Search results for: financial situation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1260

Search results for: financial situation

750 Characteristics Analysis of Thermal Resistance of Cryogenic Pipeline in Vacuum Environment

Authors: Wang Zijuan, Ding Wenjing, Liu Ran

Abstract:

If an unsteady heat transfer or heat impulse happens in part of the cryogenic pipeline system of large space environment simulation equipment while running in vacuum environment, it will lead to abnormal flow of the cryogenic fluid in the pipeline. When the situation gets worse, the cryogenic fluid in the pipeline will have phase change and a gas block which results in the malfunction of the cryogenic pipeline system. Referring to the structural parameter of a typical cryogenic pipeline system and the basic equation, an analytical model and a calculation model for cryogenic pipeline system can be built. The various factors which influence the thermal resistance of a cryogenic pipeline system can be analyzed and calculated by using the qualitative analysis relation deduced for thermal resistance of pipeline. The research conclusion could provide theoretical support for the design and operation of a cryogenic pipeline system

Keywords: pipeline, vacuum, vapor quality

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1876
749 Innovation Strategy in Slovak Businesses

Authors: V. Lendel, M. Varmus

Abstract:

The aim of the paper is based on detailed analysis of literary sources and carried out research to develop a model development and implementation of innovation strategy in the business. The paper brings the main results of the authors conducted research on a sample of 462 respondents that shows the current situation in the Slovak enterprises in the use of innovation strategy. Carried out research and analysis provided the base for a model development and implementation of innovation strategy in the business, which is in the paper in detail, step by step explained with emphasis on the implementation process. Implementing the innovation strategy is described a separate model. Paper contains recommendations for successful implementation of innovation strategy in the business. These recommendations should serve mainly business managers as valuable tool in implementing the innovation strategy.

Keywords: innovation, innovation strategy, innovative management, innovative potential

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1707
748 Challenges to Technological Advancement in Economically Weak Countries: An Assessment of the Nigerian Educational Situation

Authors: Iyabosola B. Oronti, Adeoluwawale A. Adewusi, Israel O. Megbowon

Abstract:

Nigeria is considered as one of the many countries in sub-Saharan Africa with a weak economy and gross deficiencies in technology and engineering. Available data from international monitoring and regulatory organizations show that technology is pivotal to determining the economic strengths of nations all over the world. Education is critical to technology acquisition, development, dissemination and adaptation. Thus, this paper seeks to critically assess and discuss issues and challenges facing technological advancement in Nigeria, particularly in the education sector, and also proffers solutions to resuscitate the Nigerian education system towards achieving national technological and economic sustainability such that Nigeria can compete favourably with other technologicallydriven economies of the world in the not-too-distant future.

Keywords: Economically weak countries, education, globalization and competition, technological advancement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3490
747 Towards Achieving Energy Efficiency in Kazakhstan

Authors: Aigerim Uyzbayeva, Valeriya Tyo, Nurlan Ibrayev

Abstract:

Kazakhstan is currently one of the dynamically developing states in its region. The stable growth in all sectors of the economy leads to a corresponding increase in energy consumption. Thus country consumes significant amount of energy due to the high level of industrialisation and the presence of energy-intensive manufacturing such as mining and metallurgy which in turn leads to low energy efficiency. With allowance for this the Government has set several priorities to adopt a transition of Republic of Kazakhstan to a “green economy”. This article provides an overview of Kazakhstan’s energy efficiency situation in for the period of 1991- 2014. First, the dynamics of production and consumption of conventional energy resources are given. Second, the potential of renewable energy sources is summarised followed by the description of GHG emissions trends in the country. Third, Kazakhstan’ national initiatives, policies and locally implemented projects in the field of energy efficiency are described.

