity of a given video using the public key. The experimental results show that the proposed technique is reliable for detecting, localizing and recovering the alterations.

Keywords: Authentication, hash function, multiple descriptioncoding, public key encryption, watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1902
986 Challenges of Sustainable Construction in Kuwait: Investigating level of Awareness of Kuwait Stakeholders

Authors: Shaikha AlSanad , Andrew Gale, Rodger Edwards

Abstract:

Buildings and associated construction methods have a significant impact on the environment. As construction activity increases in Kuwait, there is a need to create design and construction strategies which will minimize the environmental impact of new buildings. Green construction is a design philosophy intended to improve the sustainability of construction by the minimization of resource depletion and CO2 emissions throughout the life cycle of buildings. This paper presents and discusses the results of a survey that was conducted in Kuwait, with the objective of investigating the awareness of developers and other stakeholders regarding their understanding and use of green construction strategies. The results of the survey demonstrate that whilst there seems to be a reasonable level of awareness amongst the stakeholders, this awareness is not currently well reflected in the design and construction practices actually being applied. It is therefore concluded is there is a pressing need for intervention from Government in order that the use of sustainable green design and construction strategies becomes the norm in Kuwait.

Keywords: Sustainability, Sustainable construction, Green Building, Environmental assessment

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3079
985 Social Structure, Involuntary Relations, and Urban Poverty

Authors: Mahmood Niroobakhsh

Abstract:

This article deals with special structuralism approaches to explain a certain kind of social problem. Widespread presence of poverty is a reminder of deep-rooted unresolved problems of social relations. The expected role from an individual for the social system recognizes poverty derived from an interrelated social structure. By the time, enabled to act on his role in the course of social interaction, reintegration of the poor in society may take place. Poverty and housing type are reflections of the underlying social structure, primarily structure’s elements, systemic interrelations, and the overall strength or weakness of that structure. Poverty varies based on social structure in that the stronger structures are less likely to produce poverty.

Keywords: Absolute poverty, relative poverty, social structure, urban poverty.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1641
984 Taking People, Process and Partnership on Board for Participatory Decision Making

Authors: B. Mikulskienė

Abstract:

Public administration institutions in cooperation with politicians are not the sole policy decision makers in full meaning any longer. Meanwhile, a special role, namely steering the decision making process, could be delegated to them. Despite the wide scientific discussion on different aspects what has direct impact on policy creation, there is a lack of holistic practical managerial advice, which could integrate infrastructure of policy decision making with intellectual capital and with interconnection of partnership. The proposed harmonized decision making model of process, people and partnership entitled by acronym HM-3P is analyzed as a framework for implementation of public administration steering role seeking the coherent social involvement in policy decision making.

Keywords: participatory decision making, partnership, stakeholders.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1425
983 Performance Shortfalls and Corporate Recidivism: A Contingency Approach

Authors: Kepeng Li

Abstract:

This paper examines the phenomenon of recidivism in the Chinese stock market, emphasizing the significance of mitigating repeat offences within the corporate domain. Using a contingency model and data from Chinese publicly listed companies (1999-2018), the study investigates the impact of underperformance, governance factors, and managerial traits on unethical conduct. The research suggests that persistently unmet economic objectives can foster problem-focused exploration, potentially leading to misconduct. Furthermore, the study considers the unique cultural context of China, where “guanxi” and corruption may influence corporate behavior. It concludes that governance mechanisms play a pivotal role in regulating corporate behavior, underscoring the necessity for enhanced oversight and enforcement of corporate governance standards.

Keywords: Recidivism, corporate misbehavior, BTOF, aspiration level, corporate governance, individual characteristics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34
982 How Prior Knowledge Affects User's Understanding of System Requirements?

