Search results for: literature survey
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2551

Search results for: literature survey

1321 The Implementation of Self-Determination Theory on the Opportunities and Challenges for Blended e-Learning in Motivating Egyptian Logistic Learners

Authors: Aisha Tarek Noour, Nick Hubbard

Abstract:

Learner motivation is considered to be an important component for the Blended e-Learning (BL) Method. BL is an effective learning method in multiple domains, which opens several opportunities for its participants to engage in the learning environment. This research explores the learners’ perspective of BL according to the Self-Determination Theory (SDT). It identifies the opportunities and challenges for using the BL in Logistics Education (LE) in Egyptian Higher Education (HE). SDT is approached from different perspectives within the relationship between Intrinsic Motivation (IM), Extrinsic Motivation (EM) and Amotivation (AM). A self-administered face-to-face questionnaire was used to collect data from learners who were geographically widely spread around three colleges of International Transport and Logistics (CILTs) at the Arab Academy for Science, Technology and Maritime Transport (AAST&MT) in Egypt. Six hundred and sixteen undergraduates responded to a questionnaire survey. Respondents were drawn from three branches in Greater Cairo, Alexandria, and Port Said. The data analysis used was SPSS 22 and AMOS 18.

Keywords: Intrinsic Motivation, Extrinsic Motivation, Amotivation, Blended e-Learning, Self Determination Theory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2363
1320 Cultural Diversity and Challenges for Female Entrepreneurs: Empirical Study of an Emerging Economy

Authors: Amir Ikram, Qin Su, Muhammad Fiaz, Muhammad Waqas Shabbir

Abstract:

Women entrepreneurship witnessed a healthy rise in the last decade or so, and the scenario in Pakistan is not different. However female leaders are facing various, cultural, career oriented, and professional challenges. The study investigates the impact of social and industry-specific challenges on female entrepreneurship; social challenges was evaluated in terms of culture, and industry-specific challenges was measured in terms of team management and career growth. Purposive sampling was employed to collect data from 75 multicultural organizations operating in the culturally diverse and historic city of Lahore, Pakistan. Cronbach’s alpha was conducted to endorse the reliability of survey questionnaire, while correlation and regression analysis were used to test hypotheses. Industry-specific challenges were found to be more significant as compared to cultural factors. The paper also highlights the importance of female entrepreneurship for emerging economies, and suggests that bringing women to mainstream professions can lead to economic success.

Keywords: Cultural challenges, emerging economy, female entrepreneurship, leadership.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1901
1319 Positive Analysis on Vulnerability, Information Security Incidents, and the Countermeasures of Japanese Internet Service Providers

Authors: Toshihiko Takemura, Makoto Osajima, Masatoshi Kawano

Abstract:

This paper includes a positive analysis to quantitatively grasp the relationship among vulnerability, information security incidents, and the countermeasures by using data based on a 2007 questionnaire survey for Japanese ISPs (Internet Service Providers). To grasp the relationships, logistic regression analysis is used. The results clarify that there are relationships between information security incidents and the countermeasures. Concretely, there is a positive relationship between information security incidents and the number of information security systems introduced as well as a negative relationship between information security incidents and information security education. It is also pointed out that (especially, local) ISPs do not execute efficient information security countermeasures/ investment concerned with systems, and it is suggested that they should positively execute information security education. In addition, to further heighten the information security level of Japanese telecommunication infrastructure, the necessity and importance of the government to implement policy to support the countermeasures of ISPs is insisted.