Keywords: Energy efficiency in Kazakhstan, greenhouse gases, renewable energy, sustainable development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3514
746 Grid-based Supervised Clustering - GBSC

Authors: Pornpimol Bungkomkhun, Surapong Auwatanamongkol

Abstract:

This paper presents a supervised clustering algorithm, namely Grid-Based Supervised Clustering (GBSC), which is able to identify clusters of any shapes and sizes without presuming any canonical form for data distribution. The GBSC needs no prespecified number of clusters, is insensitive to the order of the input data objects, and is capable of handling outliers. Built on the combination of grid-based clustering and density-based clustering, under the assistance of the downward closure property of density used in bottom-up subspace clustering, the GBSC can notably reduce its search space to avoid the memory confinement situation during its execution. On two-dimension synthetic datasets, the GBSC can identify clusters with different shapes and sizes correctly. The GBSC also outperforms other five supervised clustering algorithms when the experiments are performed on some UCI datasets.

Keywords: supervised clustering, grid-based clustering, subspace clustering

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1584
745 Features of Formation and Development of Possessory Risk Management Systems of Organization in the Russian Economy

Authors: Mikhail V. Khachaturyan, Inga A. Koryagina, Maria Nikishova

Abstract:

The study investigates the impact of the ongoing financial crisis, started in the 2nd half of 2014, on marketing budgets spent by Fast-moving consumer goods companies. In these conditions, special importance is given to efficient possessory risk management systems. The main objective for establishing and developing possessory risk management systems for FMCG companies in a crisis is to analyze the data relating to the external environment and consumer behavior in a crisis. Another important objective for possessory risk management systems of FMCG companies is to develop measures and mechanisms to maintain and stimulate sales. In this regard, analysis of risks and threats which consumers define as the main reasons affecting their level of consumption become important. It is obvious that in crisis conditions the effective risk management systems responsible for development and implementation of strategies for consumer demand stimulation, as well as the identification, analysis, assessment and management of other types of risks of economic security will be the key to sustainability of a company. In terms of financial and economic crisis, the problem of forming and developing possessory risk management systems becomes critical not only in the context of management models of FMCG companies, but for all the companies operating in other sectors of the Russian economy. This study attempts to analyze the specifics of formation and development of company possessory risk management systems. In the modern economy, special importance among all the types of owner’s risks has the risk of reduction in consumer activity. This type of risk is common not only for the consumer goods trade. Study of consumer activity decline is especially important for Russia due to domestic market of consumer goods being still in the development stage, despite its significant growth. In this regard, it is especially important to form and develop possessory risk management systems for FMCG companies. The authors offer their own interpretation of the process of forming and developing possessory risk management systems within owner’s management models of FMCG companies as well as in Russian economy in general. Proposed methods and mechanisms of problem analysis of formation and development of possessory risk management systems in FMCG companies and the results received can be helpful for researchers interested in problems of consumer goods market development in Russia and overseas.

Keywords: FMCG companies, marketing budget, risk management, owner, Russian economy, organization, formation, development, system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1072
744 A Model of Network Security with Prevention Capability by Using Decoy Technique

Authors: Supachai Tangwongsan, Labhidhorn Pangphuthipong

Abstract:

This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).

Keywords: Intrusion detection, Decoy, Snort, Intrusion prevention.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1720
743 Management of English Language Teaching in Higher Education

Authors: Vishal D. Pandya

Abstract:

A great deal of perceptible change has been taking place in the way our institutions of higher learning are being managed in India today. It is believed that managers, whose intuition proves to be accurate, often tend to be the most successful, and this is what makes them almost like entrepreneurs. A certain entrepreneurial spirit is what is expected and requires a degree of insight of the manager to be successful depending upon the situational and more importantly, the heterogeneity as well as the socio-cultural aspect. Teachers in Higher Education have to play multiple roles to make sure that the Learning-Teaching process becomes effective in the real sense of the term. This paper makes an effort to take a close look at that, especially in the context of the management of English language teaching in Higher Education and, therefore, focuses on the management of English language teaching in higher education by understanding target situation analyses at the socio-cultural level.