Authors: Balsam Mustafa, Safaai Deris

Abstract:

Requirements are critical to system validation as they guide all subsequent stages of systems development. Inadequately specified requirements generate systems that require major revisions or cause system failure entirely. Use Cases have become the main vehicle for requirements capture in many current Object Oriented (OO) development methodologies, and a means for developers to communicate with different stakeholders. In this paper we present the results of a laboratory experiment that explored whether different types of use case format are equally effective in facilitating high knowledge user-s understanding. Results showed that the provision of diagrams along with the textual use case descriptions significantly improved user comprehension of system requirements in both familiar and unfamiliar application domains. However, when comparing groups that received models of textual description accompanied with diagrams of different level of details (simple and detailed) we found no significant difference in performance.

Keywords: Prior knowledge, requirement specification, usecase format, user understanding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1212
981 Aggressive Interactions in Hospital Emergency Units

Authors: C. Blatier, M. El Methni, F. Carpentier, S. Abdellaoui, C. Kock, M. Maillard

Abstract:

International literature emphasizes on the concern regarding the phenomenon of aggression in hospital. This paper focuses on the reality of aggressive interactions reigning within an emergency triage involving three chaps of protagonists: the professionals, the patients and their carers. The data collection was made from a grid of observation, in which the various variables exposed in the literature were integrated. They observations took place around the clock, for three weeks, at the rate of one week a month. In this research 331 aggressive interactions have been listed and analyzed by means of the software SPSS. This research is one of the very few continuous observation surveys in the literature. It shows the various human factors at play in the emergence of aggressive interaction. The data may be used both for taking steps in primary prevention, thanks to the analysis of interaction modes, and in secondary prevention by integrating the useful results in situational prevention.

Keywords: Aggressive interaction, emergency unit, observational study.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1966
980 Sense of Territoriality and Revitalization of Neighborhood Centers in Boshrooyeh City

Authors: H. Farkisch, A.I. Che-Ani, V. Ahmadi, M. Surat

Abstract:

The role of neighborhood center as semi public (the balance space) is disappeared in bonding between private and public in new urbanism. In this way, a hierarchical principle in the traditional neighborhood center appears to create or develop the conditions for residents` relationships and belonging. This paper evaluates significant of hierarchical principles of the neighborhood center in residents` territoriality and its factors. In this way Miandeh neighborhood center from Boshrooyeh city was determined as a case study area. Results indicated that a hierarchical principle is the best instrument to improve the territoriality as the subcomponent of place belonging in residents. The findings help the urban designer to revitalization the neighborhoods and proceedings in organization of physical space.

Keywords: Belonging, Neighborhood center, Revitalization, Territoriality

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1754
979 Entrepreneurial Promotion among Farmers: the Early Impacts

Authors: René Díaz-Pichardo, Cecilia Cantú-González, Patricia López-Hernández

Abstract:

The development of entrepreneurial competences of farmers has been pointed out as a necessary condition for the modernization of land in facing the phenomenon of globalization. However, the educational processes involved in such a development have been studied little, especially in emerging economies. This research aims to enlighten some of the critical issues behind the early stages of the transformation of farmers into entrepreneurs, through in depth interviews with farmers, entrepreneurial promoters and public officials participating in a public pilot project in Mexico. Although major impacts were expected only in the long run, important positive changes in the mind set of farmers and other participants were found in early stages of the intervention. Apparently, the farmers started a process of becoming more conscious about the importance of preserving the aquiferous resources, as well as more market and entrepreneurial oriented.

Keywords: entrepreneurial training, farmers, land development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1540
978 The Capacity Building in the Natural Disaster Management of Thailand

Authors: Eakarat Boonreang

Abstract:

The past two decades, Thailand faced the natural disasters, for instance, Gay typhoon in 1989, tsunami in 2004, and huge flood in 2011. The disaster management in Thailand was improved both structure and mechanism for cope with the natural disaster since 2007. However, the natural disaster management in Thailand has various problems, for examples, cooperation between related an organizations have not unity, inadequate resources, the natural disaster management of public sectors not proactive, people has not awareness the risk of the natural disaster, and communities did not participate in the natural disaster management. Objective of this study is to find the methods for capacity building in the natural disaster management of Thailand. The concept and information about the capacity building and the natural disaster management of Thailand were reviewed and analyzed by classifying and organizing data. The result found that the methods for capacity building in the natural disaster management of Thailand should be consist of 1) link operation and information in the natural disaster management between nation, province, local and community levels, 2) enhance competency and resources of public sectors which relate to the natural disaster management, 3) establish proactive natural disaster management both planning and implementation, 4) decentralize the natural disaster management to local government organizations, 5) construct public awareness in the natural disaster management to community, 6) support Community Based Disaster Risk Management (CBDRM) seriously, and 7) emphasis on participation in the natural disaster management of all stakeholders.

Keywords: Capacity Building, Community Based Disaster Risk Management, Natural Disaster Management, Thailand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3210
977 Modelling Customer's Attitude Towards E-Government Services

Authors: Norazah Mohd Suki, T Ramayah

Abstract:

e-Government structures permits the government to operate in a more transparent and accountable manner of which it increases the power of the individual in relation to that of the government. This paper identifies the factors that determine customer-s attitude towards e-Government services using a theoretical model based on the Technology Acceptance Model. Data relating to the constructs were collected from 200 respondents. The research model was tested using Structural Equation Modeling (SEM) techniques via the Analysis of Moment Structure (AMOS 16) computer software. SEM is a comprehensive approach to testing hypotheses about relations among observed and latent variables. The proposed model fits the data well. The results demonstrated that e- Government services acceptance can be explained in terms of compatibility and attitude towards e-Government services. The setup of the e-Government services will be compatible with the way users work and are more likely to adopt e-Government services owing to their familiarity with the Internet for various official, personal, and recreational uses. In addition, managerial implications for government policy makers, government agencies, and system developers are also discussed.

Keywords: E-government, structural equation modelling, attitude, service.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2176
976 Comparative Analysis and Evaluation of Software Vulnerabilities Testing Techniques

Authors: Khalid Alnafjan, Tazar Hussain, Hanif Ullah, Zia ul haq Paracha

Abstract:

Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.

Keywords: Software Security, Security Testing, Testing techniques, vulnerability, AHP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2865
975 An Application for Risk of Crime Prediction Using Machine Learning

Authors: Luis Fonseca, Filipe Cabral Pinto, Susana Sargento

Abstract:

The increase of the world population, especially in large urban centers, has resulted in new challenges particularly with the control and optimization of public safety. Thus, in the present work, a solution is proposed for the prediction of criminal occurrences in a city based on historical data of incidents and demographic information. The entire research and implementation will be presented start with the data collection from its original source, the treatment and transformations applied to them, choice and the evaluation and implementation of the Machine Learning model up to the application layer. Classification models will be implemented to predict criminal risk for a given time interval and location. Machine Learning algorithms such as Random Forest, Neural Networks, K-Nearest Neighbors and Logistic Regression will be used to predict occurrences, and their performance will be compared according to the data processing and transformation used. The results show that the use of Machine Learning techniques helps to anticipate criminal occurrences, which contributed to the reinforcement of public security. Finally, the models were implemented on a platform that will provide an API to enable other entities to make requests for predictions in real-time. An application will also be presented where it is possible to show criminal predictions visually.

Keywords: Crime prediction, machine learning, public safety, smart city.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1247
974 Delineating Students’ Speaking Anxieties and Assessment Gaps in Online Speech Performances

Authors: Mary Jane B. Suarez

Abstract:

Speech anxiety is innumerable in any traditional communication classes especially for ESL students. The speech anxiety intensifies when communication skills assessments have taken its toll in an online mode of learning due to the perils of the COVID-19 virus. Teachers and students have experienced vast ambiguity on how to realize a still effective way to teach and learn various speaking skills amidst the pandemic. This mixed method study determined the factors that affected the public speaking skills of students in online performances, delineated the assessment gaps in assessing speaking skills in an online setup, and recommended ways to address students’ speech anxieties. Using convergent parallel design, quantitative data were gathered by examining the desired learning competencies of the English course including a review of the teacher’s class record to analyze how students’ performances reflected a significantly high level of anxiety in online speech delivery. Focus group discussion was also conducted for qualitative data describing students’ public speaking anxiety and assessment gaps. Results showed a significantly high level of students’ speech anxiety affected by time constraints, use of technology, lack of audience response, being conscious of making mistakes, and the use of English as a second language. The study presented recommendations to redesign curricular assessments of English teachers and to have a robust diagnosis of students’ speaking anxiety to better cater to the needs of learners in attempt to bridge any gaps in cultivating public speaking skills of students as educational institutions segue from the pandemic to the post-pandemic milieu.

Keywords: Blended learning, communication skills assessment, online speech delivery, public speaking anxiety, speech anxiety.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 133
973 Study and Design of Patient Flow at the Medicine Department of a University Hospital

Authors: P. Prudtikul, S. Pathomsiri

Abstract:

Most, if not all, public hospitals in Thailand have encountered a common problem regarding the increasing demand for medical services. The increasing number of patients causes so much strain on the hospital-s services, over-crowded, overloaded working hours, staff fatigue, medical error and long waiting time. This research studied the characteristics of operational processes of the medical care services at the medicine department in a large public university hospital. The research focuses on details regarding methods, procedures, processes, resources, and time management in overall processes. The simulation model is used as a tool to analyze the impact of various improvement strategies.

Keywords: Patient flow, medicine department, simulation, outpatient department.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3245
972 SIP Authentication Scheme using ECDH

Authors: Aytunc Durlanik, Ibrahim Sogukpinar

Abstract:

SIP (Session Initiation Protocol), using HTML based call control messaging which is quite simple and efficient, is being replaced for VoIP networks recently. As for authentication and authorization purposes there are many approaches and considerations for securing SIP to eliminate forgery on the integrity of SIP messages. On the other hand Elliptic Curve Cryptography has significant advantages like smaller key sizes, faster computations on behalf of other Public Key Cryptography (PKC) systems that obtain data transmission more secure and efficient. In this work a new approach is proposed for secure SIP authentication by using a public key exchange mechanism using ECC. Total execution times and memory requirements of proposed scheme have been improved in comparison with non-elliptic approaches by adopting elliptic-based key exchange mechanism.

Keywords: SIP, Elliptic Curve Cryptography, voice over IP.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2493
971 Motivation among the Managers in Construction Companies

Authors: A.Marisa, Nor'Aini Yusof

Abstract:

Managers as the key employees have a very important role in maintaining the workforce performance which is critical to the construction companies- success in the future. If motivated employees start with motivated managers probably it would seem plausible if the de-motivated ones start with de-motivated managers. This study aims to analyze the importance of motivated managers to their successes and construction companies- successes. In this study, a quantitative method was used and the study area was in Medan, North Sumatera. Questionnaire survey was distributed directly to construction companies in Medan which are listed in the Construction Services Development Board. A total of 60 managers responded and the completed questionnaires were analyzed using the descriptive analysis. The results indicated that the respondents acknowledge the importance of motivation among themselves to the projects and construction companies- success, implying that it is vital to maintain the motivation and good performance of the workforce.

Keywords: construction companies, managers, motivation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2337
970 Land Reclamation Using Waste as Fill Material: A Case Study in Jakarta

Authors: Q. Han, W. Schaefer, N. Barry

Abstract:

To coop with urbanization issues and the economic need for expansion, the city of Jakarta is planning to reclaim more land in the Jakarta Bay. However, the reclamation activities of some islands have barely started and already the developers are facing difficulties in finding sufficient quantities of sand as fill material. When addressing the problem of sand scarcity in the case of Jakarta where, an excess of waste production, an inadequate solid waste management system and a lack of dumping ground pose a major problem, it is hard not to think of the use of waste as alternative fill material. This paper analyses the possibilities of using waste in the land reclamation projects, considering the governmental, social, environmental and economic context of the city. The results identify types of waste that could be used, ways of using those types of waste and implementation conditions for the city of Jakarta.

