Search results for: logistics services
410 The Impact of Web Based Education on Cancer Patients’ Clinical Outcomes
Authors: F. Arıkan, Z. Karakus
Abstract:
Cancer is a widespread disease in the world and is the third reason of deaths among the chronic diseases. Educating patients and caregivers has a vital role for empowering them in managing disease and treatment's symptoms. Informing of the patients about their disease and treatment process decreases patient's distress and decisional conflicts, improves wellbeing of them, increase success of the treatment and survival. In this era, technological education methods are used for patients that have different chronic disease. Many studies indicated that especially web based patient education such as chronic obstructive lung disease; heart failure is more effective than printed materials. Web based education provide easiness to patients while they are reaching health services. It also has more advantages because of it decreases health cost and requirement of staff. It is thought that web based education may be beneficial method for cancer patient's empowerment in coping with the disease's symptoms. The aim of the study is evaluate the effectiveness of web based education for cancer patients' clinical outcomes.
Keywords: Cancer Patients, E-Learning, Nursing, Web Based Education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2418409 A Generic Approach to Achieve Optimal Server Consolidation by Using Existing Servers in Virtualized Data Center
Authors: Siyuan Jing, Kun She
Abstract:
Virtualization-based server consolidation has been proven to be an ideal technique to solve the server sprawl problem by consolidating multiple virtualized servers onto a few physical servers leading to improved resource utilization and return on investment. In this paper, we solve this problem by using existing servers, which are heterogeneous and diversely preferred by IT managers. Five practical consolidation rules are introduced, and a decision model is proposed to optimally allocate source services to physical target servers while maximizing the average resource utilization and preference value. Our model can be regarded as a multi-objective multi-dimension bin-packing (MOMDBP) problem with constraints, which is strongly NP-hard. An improved grouping generic algorithm (GGA) is introduced for the problem. Extensive simulations were performed and the results are given.Keywords: GGA-based Heuristics, Preference, Real-worldConstraints, Resource Utilization, Server Consolidation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1646408 A Distributed Approach to Extract High Utility Itemsets from XML Data
Authors: S. Kannimuthu, K. Premalatha
Abstract:
This paper investigates a new data mining capability that entails mining of High Utility Itemsets (HUI) in a distributed environment. Existing research in data mining deals with only presence or absence of an items and do not consider the semantic measures like weight or cost of the items. Thus, HUI mining algorithm has evolved. HUI mining is the one kind of utility mining concept, aims to identify itemsets whose utility satisfies a given threshold. Although, the approach of mining HUIs in a distributed environment and mining of the same from XML data have not explored yet. In this work, a novel approach is proposed to mine HUIs from the XML based data in a distributed environment. This work utilizes Service Oriented Computing (SOC) paradigm which provides Knowledge as a Service (KaaS). The interesting patterns are provided via the web services with the help of knowledge server to answer the queries of the consumers. The performance of the approach is evaluated on various databases using execution time and memory consumption.
Keywords: Data mining, Knowledge as a Service, service oriented computing, utility mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2453407 Multi-Agent Model for Automation of Business Process Management System Based on Service Oriented Architecture
Authors: Soe Winn, May Thwe Oo
Abstract:
Business process automation is an important task in an enterprise business environment software development. The requirements of processing acceleration and automation level of enterprises are inherently different from one organization to another. We present a methodology and system for automation of business process management system architecture by multi-agent collaboration based on SOA. Design layer processes are modeled in semantic markup language for web services application. At the core of our system is considering certain types of human tasks to their further automation across over multiple platform environments. An improved abnormality processing with model for automation of BPMS architecture by multi-agent collaboration based on SOA is introduced. Validating system for efficiency of process automation, an application for educational knowledge base instance would also be described.Keywords: Business process management system, businessprocess automation, multi-agent collaboration, Service OrientedArchitecture, extensible service application
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1759406 Welfare State and Income Distribution to School-Age Children
Authors: Kanyarat Bussaban, Siriporn Poolsuwan
Abstract:
This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case ofan urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two communityareasthatare close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education.The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less.A study of the two communities suggests that the inequality in incomedistribution currently affects the quality of life of school-age children.