Keywords: Management, language teaching, English language teaching, higher education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1856
742 Willingness and Attitude Towards Organ Donation of Nurses in Taiwan

Authors: Min-Chuan Huang, I-Ping Chen, Shu-Ying Chung

Abstract:

Taking the medical staff in an emergency ward of a medical center in Central Taiwan as the research object, the questionnaire data were collected by anonymous and voluntary reporting methods with structured questionnaires to explore organ donation’s actual situation, willingness, and attitude. Only 80 valid questionnaires were gathered. Of the 8 questions, the correct mean rate was 5.9 and the correct rate was 73.13%. According to the statistics of organ donation survey, only 8.7% have signed the consent for organ donation, 21.3% are willing but have not yet signed the consent for organ donation, 62.5% have not yet decided, and 7.5% are unwilling. The average total score (standard deviation) of attitude towards organ donation was 36.2. There is no significant difference between the demographic variables and the awareness and willingness of organ donation, but there is a significant correlation between marital status and the attitude toward organ donation.

Keywords: clinical psychology, organ donation, factors affecting psychological disorders, commitment

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1118
741 Blind Speech Separation Using SRP-PHAT Localization and Optimal Beamformer in Two-Speaker Environments

Authors: Hai Quang Hong Dam, Hai Ho, Minh Hoang Le Ngo

Abstract:

This paper investigates the problem of blind speech separation from the speech mixture of two speakers. A voice activity detector employing the Steered Response Power - Phase Transform (SRP-PHAT) is presented for detecting the activity information of speech sources and then the desired speech signals are extracted from the speech mixture by using an optimal beamformer. For evaluation, the algorithm effectiveness, a simulation using real speech recordings had been performed in a double-talk situation where two speakers are active all the time. Evaluations show that the proposed blind speech separation algorithm offers a good interference suppression level whilst maintaining a low distortion level of the desired signal.

Keywords: Blind speech separation, voice activity detector, SRP-PHAT, optimal beamformer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1363
740 Energy-Efficient Electrical Power Distribution with Multi-Agent Control at Parallel DC/DC Converters

Authors: Janos Hamar, Peter Bartal, Daniel T. Sepsi

Abstract:

Consumer electronics are pervasive. It is impossible to imagine a household or office without DVD players, digital cameras, printers, mobile phones, shavers, electrical toothbrushes, etc. All these devices operate at different voltage levels ranging from 1.8 to 20 VDC, in the absence of universal standards. The voltages available are however usually 120/230 VAC at 50/60 Hz. This situation makes an individual electrical energy conversion system necessary for each device. Such converters usually involve several conversion stages and often operate with excessive losses and poor reliability. The aim of the project presented in this paper is to design and implement a multi-channel DC/DC converter system, customizing the output voltage and current ratings according to the requirements of the load. Distributed, multi-agent techniques will be applied for the control of the DC/DC converters.

Keywords: DC/DC converter, energy efficiency, multi-agentcontrol, parallel converters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1419
739 Introducing the Main Factors of Accidents on the Roads of Iran and Studying its Causes and Strategies Applied to Decrease it

Authors: Eshagh Rasouli Sarabi, Mir Saeed Moosavi

Abstract:

Road transportation system is the most important method of transporting the goods. Considering the most suitable geographical situation of Iran to transport the goods between Europe and Asia and placement of this country in direction of international corridors (east- west) , (north-south) and Asian land transport to infrastructure development “A.L.T.I.D" and Transport corridor Europe - Caucasus - Asia “T.R.A.C.E.C.A", noticing the security of road transportation system in this country is so important. In this paper the main factors of accidents on the roads of Iran are categorized regarding the rate of accidents occurred. Then apart from studying the main reasons of accidents of every category, the main factors of these events are studied and its strategies in Iran are introduced.