Keywords: Waste Management systems, Land reclamation, Multi Criteria Analysis, Scenario planning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5319
969 Formal Specification of Web Services Applications for Digital Reference Services of Library Information System

Authors: Zainab M. Musa, Nordin M. A. Rahman, Julaily A. Jusoh

Abstract:

Digital reference service is when a traditional library reference service is provided electronically. In most cases users do not get full satisfaction from using digital reference service due to variety of reasons. This paper discusses the formal specification of web services applications for digital reference services (WSDRS). WSDRS is an informal model that claims to reduce the problems of digital reference services in libraries. It uses web services technology to provide efficient digital way of satisfying users’ need in the reference section of libraries. Informal model is in natural language which is inconsistent and ambiguous that may cause difficulties to the developers of the system. In order to solve this problem we decided to convert the informal specifications into formal specifications. This is supposed to reduce the overall development time and cost. We use Z language to develop the formal model and verify it with Z/EVES theorem prover tool.

Keywords: Formal, specifications, web services, digital reference services.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1587
968 The Portuguese Press Portrait of “Environmental Refugees“

Authors: Inês Vieira

Abstract:

The migration-environment nexus has gained increased interest from the social research field over the last years. While straightly connected to human security issues, this theme has pervaded through the media to the public sphere. Therefore, it is important to observe how did the discussions over environmentally induced migrations develop from the scientific basis to the media attention, passing through some political voices, and in which ways might these messages be interpreted within the broader public discourses. To achieve this purpose, the analysis of the press entries between 2004 and 2010 in three of the main Portuguese newspapers shall be presented, specially reflecting upon the events, protagonists, topics, geographical attributions and terms/expressions used to define those who migrate due to environmental degradation or disasters.

Keywords: Climate refugees, environmental refugees, environmentally induced migrations, Portuguese written press

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1528
967 A Study on the Determinants of Earnings Response Coefficient in an Emerging Market

Authors: Bita Mashayekhi, Zeynab Lotfi Aghel

Abstract:

The determinants of Earnings Response Coefficient (ERC), including firm size, earnings growth, and earnings persistence are studied in this research. These determinants are supposed to be moderator variables that affect ERC and Return Response Coefficient. The research sample contains 82 Iranian listed companies in Tehran Stock Exchange (TSE) from 2001 to 2012. Gathered data have been processed by EVIEWS Software. Results show a significant positive relation between firm size and ERC, and also between earnings growth and ERC; however, there is no significant relation between earnings persistence and ERC. Also, the results show that ERC will be increased by firm size and earnings growth, but there is no relation between earnings persistence and ERC.

Keywords: Earnings response coefficient, return response coefficient, firm size, earnings growth, earnings persistence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2189
966 Association between Job Satisfaction, Motivation and Five Factors of Organizational Citizenship Behavior

Authors: K. Mushtaq, M. Umar

Abstract:

The research aims to study the association between job satisfaction, motivation and the five factors of organizational citizenship behavior (i.e. Altruism, Conscientiousness, Sportsmanship, Courtesy and Civic virtue) among Public Sector Employees in Pakistan. In this research Structure Equation Modeling with confirmatory factor analysis was used to test the relationship between two independent and five dependent variables. Data was collected through questionnaire survey from 152 Public Servants Working in Gujrat District-Pakistan in different capacities. Stratified Random Sampling Technique was used to conduct this survey. The results of the study indicate that five factors of OCB have positive significant relation with both motivation and job satisfaction except the relationship of Civic Virtue with Motivation. The research findings implicate that factors other than motivation and job satisfaction may also affect OCB. Likewise, all the five factors of OCB may not be present in all populations. Thus, Managers must concentrate on increasing motivation and job satisfaction to increase OCB. Furthermore, the present research gives a direction to future researchers to use more independent variables (e.g. Culture, leadership, workplace environment, various job attitudes, types of motivation, etc.) on different types of populations with larger sample size in order to find the reasons behind insignificant relationship of civic virtue with Motivation in the research in hand and to generalize the tested model.