Keywords: Information security countermeasures, information security incidents, internet service providers, positive analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1644
1318 Levels and Trends of Under-Five Mortality in South Africa from 1998 to 2012

Authors: T. Motsima, K. Zuma, E Rapoo

Abstract:

Childhood mortality is a key sign of the coverage of child survival interventions, social and economic progressions. Although the level of under-five mortality has been declining, it is still unacceptably high. The primary aim of this paper is to establish and analyse the levels and trends of under-five mortality for the periods 1998, 2003 and 2012 in South Africa. Methods: The data used for analysis came from the 1998 SADHS, the 2003 SADHS and the 2012 SABSSM which collected information on the survival status of children. The Kaplan-Meier estimate of the survival function method was used to determine the probabilities of failure (death) from birth up to 59 months. Results and Conclusion: The overall U5MR declined by 28.2% from 53.1 in 1998 to 38.1 in 2012. The U5MR of male children declined from 59.2 in 1998 to 46.2 in 2003 and dropped further to 41.4 in 2012. The U5MR of children of mothers aged 40 years and older increased from 64.0 in 1998 to 89.0 in 2003 and rose further to 129.9 in 2012. The U5MR of children of mothers with education level of 12 years or more increased from 32.2 in 1998 to 35.2 in 2003 and declined substantially to 17.5 in 2012.

Keywords: Demographic and health survey, Kaplan-Meier, levels and trends, under-five mortality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 675
1317 An Effective Algorithm for Minimum Weighted Vertex Cover Problem

Authors: S. Balaji, V. Swaminathan, K. Kannan

Abstract:

The Minimum Weighted Vertex Cover (MWVC) problem is a classic graph optimization NP - complete problem. Given an undirected graph G = (V, E) and weighting function defined on the vertex set, the minimum weighted vertex cover problem is to find a vertex set S V whose total weight is minimum subject to every edge of G has at least one end point in S. In this paper an effective algorithm, called Support Ratio Algorithm (SRA), is designed to find the minimum weighted vertex cover of a graph. Computational experiments are designed and conducted to study the performance of our proposed algorithm. Extensive simulation results show that the SRA can yield better solutions than other existing algorithms found in the literature for solving the minimum vertex cover problem.

Keywords: Weighted vertex cover, vertex support, approximation algorithms, NP-complete problem.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3857
1316 Food Deserts and the Sociology of Space: Distance to Food Retailers and Food Insecurity in an Urban American Neighborhood

Authors: Brian J. Thomas

Abstract:

Recent changes in food retailing structure have led to the development of large supercenters in suburban areas of the United States. These changes have led some authors to suggest that there are food deserts in some urban areas, where food is difficult to access, especially for disadvantaged consumers. This study tests the food desert hypothesis by comparing the distance from food retailers to food secure and food insecure households in one urban, Midwest neighborhood. This study utilizes GIS to compare household survey respondent locations against the location of various types of area food retailers. Results of this study indicate no apparent difference between food secure and insecure households in the reported importance of distance on the decision to shop at various retailers. However, there were differences in the spatial relationship between households and retailers. Food insecure households tended to be located slightly farther from large food retailers and slightly closer to convenience stores. Furthermore, food insecure households reported traveling slightly farther to their primary food retailer. The differences between the two groups was, however, relatively small.

Keywords: Food desert, food retailer, food security, sociology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6162
1315 An Examination of the Factors Affecting the Adoption of Cloud Enterprise Resource Planning Systems in Egyptian Companies

Authors: Mayar A. Omar, Ismail Gomaa, Heba Badawy, Hosam Moubarak

Abstract:

Enterprise resource planning (ERP) is an integrated system that helps companies in managing their resources. There are two types of ERP systems, the traditional ERP systems, and the cloud ERP systems. Cloud ERP systems were introduced after the development of cloud computing technology. This research aims to identify the factors that affect the adoption of cloud ERP in Egyptian companies. Moreover, the aim of our study is to provide guidance to Egyptian companies in the cloud ERP adoption decision and to participate in increasing the number of the cloud ERP studies that are conducted in the Middle East and in developing countries. There are many factors influencing the adoption of cloud ERP in Egyptian organizations which are discussed and explained in the research. Those factors are examined through combining the Diffusion of Innovation theory (DOI) and technology-organization-environment framework (TOE). Data were collected through a survey that was developed using constructs from the existing studies of cloud computing and cloud ERP technologies and was then modified to fit our research. The analysis of the data was based on Structural Equation Modeling (SEM) using Smart PLS software that was used for the empirical analysis of the research model.