Keywords: Road, Transportation, Accident, Factors

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1716
738 Influence of Social-Psychological Training on Selected Features of University Students

Authors: Anežka Hamranová, Blandína Šramová, Katarína Fichnová

Abstract:

We presented results of research aimed on findings influence of social - psychological training (realized with students of Constantine the Philosopher University- future teachers within their undergraduate preparation) on the choice of intrapersonal and interpersonal features. After social- psychological training using Interpersonal Check List (ICL) we found out shift of behavior to more adaptive forms in categories, which are characterized by extroversive friendly behavior, willingness to cooperation, conformity regard to social situation, responsible and regardful behavior. Using State-Trait Anxiety Inventory (STAI) we found out the cut down of state anxiety and of trait anxiety. The report was processed within grants KEGA 3/5269/07 and VEGA 1/3675/06.

Keywords: Intrapersonal and interpersonal features, social -psychological training, social competences.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1542
737 Organizational Culture and Innovation Adoption/Generation: A Proposed Model for Architectural Firms

Authors: Kong-Seng, Lai, Nor'Aini Yusof

Abstract:

Organizational culture fosters innovation, and innovation is the main engine to be sustained within the uncertainty market. Like other countries, the construction industry significantly contributes to the economy, society and technology of Malaysia, yet, innovation is still considered slow compared to other industries such as manufacturing. Given the important role of an architect as the key player and the contributor of new ideas in the construction industry, there is a call to identify the issue and improve the current situation by focusing on the architectural firms. In addition, the existing studies tend to focus only on a few dimensions of organizational culture and very few studies consider whether innovation is being generated or adopted. Hence, the present research tends to fill in the gap by identifying the organizational cultures that foster or hinder innovation generation and/or innovation adoption, and propose a model of organizational culture and innovation generation and/or adoption.

Keywords: Innovation adoption, innovation generation, architectural firm, organizational culture

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1349
736 A Single-Period Inventory Problem with Resalable Returns: A Fuzzy Stochastic Approach

Authors: Oshmita Dey, Debjani Chakraborty

Abstract:

In this paper, a single period inventory model with resalable returns has been analyzed in an imprecise and uncertain mixed environment. Demand has been introduced as a fuzzy random variable. In this model, a single order is placed before the start of the selling season. The customer, for a full refund, may return purchased products within a certain time interval. Returned products are resalable, provided they arrive back before the end of the selling season and are found to be undamaged. Products remaining at the end of the season are salvaged. All demands not met directly are lost. The probabilities that a sold product is returned and that a returned product is resalable, both imprecise in a real situation, have been assumed to be fuzzy in nature.

Keywords: Fuzzy random variable, Modified graded meanintegration, Internet mail order, Inventory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1501
735 Intellectual Capital Report for Universities

Authors: Yolanda Ramírez Córcoles, Ángel Tejad Ponce, Agustín Baidez González

Abstract:

Intellectual capital reporting becomes critical at universities, mainly due to the fact that knowledge is the main output as well as input in these institutions. In addition, universities have continuous external demands for greater information and transparency about the use of public funds, and are increasingly provided with greater autonomy regarding their organization, management, and budget allocation. This situation requires new management and reporting systems. The purpose of the present study is to provide a model for intellectual capital report in Spanish universities. To this end, a questionnaire was sent to every member of the Social Councils of Spanish public universities in order to identify which intangible elements university stakeholders demand most. Our proposal for an intellectual capital report aims to act as a guide to help the Spanish universities on the road to the presentation of information on intellectual capital which can assist stakeholders to make the right decisions.

Keywords: Intellectual capital, Spain, report, universities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2989
734 CBCTL: A Reasoning System of TemporalEpistemic Logic with Communication Channel

Authors: Suguru Yoshioka, Satoshi Tojo

Abstract:

This paper introduces a temporal epistemic logic CBCTL that updates agent-s belief states through communications in them, based on computational tree logic (CTL). In practical environments, communication channels between agents may not be secure, and in bad cases agents might suffer blackouts. In this study, we provide inform* protocol based on ACL of FIPA, and declare the presence of secure channels between two agents, dependent on time. Thus, the belief state of each agent is updated along with the progress of time. We show a prover, that is a reasoning system for a given formula in a given a situation of an agent ; if it is directly provable or if it could be validated through the chains of communications, the system returns the proof.