Keywords: Five Factors of Organizational Citizenship Behavior (OCB), Motivation, Job Satisfaction, Public Sector Employees in Pakistan.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3134
965 Loan Guarantee Schemes: Private and Public Examples

Authors: Simeon Karafolas, Maciej Woźniak

Abstract:

Guarantee schemes have been introduced in the economic and financial system as response to difficulties of SMEs for the access to the banking credit. Guarantee companies first appeared at the 19e century. Last wave of the development of those schemes appeared at the decade of 1990’s in particular to the new countries members of the EU. Guarantee schemes are presented as public owned guarantee companies, private ones mainly through a mutual form, but also under a mixed form. The paper based on guarantee schemes of five countries tries to investigate the differences that can exist within different guarantee companies. This investigation is based on some indicators that are time of response to the demand of guarantee, threshold of guarantee, acceptance of applications for guarantee, jobs created or saved and bureaucratic issues. It appears that guarantee companies have not the same reaction to the demand of SMEs and some of them are much more active.

Keywords: DIFASS, Guarantees, Loans.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2974
964 Coordinated Q–V Controller for Multi-machine Steam Power Plant: Design and Validation

Authors: Jasna Dragosavac, Žarko Janda, J.V. Milanović, Dušan Arnautović

Abstract:

This paper discusses coordinated reactive power - voltage (Q-V) control in a multi machine steam power plant. The drawbacks of manual Q-V control are briefly listed, and the design requirements for coordinated Q-V controller are specified. Theoretical background and mathematical model of the new controller are presented next followed by validation of developed Matlab/Simulink model through comparison with recorded responses in real steam power plant and description of practical realisation of the controller. Finally, the performance of commissioned controller is illustrated on several examples of coordinated Q-V control in real steam power plant and compared with manual control.

Keywords: Coordinated Voltage Control, Power Plant Control, Reactive Power Control, Sensitivity Matrix

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2151
963 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: E-business, Mobile Applications, Risk mitigations, Security assurance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2468
962 Genetic Comparison of Two Different Arabian Oryx Populations in UAE Based on Microsatellite Analysis

Authors: Mohammed A. Khidhir, K. Praveen Kumar, Marwa Al-Aseer

Abstract:

This is a genetic comparison study of Arabian Oryx (Oryx leucoryx) population at two different locations (A &B) based on nuclear microsatellite DNA markers. Arabian Oryx is listed as vulnerable and endanger by the World Conservation Union (IUCN). Thirty microsatellite markers from bovine family were applied to investigate the genetic diversity of the Arabian Oryx and to set up a molecular inventory. Among 30 microsatellite markers used, 13 markers were moderately polymorphic. Arabian Oryx at location A has shown better gene diversity over location B. However, mean number of alleles were less than location B. Data of within population inbreeding coefficient indicates inbreeding at both locations (A&B). Based on the analysis of polymorphic microsatellite markers, the study revealed that Arabian Oryx need a genetically designed breeding program.

Keywords: Arabian oryx, Microsatellites

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1454
961 The Design of the Multi-Agent Classification System (MACS)

Authors: Mohamed R. Mhereeg

Abstract:

The paper discusses the design of a .NET Windows Service based agent system called MACS (Multi-Agent Classification System). MACS is a system aims to accurately classify spreadsheet developers competency over a network. It is designed to automatically and autonomously monitor spreadsheet users and gather their development activities based on the utilization of the software multi-agent technology (MAS). This is accomplished in such a way that makes management capable to efficiently allow for precise tailor training activities for future spreadsheet development. The monitoring agents of MACS are intended to be distributed over the WWW in order to satisfy the monitoring and classification of the multiple developer aspect. The Prometheus methodology is used for the design of the agents of MACS. Prometheus has been used to undertake this phase of the system design because it is developed specifically for specifying and designing agent-oriented systems. Additionally, Prometheus specifies also the communication needed between the agents in order to coordinate to achieve their delegated tasks.