Keywords: cloud computing, cloud ERP systems, DOI, Egypt, SEM, TOE

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 830
1314 Risk Factors of Becoming NEET Youth in Iran: A Machine Learning Approach

Authors: Hamed Rahmani, Wim Groot

Abstract:

The term "youth not in employment, education or training (NEET)" refers to a combination of youth unemployment and school dropout. This study investigates the variables that increase the risk of becoming NEET in Iran. A selection bias-adjusted Probit model was employed using machine learning to identify these risk factors. We used cross-sectional data obtained from the Statistical Center of Iran and the Ministry of Cooperatives Labor and Social Welfare that are taken from the labor force survey conducted in the spring of 2021. We look at years of education, work experience, housework, the number of children under the age of 6 years in the home, family education, birthplace, and the amount of land owned by households. Results show that hours spent performing domestic chores enhance the likelihood of youth becoming NEET, and years of education, years of potential work experience decrease the chance of being NEET. The findings also show that female youth born in cities were less likely than those born in rural regions to become NEET.

Keywords: NEET youth, probit, CART, machine learning, unemployment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 311
1313 Assessment of Thermal Comfort at Manual Car Body Assembly Workstation

Authors: A. R. Ismail, N. Jusoh, M. Z. Nuawi, B. M. Deros, N. K. Makhtar, M. N. A. Rahman

Abstract:

The objective of this study is to determine the thermal comfort among worker at Malaysian automotive industry. One critical manual assembly workstation had been chosen as a subject for the study. The human subjects for the study constitute operators at Body Assembly Station of the factory. The environment examined was the Relative Humidity (%), Airflow (m/s), Air Temperature (°C) and Radiant Temperature (°C) of the surrounding workstation area. The environmental factors were measured using Babuc apparatus, which is capable to measure simultaneously those mentioned environmental factors. The time series data of fluctuating level of factors were plotted to identify the significant changes of factors. Then thermal comfort of the workers were assessed by using ISO Standard 7730 Thermal sensation scale by using Predicted Mean Vote (PMV). Further Predicted percentage dissatisfied (PPD) is used to estimate the thermal comfort satisfaction of the occupant. Finally the PPD versus PMV were plotted to present the thermal comfort scenario of workers involved in related workstation. The result of PMV at the related industry is between 1.8 and 2.3, where PPD at that building is between 60% to 84%. The survey result indicated that the temperature more influenced comfort to the occupants

Keywords: Thermal, Comfort, Temperature, PPD, PMV

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1878
1312 Current Cosmetic Treatments in Pregnancy

Authors: Daniela F. Maluf, Fernanda Roters, Luma C. F. Silva

Abstract:

The goal of this work is to report the main dermatological alterations occurring during pregnancy and actual cosmetic protocols available and recommended for safe use. Throughout pregnancy, woman's body undergoes many transformations such as hormonal changes and weight gain. These alterations can result in undesirable skin aspects that end up affecting the future mother's life. The main complaints of pregnant women involve melasma advent, varicose veins, edema, and natural skin aging. Even if most of the time is recommended to wait for the birth to use cosmetics, there are some alternatives to prevent and to treat these alterations during pregnancy. For all these cases, there is a need to update information about safety and efficacy of new actives and technologies in cosmetic products. The purpose of this study was to conduct a literature review about the main skin alterations during pregnancy and actual recommended treatments, according to the current legislation.