Keywords: communication channel, computational tree logic, reasoning system, temporal epistemic logic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1217
733 Personality of Military Professionals (Commanders) and Their Way of Leading and Commanding Today and in Historical Context

Authors: Petra Hurbišová, Monika Davidová

Abstract:

The article deals with the personality of military professionals (commanders) and their way of leading and commanding today and in historical context. The first part focuses on the leadership skills of Alexander the Great, who introduced strategic innovations and even from today's perspective; he excelled in efficient work with people. This paper focuses on the way which he achieved his goals. Further attention is paid to approaches to commander´s personality by other great generals. The paper is also focused on personality traits of military professionals necessary for successful management and leadership in today's variable and challenging environment. Finally, attention is paid to the effective and ineffective ways of behavior of commanders and determining what styles of leadership is appropriate for a given situation, whether in peacetime or on deployment.

Keywords: Authority, commander, leader, leadership, military professional, personality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2277
732 Application the Queuing Theory in the Warehouse Optimization

Authors: Jaroslav Masek, Juraj Camaj, Eva Nedeliakova

Abstract:

The aim of optimization of store management is not only designing the situation of store management itself including its equipment, technology and operation. In optimization of store management we need to consider also synchronizing of technological, transport, store and service operations throughout the whole process of logistic chain in such a way that a natural flow of material from provider to consumer will be achieved the shortest possible way, in the shortest possible time in requested quality and quantity and with minimum costs. The paper deals with the application of the queuing theory for optimization of warehouse processes. The first part refers to common information about the problematic of warehousing and using mathematical methods for logistics chains optimization. The second part refers to preparing a model of a warehouse within queuing theory. The conclusion of the paper includes two examples of using queuing theory in praxis.

Keywords: Queuing theory, logistics system, mathematical methods, warehouse optimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6520
731 Describing Learning Features of Reusable Resources: A Proposal

Authors: Serena Alvino, Paola Forcheri, Maria Grazia Ierardi, Luigi Sarti

Abstract:

One of the main advantages of the LO paradigm is to allow the availability of good quality, shareable learning material through the Web. The effectiveness of the retrieval process requires a formal description of the resources (metadata) that closely fits the user-s search criteria; in spite of the huge international efforts in this field, educational metadata schemata often fail to fulfil this requirement. This work aims to improve the situation, by the definition of a metadata model capturing specific didactic features of shareable learning resources. It classifies LOs into “teacher-oriented" and “student-oriented" categories, in order to describe the role a LO is to play when it is integrated into the educational process. This article describes the model and a first experimental validation process that has been carried out in a controlled environment.

Keywords: Learning object, pedagogical metadata, experimental validation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1518
730 Learning Based On Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment

Authors: Eiko Takaoka, Yoshiyuki Fukushima, Koichiro Hirose, Tadashi Hasegawa

Abstract:

Although, all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.

Keywords: Computer Science Unplugged, computer science outreach, high school curriculum, experimental evaluation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2083
729 Factors Contributing Towards Technology Development in Small Firms

Authors: Davinder Singh, Jaimal Singh Khamba, Tarun Nanda

Abstract:

The importance of MSMEs in India became crucial in rural areas because it promoted economic growth. MSMEs play a significant role in the economic growth of the country owing to production, exports and employment. Technology development reflect a critical way in which organization respond to either technological or market challenges. The present survey examines the characteristics of technology development in MSMEs. The results show that Indian MSMEs do not co-operate with universities and R&D institutes. Government policies also affect the technology development activities. The awareness about the R&D infrastructure is very low as shown by the results in the study. There is a need to understand and assess the real needs of the MSMEs and accordingly devise approaches that ensure their sustainable growth.