Keywords: Inequality, Income distribution, Quality of school-age children lives, Welfare state.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1608405 Traditional Grocery Stores and Business Management in Bangkok
Authors: Suppara Charoenpoom
Abstract:
This paper was aimed to survey the level of awareness of traditional grocery stores in Bangkok in these categories: location, service quality, risk, shopping, worthwhile, shopping satisfaction, and future shopping intention. The paper was also aimed to survey factors influencing the decision to shop at traditional grocery stores in Bangkok in the future. The findings revealed that consumers had a high level of awareness of traditional grocery stores in Bangkok. Consumers were aware that the price was higher and it was riskier to buy goods and services at traditional grocery stores but they still had a high level of preference to patronage traditional grocery stores. This was due to the reasons that there was a high level of satisfaction from the factors of the friendliness of the owner, the ability to negotiate the price, the ability to buy on credit, free delivery, and the enjoyment to meet with other customers in the same neighborhood.Keywords: Business Management, Thai Economy, Traditional Grocery Store.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2529404 Utility Analysis of API Economy Based on Multi-Sided Platform Markets Model
Authors: Mami Sugiura, Shinichi Arakawa, Masayuki Murata, Satoshi Imai, Toru Katagiri, Motoyoshi Sekiya
Abstract:
API (Application Programming Interface) economy, where many participants join/interact and form the economy, is expected to increase collaboration between information services through API, and thereby, it is expected to increase market value from the service collaborations. In this paper, we introduce API evaluators, which are the activator of API economy by reviewing and/or evaluating APIs, and develop a multi-sided API economy model that formulates interactions among platform provider, API developers, consumers, and API evaluators. By obtaining the equilibrium that maximizes utility of all participants, the impact of API evaluators on the utility of participants in the API economy is revealed. Numerical results show that, with the existence of API evaluators, the number of developers and consumers increase by 1.5% and the utility of platformer increases by 2.3%. We also discuss the strategies of platform provider to maximize its utility under the existence of API evaluators.Keywords: API economy, multi-sided markets, API evaluator, platform, platform provider.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 543403 A Global Perspective on Urban Environmental Problems in Developing Countries: The Case of Turkey
Authors: Nükhet Konuk, N. Gamze Turan, Yüksel Ardalı
Abstract:
Cities play a vital role in the social fabric of countries and in national and regional economic growth worldwide; however, the environmental effects of such growth need to be assessed and managed better. The critical and most immediate problems faced by cities of developing countries are the health impacts of urban pollution that derive from inadequate water, sanitation, drainage and solid waste services, poor urban and industrial waste management, and air pollution. As globalization continues, earth's natural processes transform local problems into international issues. The aim of this study is to provide a broad overview of the pollution from urban wastes and emissions in Turkey which is a developing country. It is aimed to underline the significance of reorganizing the institutional tools in a worldwide perspective in order to generate coherent solutions to urban problems, and to enhance urban quality.Keywords: Environmental pollution, developing countries, environmental degradation, urban environmental problems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2217402 Analysis of the Islands Tourists, Destination Information Sources and Service Satisfaction
Abstract:
The purpose of this study is to analyze the islands tourist travel information sources, as well as for the satisfaction of the tourist destination services. This study used questionnaires to the island of Taiwan to the Penghu Islands to engage in tourism activities tourist adopt the designated convenience sampling method, a total of 889 valid questionnaires were collected. After statistical analysis, this study found that: 1. tourists to the Penghu Islands travel information source for “friends and family came to Penghu". 2. Tourists feel the service of the outlying islands of Penghu, the highest feelings of “friendly local residents". 3. There are different demographic variables affect the tourist travel information source and service satisfaction. Based on the findings of this study not only for Penghu's tourism industry with the unit in charge of the proposed operating and suggestions for future research to other researchers.Keywords: Island tourism, destination, travel information, service satisfaction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1498401 Secure and Failure Factors of e-Government Projects Implementation in Developing Country: A Study on the Implementation of Kingdom of Bahrain
Authors: Reem Al-Kaabi
Abstract:
The concept of e-government has begun to spread among countries. It is based on the use of information communication technology (ICT) to fully utilize government resources, as well as to provide government services to citizens, investors and foreigners. Critical factors are the factors that are determined by the senior management of each organization; the success or failure of the organization depends on the effective implementation of critical factors. These factors vary from one organization to another according to their activity, size and functions. It is very important that organizations identify them in order to avoid the risk of implementing initiatives that may fail to work, while simultaneously exploiting opportunities that may succeed in working. The main focus of this paper is to investigate the majority of critical success factors (CSFs) associated with the implementation of e-government projects. This study concentrates on both technical and nontechnical factors. This paper concludes by listing the majority of CSFs relating to successful e-government implementation in Bahrain.