Keywords: Pregnancy, cosmetic, treatment, physiological changes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2002
1311 Achieving Business and IT Alignment from Organisational Learning Perspectives

Authors: Hamad Hussain Balhareth, Kecheng Liu, Sharm Manwani

Abstract:

Business and IT alignment has continued as a top concern for business and IT executives for almost three decades. Many researchers have conducted empirical studies on the relationship between business-IT alignment and performance. Yet, these approaches, lacking a social perspective, have had little impact on sustaining performance and competitive advantage. In addition to the limited alignment literature that explores organisational learning that is represented in shared understanding, communication, cognitive maps and experiences. Hence, this paper proposes an integrated process that enables social and intellectual dimensions through the concept of organisational learning. In particular, the feedback and feedforward process which provide a value creation across dynamic multilevel of learning. This mechanism enables on-going effectiveness through development of individuals, groups and organisations, which improves the quality of business and IT strategies and drives to performance.

Keywords: business-IT alignment, social dimension, intellectual dimension, organisational learning

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1727
1310 Correlation of Viscosity in Nanofluids using Genetic Algorithm-neural Network (GA-NN)

Authors: Hajir Karimi, Fakheri Yousefi, Mahmood Reza Rahimi

Abstract:

An accurate and proficient artificial neural network (ANN) based genetic algorithm (GA) is developed for predicting of nanofluids viscosity. A genetic algorithm (GA) is used to optimize the neural network parameters for minimizing the error between the predictive viscosity and the experimental one. The experimental viscosity in two nanofluids Al2O3-H2O and CuO-H2O from 278.15 to 343.15 K and volume fraction up to 15% were used from literature. The result of this study reveals that GA-NN model is outperform to the conventional neural nets in predicting the viscosity of nanofluids with mean absolute relative error of 1.22% and 1.77% for Al2O3-H2O and CuO-H2O, respectively. Furthermore, the results of this work have also been compared with others models. The findings of this work demonstrate that the GA-NN model is an effective method for prediction viscosity of nanofluids and have better accuracy and simplicity compared with the others models.

Keywords: genetic algorithm, nanofluids, neural network, viscosity

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2067
1309 Non-Linear Control Based on State Estimation for the Convoy of Autonomous Vehicles

Authors: M-M. Mohamed Ahmed, Nacer K. M’Sirdi, Aziz Naamane

Abstract:

In this paper, a longitudinal and lateral control approach based on a nonlinear observer is proposed for a convoy of autonomous vehicles to follow a desired trajectory. To authors best knowledge, this topic has not yet been sufficiently addressed in the literature for the control of multi vehicles. The modeling of the convoy of the vehicles is revisited using a robotic method for simulation purposes and control design. With these models, a sliding mode observer is proposed to estimate the states of each vehicle in the convoy from the available sensors, then a sliding mode control based on this observer is used to control the longitudinal and lateral movement. The validation and performance evaluation are done using the well-known driving simulator Scanner-Studio. The results are presented for different maneuvers of 5 vehicles.

Keywords: Autonomous vehicles, convoy, nonlinear control, nonlinear observer, sliding mode.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 711
1308 An Efficient Heuristic for the Minimum Connected Dominating Set Problem on Ad Hoc Wireless Networks

Authors: S. Balaji, N. Revathi

Abstract:

Connected dominating set (CDS) problem in unit disk graph has signi£cant impact on an ef£cient design of routing protocols in wireless sensor networks, where the searching space for a route is reduced to nodes in the set. A set is dominating if all the nodes in the system are either in the set or neighbors of nodes in the set. In this paper, a simple and ef£cient heuristic method is proposed for £nding a minimum connected dominating set (MCDS) in ad hoc wireless networks based on the new parameter support of vertices. With this parameter the proposed heuristic approach effectively £nds the MCDS of a graph. Extensive computational experiments show that the proposed approach outperforms the recently proposed heuristics found in the literature for the MCD

Keywords: ad hoc wireless networks, dominating sets, unit disk graphs, heuristic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2191
1307 An Overview of Handoff Techniques in Cellular Networks