Keywords: MSMEs, technology development, networks, financial management and R&D infrastructure.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2697
728 QSI Dynamical Fetch Policy for SMT

Authors: Shu-Chiao Yang, Jong-Jiann Shieh

Abstract:

A Simultaneous Multithreading (SMT) Processor is capable of executing instructions from multiple threads in the same cycle. SMT in fact was introduced as a powerful architecture to superscalar to increase the throughput of the processor. Simultaneous Multithreading is a technique that permits multiple instructions from multiple independent applications or threads to compete limited resources each cycle. While the fetch unit has been identified as one of the major bottlenecks of SMT architecture, several fetch schemes were proposed by prior works to enhance the fetching efficiency and overall performance. In this paper, we propose a novel fetch policy called queue situation identifier (QSI) which counts some kind of long latency instructions of each thread each cycle then properly selects which threads to fetch next cycle. Simulation results show that in best case our fetch policy can achieve 30% on speedup and also can reduce the data cache level 1 miss rate.

Keywords: SMT, QSI, DL1 miss rate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1241
727 Macro Corruption: A Conceptual Analysis of Its Dimensions and Forward and Backward Linkages

Authors: Ahmed Sakr Ashour, Hoda Saad AboRemila

Abstract:

An attempt was made to fill the gap in the macro analysis of corruption by suggesting a conceptual framework that differentiates four types of macro corruption: state capture, political, bureaucratic and financial/corporate. The economic consequences or forward linkages (growth, inclusiveness and sustainability of development) and macro institutional determinants constituting the backward linkages of each type were delineated. The research implications of the macro perspective and proposed framework were discussed. Implications of the findings for theory, research and reform policies addressing macro corruption issues were discussed.

Keywords: Economic growth, Inclusive growth, macro corruption, sustainable development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 805
726 A Critical Social Research Perspective on Self-Directed Learning and Information Technology Practitioners

Authors: Roelien Goede

Abstract:

Information systems practitioners are frequently required to master new technology, often without the aid of formal training. They require the skill to manage their own learning and, when this skill is developed in their formal training, their adaptability to new technology may be improved. Self- directed learning is the ability of the learner to manage his or her own learning experience with some guidance from a facilitator. Self-directed learning skills are best improved when practiced. This paper reflects on a critical social research project to improve the self-directed learning skills of fourth year Information Systems students. Critical social research differs from other research paradigms in that the researcher is viewed as the agent of change to achieve the desired outcome in the problem situation.

Keywords: Action Research, Critical Social Research, Information Systems Education, Self-directed Learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1783
725 Choice of Exchange Rate Regimes: Case of Ex-Yugoslavia Countries

Authors: Ivan Lovrinović, Gordana Kordić, Martina Nakić

Abstract:

There are little subjects in macroeconomics that are so widely discussed, but at the same time controversial and without a clear solution such as the choice of exchange rate regime. National authorities need to take into consideration numerous fundamentals, trying to fulfil goals of economic growth, low and stable inflation and international stability. This paper focuses on the countries of ex- Yugoslavia and their exchange rate history as independent states. We follow the development of the regimes in 6 countries during the transition through the financial crisis of the second part of the 2000s to the prospects of their final goal: full membership in the European Union. Main question is to what extent has the exchange regime contributed to their economic success, considering other objective factors.