Keywords: Critical success factors, e-government, ICT, implementation, Kingdom of Bahrain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2686400 A Software of Intrusion Detection Mechanism for Virtual Platforms
Authors: Ying-Chuan Chen, Shuen-Tai Wang
Abstract:
Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1545399 Reducing Power Consumption in Cloud Platforms using an Effective Mechanism
Authors: Shuen-Tai Wang, Chin-Hung Li, Ying-Chuan Chen
Abstract:
In recent years there has been renewal of interest in the relation between Green IT and Cloud Computing. The growing use of computers in cloud platform has caused marked energy consumption, putting negative pressure on electricity cost of cloud data center. This paper proposes an effective mechanism to reduce energy utilization in cloud computing environments. We present initial work on the integration of resource and power management that aims at reducing power consumption. Our mechanism relies on recalling virtualization services dynamically according to user-s virtualization request and temporarily shutting down the physical machines after finish in order to conserve energy. Given the estimated energy consumption, this proposed effort has the potential to positively impact power consumption. The results from the experiment concluded that energy indeed can be saved by powering off the idling physical machines in cloud platforms.Keywords: Green IT, Cloud Computing, virtualization, power consumption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2156398 Critical Analysis of Heat Exchanger Cycle for its Maintainability Using Failure Modes and Effect Analysis and Pareto Analysis
Authors: Sayali Vyas, Atharva Desai, Shreyas Badave, Apurv Kulkarni, B. Rajiv
Abstract:
The Failure Modes and Effect Analysis (FMEA) is an efficient evaluation technique to identify potential failures in products, processes, and services. FMEA is designed to identify and prioritize failure modes. It proves to be a useful method for identifying and correcting possible failures at its earliest possible level so that one can avoid consequences of poor performance. In this paper, FMEA tool is used in detection of failures of various components of heat exchanger cycle and to identify critical failures of the components which may hamper the system’s performance. Further, a detailed Pareto analysis is done to find out the most critical components of the cycle, the causes of its failures, and possible recommended actions. This paper can be used as a checklist which will help in maintainability of the system.
Keywords: FMEA, heat exchanger cycle, Ishikawa diagram, Pareto analysis, risk priority number.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1648397 Effect of Social Media on Knowledge Work
Authors: Pekka Makkonen, Georgios Lampropoulos, Kerstin Siakas
Abstract:
This paper examines the impact of social media on knowledge work. It discloses and highlights which specific aspects, areas and tasks of knowledge work can be improved by the use of social media. Moreover, the study includes a survey about higher education students’ viewpoints in regard to the use of social media as a means to enhance knowledge work and knowledge sharing. The analysis has been conducted based both on empirical data and on discussions about the sources dealing with knowledge work and how it can be enhanced by using social media. The results show that social media can improve knowledge work, knowledge building and maintenance tasks in which communication, information sharing and collaboration play a vital role. Additionally, by using social media, personal, collaborative and supplementary work activities can be enhanced. Based on the results of the study, we suggest how knowledge work can be enhanced when using the contemporary information and communications technologies (ICTs) of the 21st century and recommend future directions towards improving knowledge work.