Authors: Nasıf Ekiz, Tara Salih, Sibel Küçüköner, Kemal Fidanboylu

Abstract:

Continuation of an active call is one of the most important quality measurements in the cellular systems. Handoff process enables a cellular system to provide such a facility by transferring an active call from one cell to another. Different approaches are proposed and applied in order to achieve better handoff service. The principal parameters used to evaluate handoff techniques are: forced termination probability and call blocking probability. The mechanisms such as guard channels and queuing handoff calls decrease the forced termination probability while increasing the call blocking probability. In this paper we present an overview about the issues related to handoff initiation and decision and discuss about different types of handoff techniques available in the literature.

Keywords: Handoff, Forced Termination Probability, Blocking probability, Handoff Initiation, Handoff Decision, Handoff Prioritization Schemes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6586
1306 What Managers Think of Informal Networks and Knowledge Sharing by Means of Personal Networking?

Authors: Mahmood Q.K. Ghaznavi, Martin Perry, Paul Toulson, Keri Logan

Abstract:

The importance of nurturing, accumulating, and efficiently deploying knowledge resources through formal structures and organisational mechanisms is well understood. Recent trends in knowledge management (KM) highlight that the effective creation and transfer of knowledge can also rely upon extra-organisational channels, such as, informal networks. The perception exists that the role of informal networks in knowledge creation and performance has been underestimated in the organisational context. Literature indicates that many managers fail to comprehend and successfully exploit the potential role of informal networks to create value for their organisations. This paper investigates: 1) whether managers share work-specific knowledge with informal contacts within and outside organisational boundaries; and 2) what do they think is the importance of this knowledge collaboration in their learning and work outcomes.

Keywords: Informal network, knowledge management, knowledge sharing, performance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2091
1305 Mathematical Programming Models for Portfolio Optimization Problem: A Review

Authors: M. Mokhtar, A. Shuib, D. Mohamad

Abstract:

Portfolio optimization problem has received a lot of attention from both researchers and practitioners over the last six decades. This paper provides an overview of the current state of research in portfolio optimization with the support of mathematical programming techniques. On top of that, this paper also surveys the solution algorithms for solving portfolio optimization models classifying them according to their nature in heuristic and exact methods. To serve these purposes, 40 related articles appearing in the international journal from 2003 to 2013 have been gathered and analyzed. Based on the literature review, it has been observed that stochastic programming and goal programming constitute the highest number of mathematical programming techniques employed to tackle the portfolio optimization problem. It is hoped that the paper can meet the needs of researchers and practitioners for easy references of portfolio optimization.

Keywords: Portfolio optimization, Mathematical programming, Multi-objective programming, Solution approaches.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6549
1304 Using the Technology Acceptance Model to Examine Seniors’ Attitudes toward Facebook

Authors: Chien-Jen Liu, Shu Ching Yang

Abstract:

Using the technology acceptance model (TAM), this study examined the external variables of technological complexity (TC) to acquire a better understanding of the factors that influence the acceptance of computer application courses by learners at Active Aging Universities. After the learners in this study had completed a 27-hour Facebook course, 44 learners responded to a modified TAM survey. Data were collected to examine the path relationships among the variables that influence the acceptance of Facebook-mediated community learning. The partial least squares (PLS) method was used to test the measurement and the structural model. The study results demonstrated that attitudes toward Facebook use directly influence behavioral intentions (BI) with respect to Facebook use, evincing a high prediction rate of 58.3%. In addition to the perceived usefulness (PU) and perceived ease of use (PEOU) measures that are proposed in the TAM, other external variables, such as TC, also indirectly influence BI. These four variables can explain 88% of the variance in BI and demonstrate a high level of predictive ability. Finally, limitations of this investigation and implications for further research are discussed.