Keywords: European Union, exchange rate regime, ex- Yugoslavia countries

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1928
724 The Ongoing Impact of Secondary Stressors on Businesses in Northern Ireland Affected by Flood Events

Authors: Jill Stephenson, Marie Vaganay, Robert Cameron, Caoimhe McGurk, Neil Hewitt

Abstract:

Purpose: The key aim of the research was to identify the secondary stressors experienced by businesses affected by single or repeated flooding and to determine to what extent businesses were affected by these stressors, along with any resulting impact on health. Additionally the research aimed to establish the likelihood of businesses being re-exposed to the secondary stressors through assessing awareness of flood risk, implementation of property protection measures and level of community resilience. Design/methodology/approach: The chosen research method involved the distribution of a questionnaire survey to businesses affected by either single or repeated flood events. The questionnaire included the Impact of Event Scale (a 15-item self-report measure which assesses subjective distress caused by traumatic events). Findings: 55 completed questionnaires were returned by flood impacted businesses. 89% of the businesses had sustained internal flooding, while 11% had experienced external flooding. The results established that the key secondary stressors experienced by businesses, in order of priority, were: flood damage, fear of reoccurring flooding, prevention of access to the premise/closure, loss of income, repair works, length of closure and insurance issues. There was a lack of preparedness for potential future floods and consequent vulnerability to the emergence of secondary stressors among flood affected businesses, as flood resistance or flood resilience measures had only been implemented by 11% and 13% respectively. In relation to the psychological repercussions, the Impact of Event scores suggested that potential prevalence of posttraumatic stress disorder (PTSD) was noted among 8 out of 55 respondents (l5%). Originality/value: The results improve understanding of the enduring repercussions of flood events on businesses, indicating that not only residents may be susceptible to the detrimental health impacts of flood events and single flood events may be just as likely as reoccurring flooding to contribute to ongoing stress. Lack of financial resources is a possible explanation for the lack of implementation of property protection measures among businesses, despite 49% experiencing flooding on multiple occasions. Therefore it is recommended that policymakers should consider potential sources of financial support or grants towards flood defences for flood impacted businesses. Any form of assistance should be made available to businesses at the earliest opportunity as there was no significant association between the time of the last flood event and the likelihood of experiencing PTSD symptoms.

Keywords: Flood event, flood resilience, flood resistance, PTSD, secondary stressors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1755
723 A Survey on MAC Protocols for Vehicular Ad-Hoc Networks

Authors: B. Cynthia Sherin, E. A. Mary Anita

Abstract:

Vehicular Ad-hoc Network (VANET) is an emerging and very promising technology that has great demand on the access capability of the existing wireless technology. VANETs help improve traffic safety and efficiency. Each vehicle can exchange their information to inform the other vehicles about the current status of the traffic flow or a dangerous situation such as an accident. To achieve these, a reliable and efficient Medium Access Control (MAC) protocol with minimal transmission collisions is required. High speed nodes, absence of infrastructure, variations in topology and their QoS requirements makes it difficult for designing a MAC protocol in vehicular networks. There are several MAC protocols proposed for VANETs to ensure that all the vehicles could send safety messages without collisions by reducing the end-to-end delay and packet loss ratio. This paper gives an overview of the several proposed MAC protocols for VANETs along with their benefits and limitations and presents an overall classification based on their characteristics.

Keywords: MAC Protocols, QoS, VANET, V2V, V2I.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 918
722 An Approach in the Improvement of the Reliability of Impedance Relay

Authors: D. Ouahdi, R. Ladjeroud, I. Habi

Abstract:

The distance protection mainly the impedance relay which is considered as the main protection for transmission lines can be subjected to impedance measurement error which is, mainly, due to the fault resistance and to the power fluctuation. Thus, the impedance relay may not operate for a short circuit at the far end of the protected line (case of the under reach) or operates for a fault beyond its protected zone (case of overreach). In this paper, an approach to fault detection by a distance protection, which distinguishes between the faulty conditions and the effect of overload operation mode, has been developed. This approach is based on the symmetrical components; mainly the negative sequence, and it is taking into account both the effect of fault resistance and the overload situation which both have an effect upon the reliability of the protection in terms of dependability for the former and security for the latter.

Keywords: Distance Protection, Fault Detection, negative sequence, overload, Transmission line.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1814
721 Security Strengths and Weaknesses of Blockchain Smart Contract System: A Survey

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: Blockchain, bitcoin, smart Contract, criminal smart contract, security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 478