Keywords: Classification, Design, MACS, MAS, Prometheus.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1629
960 Brazilian Constitution and the Fundamental Right to Sanitation

Authors: Michely Vargas Delpupo, José Geraldo Romanello Bueno

Abstract:

The right to basic sanitation, was elevated to the category of fundamental right by the Constitution of 1988 to protect the ecologically balanced environment, ensuring social rights to health and adequate housing and put the dignity of the human person as the foundation of the Brazilian Democratic State. Before their essentiality to humans, this article seeks to understand why universal access to basic sanitation is a goal so difficult to achieve in Brazil. Therefore, this research uses the deductive and analytical method. Given the nature of the research literature, research techniques were centered in specialized books on the subject, journals, theses and dissertations, laws, relevant law case and raising social indicators relating to the theme. The relevance of the topic stems, among other things, the fact that sanitation services are essential for a dignified life, i.e., everyone is entitled to the maintenance of the necessary existence conditions are satisfied. However, the effectiveness of this right is undermined in society, since Brazil has huge deficit in sanitation services, denying thus a worthy life to most of the population. Thus, it can be seen that the provision of water and sewage services in Brazil is still characterized by a large imbalance, since the municipalities with lower population index have greater disability in the sanitation service. The truth is that the precariousness of water and sewage services in Brazil is still very concentrated in the North and Northeast regions, limiting the effective implementation of the Law 11.445/2007 in the country. Therefore, there is urgent need for a positive service by the State in the provision of sanitation services in order to prevent and control disease, improve quality of life and productivity of individuals, besides preventing contamination of water resources. More than just social and economic necessity, there is a government duty to implement such services. In this sense, given the current scenario, to achieve universal access to basic sanitation imposes many hurdles. These are mainly in the field of properly formulated and implemented public policies, i.e., it requires an excellent institutional organization, management services, strategic planning, social control, in order to provide answers to complex challenges.

Keywords: Fundamental rights, sanitation, universal access.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1602
959 Tactical Urbanism and Sustainability: Tactical Experiences in the Promotion of Active Transportation

Authors: Aline Fernandes Barata, Adriana Sansão Fontes

Abstract:

The overvaluation of the use of automobile has detrimentally affected the importance of pedestrians within the city and consequently its public spaces. As a way of treating contemporary urban paradigms, Tactical Urbanism aims to recover and activate spaces through fast and easily-applied actions that demonstrate the possibility of large-scale and long-term changes in cities. Tactical interventions have represented an important practice of redefining public spaces and urban mobility. The concept of Active Transportation coheres with the idea of sustainable urban mobility, characterizing the means of transportation through human propulsion, such as walking and cycling. This paper aims to debate the potential of Tactical Urbanism in promoting Active Transportation by revealing opportunities of transformation in the urban space of contemporary cities through initiatives that promote the protection and valorization of the presence of pedestrians and cyclists in cities, and that subvert the importance of motorized vehicles. In this paper, we present the character of these actions in two different ways: when they are used as tests for permanent interventions and when they have pre-defined start and end periods. Using recent initiatives to illustrate, we aim to discuss the role of small-scale actions in promoting and incentivizing a more active, healthy, sustainable and responsive urban way of life, presenting how some of them have developed through public policies. For that, we will present some examples of tactical actions that illustrate the encouragement of Active Transportation and trials to balance the urban opportunities for pedestrians and cyclists. These include temporary closure of streets, the creation of new alternatives and more comfortable areas for walking and cycling, and the subversion of uses in public spaces where the usage of cars are predominant.

Keywords: Tactical urbanism, active transportation, sustainable mobility, non-motorized means.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1320