Keywords: Technology acceptance model (TAM), technological complexity, partial least squares (PLS), perceived usefulness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3172
1303 Web-GIS based Outdoor Education Program for Elementary Schools

Authors: Noriyoshi Hosoya, Kayoko Yamamoto

Abstract:

This study, focusing on the importance of encouraging outdoor activities for children, aims to propose and implement a Web-GIS based outdoor education program for elementary schools, which will then be evaluated by users. Specifically, for the purpose of improved outdoor activities in the elementary school education, the outdoor education program, with chiefly using the Web-GIS that provides a good information provision and sharing tool, is proposed and implemented before being evaluated by users. Conclusions of the study boil down to: (1) An eight-staged outdoor education program based on the Web-GIS was proposed for a “second school" of an elementary school that was then implemented before being evaluated by users (teachers, instructors, students, and their parents). (2) The program generally received a good evaluation, while a lot of students and their parents evaluated negatively for the degree of discovery and for the degree of interest, respectively, in the questionnaire survey of students and their parents conducted after the “second school". The surveys clearly show that an issue to be solved, from the viewpoint of teachers in particular, is the establishment of the GIS that will easily represent teaching materials developed by teachers and of Web-GIS, and improved significance of the use of GIS and Web-GIS for their widespread.

Keywords: Elementary Schools, School Education, Outdooreducation, Web-GIS

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1616
1302 Pseudo Last Useful Instant Queuing Strategy for Handovers in Low Earth Orbit Mobile Satellite Networks

Authors: W. Kiamouche, M. Benslama

Abstract:

This paper presents an alternative strategy of queuing handover called Pseudo Last Useful Instant PLUI scheme for Low Earth Orbit Mobile Satellite Systems LEO MSSs. The PLUI scheme uses the same approach as the Last Useful Instant LUI scheme previously proposed in literature, with less complex implementation. Simulation tests were carried out using Dynamic Channel Allocation DCA in order to evaluate the performance of this scheme and also an analytical approach has been presented to allow the performance evaluation of Fixed Channel Allocation FCA, with different handover queuing disciplines. The results show that performances achieved by the proposed strategy are close to those achieved using the LUI scheme.

Keywords: LEO mobile satellite networks, LUI and FIFOschemes, queuing handover.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1389
1301 Mathematical Modelling of Partially Filled Fluid Coupling Behaviour

Authors: A. M. Maqableh

Abstract:

Modelling techniques for a fluid coupling taken from published literature have been extended to include the effects of the filling and emptying of the coupling with oil and the variation in losses when the coupling is partially full. In the model, the fluid flow inside the coupling is considered to have two principal velocity components; one circumferentially about the coupling axis (centrifugal head) and the other representing the secondary vortex within the coupling itself (vortex head). The calculation of liquid mass flow rate circulating between the two halves of the coupling is based on: the assumption of a linear velocity variation in the circulating vortex flow; the head differential in the fluid due to the speed difference between the two shafts; and the losses in the circulating vortex flow as a result of the impingement of the flow with the blades in the coupling and friction within the passages between the blades.

Keywords: Fluid Coupling, Mathematical Modelling, partially filled.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2070
1300 CFD Simulation of Surge Wave Generated by Flow-Like Landslides

Authors: Liu-Chao Qiu

Abstract:

The damage caused by surge waves generated in water bodies by flow-like landslides can be very high in terms of human lives and economic losses. The complicated phenomena occurred in this highly unsteady process are difficult to model because three interacting phases: air, water and sediment are involved. The problem therefore is challenging since the effects of non-Newtonian fluid describing the rheology of the flow-like landslides, multi-phase flow and free surface have to be included in the simulation. In this work, the commercial computational fluid dynamics (CFD) package FLUENT is used to model the surge waves due to flow-like landslides. The comparison between the numerical results and experimental data reported in the literature confirms the accuracy of the method.