Keywords: Knowledge work, social media, social media services, improving work performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1087396 Cloud Computing Cryptography "State-of-the-Art"
Authors: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem
Abstract:
Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the “keys generation and management” mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.
Keywords: Cloud Computing, Cloud Encryption Model, Quantum Key Distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4092395 Performance Analysis of the First-Order Characteristics of Polling Systems Based on Parallel Limited (k = 1) Services Mode
Authors: Liu Yi, Bao Liyong
Abstract:
Aiming at the problem of low efficiency of pipelined scheduling in periodic query-qualified service, this paper proposes a system service resource scheduling strategy with parallel optimized qualified service polling control. The paper constructs the polling queuing system and its mathematical model; firstly, the first-order and second-order characteristic parameter equations are obtained by partial derivation of the probability mother function of the system state variables, and the complete mathematical, analytical expressions of each system parameter are deduced after the joint solution. The simulation experimental results are consistent with the theoretical calculated values. The system performance analysis shows that the average captain and average period of the system have been greatly improved, which can better adapt to the service demand of delay-sensitive data in the dense data environment.
Keywords: Polling, parallel scheduling, mean queue length, average cycle time.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 59394 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.
Keywords: Cloud computing, cloud monitoring, performance optimization, high availability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 72393 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Moses Noel Dogonyaro
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.
Keywords: Data Analytics, Security, Privacy, Bootstrapping, and Fully Homomorphic Encryption Scheme.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3456392 Air Cargo Overbooking Model under Stochastic Weight and Volume Cancellation
Authors: N. Phumchusri, K. Roekdethawesab, M. Lohatepanont
Abstract:
Overbooking is an approach of selling more goods or services than available capacities because sellers anticipate that some buyers will not show-up or may cancel their bookings. At present, many airlines deploy overbooking strategy in order to deal with the uncertainty of their customers. Particularly, some airlines sell more cargo capacity than what they have available to freight forwarders with beliefs that some of them will cancel later. In this paper, we propose methods to find the optimal overbooking level of volume and weight for air cargo in order to minimize the total cost, containing cost of spoilage and cost of offloaded. Cancellations of volume and weight are jointly random variables with a known joint distribution. Heuristic approaches applying the idea of weight and volume independency is considered to find an appropriate answer to the full problem. Computational experiments are used to explore the performance of approaches presented in this paper, as compared to a naïve method under different scenarios.
Keywords: Air cargo overbooking, offloaded capacity, optimal overbooking level, revenue management, spoilage capacity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2186391 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds
Authors: Sahar Sohrabi
Abstract:
The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.Keywords: Bayesian, cloud computing, real-time private cloud, scheduling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1408390 Design of Thermal Control Subsystem for TUSAT Telecommunication Satellite
Authors: N. Sozbir, M. Bulut, M.F.Oktem, A.Kahriman, A. Chaix
Abstract:
TUSAT is a prospective Turkish Communication Satellite designed for providing mainly data communication and broadcasting services through Ku-Band and C-Band channels. Thermal control is a vital issue in satellite design process. Therefore, all satellite subsystems and equipments should be maintained in the desired temperature range from launch to end of maneuvering life. The main function of the thermal control is to keep the equipments and the satellite structures in a given temperature range for various phases and operating modes of spacecraft during its lifetime. This paper describes the thermal control design which uses passive and active thermal control concepts. The active thermal control is based on heaters regulated by software via thermistors. Alternatively passive thermal control composes of heat pipes, multilayer insulation (MLI) blankets, radiators, paints and surface finishes maintaining temperature level of the overall carrier components within an acceptable value. Thermal control design is supported by thermal analysis using thermal mathematical models (TMM).Keywords: Spacecraft thermal control, design of thermal control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3698389 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.