Keywords: Flow-like landslide, surge wave, VOF, non-Newtonian fluids, multi-phase flows, free surface flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1398
1299 Understanding ICT Behaviors among Health Workers in Sub-Saharan Africa: A Cross-Sectional Study for Laboratory Persons in Uganda

Authors: M. Kasusse, M. Rosette, E. Burke, C. Mwangi, R. Batamwita, N. Tumwesigye, S. Aisu

Abstract:

A cross-sectional survey to ascertain the capacity of laboratory persons in using ICTs was conducted in 15 Ugandan districts (July-August 2013). A self-administered questionnaire served as data collection tool, interview guide and observation checklist. 69 questionnaires were filled, 12 interviews conducted, 45 HC observed. SPSS statistics 17.0 and SAS 9.2 software were used for entry and analyses. 69.35% of participants find it difficult to access a computer at work. Of the 30.65% who find it easy to access a computer at work, a significant 21.05% spend 0 hours on a computer daily. 60% of the participants cannot access internet at work. Of the 40% who have internet at work, a significant 20% lack email address but 20% weekly read emails weekly and 48% daily. It is viable/feasible to pilot informatics projects as strategies to build bridges develop skills for e-health landscape in laboratory services with a bigger financial muscle.

Keywords: ICT Behavior, Clinical Laboratory persons, Sub-Saharan Africa, Uganda.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1690
1298 Effects of Environmental Factors on Polychaete Assemblage in Penang National Park, Malaysia

Authors: Mohammad Gholizadeh, Khairun Yahya, Anita Talib, Omar Ahmad

Abstract:

Macrobenthos distribution along the coastal waters of Penang National Park was studid to estimate the effect of different environmental parameters at three stations, during six sampling months, from June 2010 to April 2011. The aim of this survey was to investigate different environment stress over soft bottom polychaete community along Teluk Ketapang and Pantai Acheh (Penang National Park) over a year period. Variations in the polychaete community were evaluated using univariate and multivariate methods. A total of 604 individuals were examined which was grouped into 23 families. Family Nereidae was the most abundant (22.68%), followed by Spionidae (22.02%), Hesionidae (12.58%), Nephtylidae (9.27%) and Orbiniidae (8.61%). It is noticeable that good results can only be obtained on the basis of good taxonomic resolution. The maximum Shannon-Wiener diversity (H'=2.16) was recorded at distance 200m and 1200m (August 2010) in Teluk Ketapang and lowest value of diversity was found at distance 1200m (December 2010) in Teluk Ketapang.

Keywords: Polychaete assemblage, environment factor, Pantai Acheh, Teluk Ketapang.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2178
1297 Benchmarking Role in Internal Supply Chain Management of Indian Manufacturing Industries

Authors: Kailash, Rajeev Kumar Saha, Sanjeev Goyal

Abstract:

Due to day by day competition in the market, the implementation of benchmarking practice is necessary for improving existing internal supply chain management performance of manufacturing industries. The continuous benchmarking practice might be helpful to increase the productivity of middle scale medium enterprises (MSMEs) by reducing the idle time during the flow of raw material/products, funds and information. The objective of this research paper is to provide an overview of benchmarking, benchmarking wheel, benchmarking tool and techniques and its importance through literature review of reputed journals. This concept of benchmarking may be fruitful in the process of gap identification and for improving the performance of internal supply chain management of Indian manufacturing industries.

Keywords: Benchmarking, benchmarking cyclic wheel, supply chain management, types of benchmarking, supply chain management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1280
1296 Emergency Health Management and Student Hygiene at a South African University

Authors: Kudzai Ashley Tagwira, Michelle Marle Marais, Tracy Anne Ludwig, Rutendo Precious Chidziva, Mavis Nyaradzo Munodawafa, Wendy M. Wrench, Roman Tandlich

Abstract:

Risk of infectious disease outbreaks is related to the hygiene among the population. To assess the actual risks and modify the relevant emergency procedures if necessary, a hygiene survey was conducted among undergraduate students on the Rhodes University campus. Soap was available to 10.5% and only 26.8% of the study participants followed proper hygiene in relation to food consumption. This combination increases the risk of infectious disease outbreaks at the campus. Around 83.6% were willing to wash their hands if soap was provided. Procurement and availability of soap in undergraduate residences on campus should be improved, as the total cost is estimated at only 2000 USD per annum. Awareness campaigns about food-related hygiene and the need for regular handwashing with soap should be run among Rhodes University students. If successful, rates of respiratory and hygiene-related diseases will be decreased and emergency health management simplified.

Keywords: Awareness, Food hygiene, Infectious disease spread, Undergraduate students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2122
1295 Selection of Appropriate Classification Technique for Lithological Mapping of Gali Jagir Area, Pakistan

Authors: Khunsa Fatima, Umar K. Khattak, Allah Bakhsh Kausar

Abstract:

Satellite images interpretation and analysis assist geologists by providing valuable information about geology and minerals of an area to be surveyed. A test site in Fatejang of district Attock has been studied using Landsat ETM+ and ASTER satellite images for lithological mapping. Five different supervised image classification techniques namely maximum likelihood, parallelepiped, minimum distance to mean, mahalanobis distance and spectral angle mapper have been performed upon both satellite data images to find out the suitable classification technique for lithological mapping in the study area. Results of these five image classification techniques were compared with the geological map produced by Geological Survey of Pakistan. Result of maximum likelihood classification technique applied on ASTER satellite image has highest correlation of 0.66 with the geological map. Field observations and XRD spectra of field samples also verified the results. A lithological map was then prepared based on the maximum likelihood classification of ASTER satellite image.

Keywords: ASTER, Landsat-ETM+, Satellite, Image classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2907
1294 General Awareness of Teenagers in Information Security

Authors: Magdalena Naplavova, Tomas Ludik, Petr Hruza, Frantisek Bozek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: Cyberspace, educational system, general awareness, information security, questionnaire, socio-pathological phenomena.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2333
1293 Genetic Algorithm for Solving Non-Convex Economic Dispatch Problem

Authors: Navid Javidtash, Abdolmohamad Davodi, Mojtaba Hakimzadeh, Abdolreza Roozbeh

Abstract:

Economic dispatch (ED) is considered to be one of the key functions in electric power system operation. This paper presents a new hybrid approach based genetic algorithm (GA) to economic dispatch problems. GA is most commonly used optimizing algorithm predicated on principal of natural evolution. Utilization of chaotic queue with GA generates several neighborhoods of near optimal solutions to keep solution variation. It could avoid the search process from becoming pre-mature. For the objective of chaotic queue generation, utilization of tent equation as opposed to logistic equation results in improvement of iterative speed. The results of the proposed approach were compared in terms of fuel cost, with existing differential evolution and other methods in literature.

Keywords: Economic Dispatch(ED), Optimization, Fuel Cost, Genetic Algorithm (GA).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2378
1292 Understanding and Measuring Trust Evolution Effectiveness in Peer-to-Peer Computing Systems

Authors: Farag Azzedin, Ali Rizvi

Abstract:

In any trust model, the two information sources that a peer relies on to predict trustworthiness of another peer are direct experience as well as reputation. These two vital components evolve over time. Trust evolution is an important issue, where the objective is to observe a sequence of past values of a trust parameter and determine the future estimates. Unfortunately, trust evolution algorithms received little attention and the proposed algorithms in the literature do not comply with the conditions and the nature of trust. This paper contributes to this important problem in the following ways: (a) presents an algorithm that manages and models trust evolution in a P2P environment, (b) devises new mechanisms for effectively maintaining trust values based on the conditions that influence trust evolution , and (c) introduces a new methodology for incorporating trust-nurture incentives into the trust evolution algorithm. Simulation experiments are carried out to evaluate our trust evolution algorithm.

Keywords: P2P, Trust, Reputation, Incentives.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1254