Keywords: Denial-of-service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 989388 The Critical Success Factors for Effective ICT Governance in Malaysian Public Sector: A Delphi Study
Authors: Rosida Ab. Razak, Mohamad Shanudin Zakaria
Abstract:
The fundamental issues in ICT Governance (ICTG) implementation for Malaysian Public Sector (MPS) is how ICT be applied to support improvements in productivity, management effectiveness and the quality of services offered to its citizens. Our main concern is to develop and adopt a common definition and framework to illustrate how ICTG can be used to better align ICT with government’s operations and strategic focus. In particular, we want to identify and categorize factors that drive a successful ICTG process. This paper presents the results of an exploratory study to identify, validate and refine such Critical Success Factors (CSFs) and confirmed seven CSFs and nineteen sub-factors as influential factors that fit MPS after further validated and refined. The Delphi method applied in validation and refining process before being endorsed as appropriate for MPS. The identified CSFs reflect the focus areas that need to be considered strategically to strengthen ICT Governance implementation and ensure business success.
Keywords: IT Governance, Critical Success Factors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3974387 A User Study on the Adoption of Context-Aware Destination Mobile Applications
Authors: Shu-Lu Hsu, Fang-Yi Chu
Abstract:
With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.
Keywords: Mobile Application, Context-Aware, Privacy Concern, TAM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2098386 Managing the Cloud Procurement Process – Findings from a Case Study
Authors: Andreas Jede, Frank Teuteberg
Abstract:
Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.
Keywords: Cloud Procurement Process, IT-Organization, Event-driven Process Chain, In-depth Case Study.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2476385 Investigation and Comparison of Energy Intensity in Iranian Transportation Industry (Case Study Road Transportation Sector)
Authors: A. Mojtaba Aghajani, B. Leila Shavakhi
Abstract:
Energy intensity(energy consumption intensity) is a global index which computes the required energy for producing a specific value of goods and services in each country. It is computed in terms of initial energy supply or final energy consumption. In this study (research) Divisia method is used to decompose energy consumption and energy intensity. This method decomposes consumption and energy intensity to production effects, structural and net intensity and could be done as time series or two-periodical. This study analytically investigates consumption changes and energy intensity on economical sectors of Iran and more specific on road transportation(rail road and road).Our results show that the contribution of structural effect (change in economical activities combination) is very low and the effect of net energy consumption has the higher contribution in consumption changes and energy intensity. In other words, the high consumption of energy is due to Intensity of energy consumption and is not to structural effect of transportation sector.Keywords: Divisia Method, Energy Intensity, Net IntensityEffect, Road Transportation , Structural Effect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1579384 Nigerian Football System: Examining Micro-Level Practices against a Global Model for Integrated Development of Mass and Elite Sport
Authors: I. Derek Kaka’an, P. Smolianov, S. Dion, C. Schoen, J. Norberg, C. G. Iortimah
Abstract:
This study examines the current state of football in Nigeria to identify the country's practices, which could be useful internationally, and to determine areas for improvement. Over 200 sources of literature on sport delivery systems in successful sports nations were analyzed to construct a globally applicable model of elite football integrated with mass participation, comprising of the following three levels: macro (socio-economic, cultural, legislative, and organizational), meso (infrastructures, personnel, and services enabling sports programs) and micro level (operations, processes, and methodologies for the development of individual athletes). The model has received scholarly validation and has shown to be a framework for program analysis that is not culturally bound. It has recently been utilized for further understanding such sports systems as US rugby, tennis, soccer, swimming, and volleyball, as well as Dutch and Russian swimming. A questionnaire was developed using the above-mentioned model. Survey questions were validated by 12 experts including academicians, executives from sports governing bodies, football coaches, and administrators. To identify best practices and determine areas for improvement of football in Nigeria, 116 coaches completed the questionnaire. Useful exemplars and possible improvements were further identified through semi-structured discussions with 10 Nigerian football administrators and experts. Finally, a content analysis of the Nigeria Football Federation's website and organizational documentation was conducted. This paper focuses on the micro level of Nigerian football delivery, particularly talent search and development as well as advanced athlete preparation and support. Results suggested that Nigeria could share such progressive practices as the provision of football programs in all schools and full-time coaches paid by governments based on the level of coach education. Nigerian football administrators and coaches could provide better football services affordable for all, where success in mass and elite sports is guided by science focused on athletes' needs. Better implemented could be international best practices such as lifelong guidelines for health and excellence of everyone and integration of fitness tests into player development and ranking as done in best Dutch, English, French, Russian, Spanish, and other European clubs; integration of educational and competitive events for elite and developing athletes as well as fans as done at the 2018 World Cup Russia; and academies with multi-stage athlete nurturing as done by Ajax in Africa as well as Barcelona FC and other top clubs expanding across the world. The methodical integration of these practices into the balanced development of mass and elite football will help contribute to international sports success as well as national health, education, crime control, and social harmony in Nigeria.
Keywords: Football, high performance, mass participation, Nigeria, sport development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 152383 Design of an SNMP Agent for OSGi Service Platforms
Authors: Pedro J. Muñoz Merino, Natividad Martínez Madrid, Ralf E. D. Seepold
Abstract:
On one hand, SNMP (Simple Network Management Protocol) allows integrating different enterprise elements connected through Internet into a standardized remote management. On the other hand, as a consequence of the success of Intelligent Houses they can be connected through Internet now by means of a residential gateway according to a common standard called OSGi (Open Services Gateway initiative). Due to the specifics of OSGi Service Platforms and their dynamic nature, specific design criterions should be defined to implement SNMP Agents for OSGi in order to integrate them into the SNMP remote management. Based on the analysis of the relation between both standards (SNMP and OSGi), this paper shows how OSGi Service Platforms can be included into the SNMP management of a global enterprise, giving implementation details about an SNMP Agent solution and the definition of a new MIB (Management Information Base) for managing OSGi platforms that takes into account the specifics and dynamic nature of OSGi.Keywords: MIB, OSGi, Remote Management, SNMP.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563382 Qmulus – A Cloud Driven GPS Based Tracking System for Real-Time Traffic Routing
Authors: Niyati Parameswaran, Bharathi Muthu, Madiajagan Muthaiyan
Abstract:
This paper presents Qmulus- a Cloud Based GPS Model. Qmulus is designed to compute the best possible route which would lead the driver to the specified destination in the shortest time while taking into account real-time constraints. Intelligence incorporated to Qmulus-s design makes it capable of generating and assigning priorities to a list of optimal routes through customizable dynamic updates. The goal of this design is to minimize travel and cost overheads, maintain reliability and consistency, and implement scalability and flexibility. The model proposed focuses on reducing the bridge between a Client Application and a Cloud service so as to render seamless operations. Qmulus-s system model is closely integrated and its concept has the potential to be extended into several other integrated applications making it capable of adapting to different media and resources.Keywords: Cloud Services, GPS, Real-Time Constraints, Shortest Path, System Management and Traffic Routing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1794381 Brain Drain of Doctors; Causes and Consequences in Pakistan
Authors: Muhammad Wajid Tahir, Rubina Kauser, Majid Ali Tahir
Abstract:
Pakistani doctors (MBBS) are emigrating towards developed countries for professional adjustments. This study aims to highlight causes and consequences of doctors- brain drain from Pakistan. Primary data was collected from Mayo Hospital, Lahore by interviewing doctors (n=100) through systematic random sampling technique. It found that various socio-economic and political conditions are working as push and pull factors for brain drain of doctors in Pakistan. Majority of doctors (83%) declared poor remunerations and professional infrastructure of health department as push factor of doctors- brain drain. 81% claimed that continuous instability in political situation and threats of terrorism are responsible for emigration of doctors. 84% respondents considered fewer opportunities of further studies responsible for their emigration. Brain drain of doctors is affecting health sector-s policies / programs, standard doctor-patient ratios and quality of health services badly.
Keywords: Brain Drain, Emigration, Remuneration, Politicalinstability, MBBS doctors
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4619