Search results for: Public service ethics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2221

Search results for: Public service ethics

421 Inter-Organizational Knowledge Transfer Through Malaysia E-government IT Outsourcing: A Theoretical Review

Authors: Nor Aziati Abdul Hamid, Juhana Salim

Abstract:

The main objective of this paper is to contribute the existing knowledge transfer and IT Outsourcing literature specifically in the context of Malaysia by reviewing the current practices of e-government IT outsourcing in Malaysia including the issues and challenges faced by the public agencies in transferring the knowledge during the engagement. This paper discusses various factors and different theoretical model of knowledge transfer starting from the traditional model to the recent model suggested by the scholars. The present paper attempts to align organizational knowledge from the knowledge-based view (KBV) and organizational learning (OL) lens. This review could help shape the direction of both future theoretical and empirical studies on inter-firm knowledge transfer specifically on how KBV and OL perspectives could play significant role in explaining the complex relationships between the client and vendor in inter-firm knowledge transfer and the role of organizational management information system and Transactive Memory System (TMS) to facilitate the organizational knowledge transferring process. Conclusion is drawn and further research is suggested.

Keywords: E-government, IT Outsourcing, Knowledge Management, Knowledge Transfer

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2368
420 Exploring Employee Experiences of Distributed Leadership in Consultancy SMEs

Authors: Mohamed Haffar, Ramdane Djebarni, Russell Evans

Abstract:

Despite a growth in literature on distributed leadership, the majority of studies are centred on large public organisations particularly within the health and education sectors. The purpose of this study is to fill the gap in the literature by exploring employee experiences of distributed leadership within two commercial consultancy SME businesses in the UK and USA. The aim of the study informed an exploratory method of research to gather qualitative data drawn from semi-structured interviews involving a sample of employees in each organisation. A series of broad, open questions were used to explore the employees’ experiences; evidence of distributed leadership; and extant barriers and practices in each organisation. Whilst some of our findings aligned with patterns and practices in the existing literature, it importantly discovered some emergent themes that have not previously been recognised in the previous studies. Our investigation identified that whilst distributed leadership was in evidence in both organisations, the interviewees’ experience reported that it was sporadic and inconsistent. Moreover, non-client focused projects were reported to be less important and distributed leadership was found to be inconsistent or non-existent.

Keywords: Consultancy, distributed leadership, owner-manager, SME, entrepreneur.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 756
419 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al_Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced, or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfill Shannon’s principle of “confusion and diffusion”. ASCII code characters were utilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: Cryptosystems, Information Security agreement, Key distribution, Random numbers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3431
418 Impact of Social Media on the Functioning of the Indian Government: A Critical Analysis

Authors: Priya Sepaha

Abstract:

Social media has loomed as the most effective tool in recent times to flag the causes, contents, opinions and direction of any social movement and has demonstrated that it will have a far-reaching effect on government as well. This study focuses on India which has emerged as the fastest growing community on social media. Social movement activists, in particular, have extensively utilized the power of digital social media to streamline the effectiveness of social protest on a particular issue through extensive successful mass mobilizations. This research analyses the role and impact of social media as a power to catalyze the social movements in India and further seeks to describe how certain social movements are resisted, subverted, co-opted and/or deployed by social media. The impact assessment study has been made with the help of cases, policies and some social movement which India has witnessed the assertion of numerous social issues perturbing the public which eventually paved the way for remarkable judicial decisions. The paper concludes with the observations that despite its pros and cons, the impacts of social media on the functioning of the Indian Government have demonstrated that it has already become an indispensable tool in the hands of social media-suave Indians who are committed to bring about a desired change.

Keywords: Impact, Indian government, misuse, social media, social movement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1006
417 Evaluating Emission Reduction Due to a Proposed Light Rail Service: A Micro-Level Analysis

Authors: Saeid Eshghi, Neeraj Saxena, Abdulmajeed Alsultan

Abstract:

Carbon dioxide (CO2) alongside other gas emissions in the atmosphere cause a greenhouse effect, resulting in an increase of the average temperature of the planet. Transportation vehicles are among the main contributors of CO2 emission. Stationary vehicles with initiated motors produce more emissions than mobile ones. Intersections with traffic lights that force the vehicles to become stationary for a period of time produce more CO2 pollution than other parts of the road. This paper focuses on analyzing the CO2 produced by the traffic flow at Anzac Parade Road - Barker Street intersection in Sydney, Australia, before and after the implementation of Light rail transport (LRT). The data are gathered during the construction phase of the LRT by collecting the number of vehicles on each path of the intersection for 15 minutes during the evening rush hour of 1 week (6-7 pm, July 04-31, 2018) and then multiplied by 4 to calculate the flow of vehicles in 1 hour. For analyzing the data, the microscopic simulation software “VISSIM” has been used. Through the analysis, the traffic flow was processed in three stages: before and after implementation of light rail train, and one during the construction phase. Finally, the traffic results were input into another software called “EnViVer”, to calculate the amount of CO2 during 1 h. The results showed that after the implementation of the light rail, CO2 will drop by a minimum of 13%. This finding provides an evidence that light rail is a sustainable mode of transport.

Keywords: Carbon dioxide, emission modeling, light rail, microscopic model, traffic flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 946
416 Authentication Protocol for Wireless Sensor Networks

Authors: Sunil Gupta, Harsh Kumar Verma, AL Sangal

Abstract:

Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.

Keywords: Authentication, Key management, Wireless Sensornetwork, Elliptic curve cryptography (ECC).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3824
415 Underpricing of IPOs during Hot and Cold Market Periods on the South African Stock Exchange (JSE)

Authors: Brownhilder N. Neneh, A. Van Aardt Smit

Abstract:

Underpricing is one anomaly in initial public offerings (IPO) literature that has been widely observed across different stock markets with different trends emerging over different time periods. This study seeks to determine how IPOs on the JSE performed on the first day, first week and first month over the period of 1996-2011. Underpricing trends are documented for both hot and cold market periods in terms of four main sectors (cyclical, defensive, growth stock and interest rate sensitive stocks). Using a sample of 360 listed companies on the JSE, the empirical findings established that IPOs on the JSE are significantly underpriced with an average market adjusted first day return of 62.9%. It is also established that hot market IPOs on the JSE are more underpriced than the cold market IPOs. Also observed is the fact that as the offer price per share increases above the median price for any given period, the level of underpricing decreases substantially. While significant differences exist in the level of underpricing of IPOs in the four different sectors in the hot and cold market periods, interest rates sensitive stocks showed a different trend from the other sectors and thus require further investigation to uncover this pattern.

Keywords: Underpricing, hot and cold markets, South Africa, JSE.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4201
414 Optimizing Telehealth Internet of Things Integration: A Sustainable Approach through Fog and Cloud Computing Platforms for Energy Efficiency

Authors: Yunyong Guo, Sudhakar Ganti, Bryan Guo

Abstract:

The swift proliferation of telehealth Internet of Things (IoT) devices has sparked concerns regarding energy consumption and the need for streamlined data processing. This paper presents an energy-efficient model that integrates telehealth IoT devices into a platform based on fog and cloud computing. This integrated system provides a sustainable and robust solution to address the challenges. Our model strategically utilizes fog computing as a localized data processing layer and leverages cloud computing for resource-intensive tasks, resulting in a significant reduction in overall energy consumption. The incorporation of adaptive energy-saving strategies further enhances the efficiency of our approach. Simulation analysis validates the effectiveness of our model in improving energy efficiency for telehealth IoT systems, particularly when integrated with localized fog nodes and both private and public cloud infrastructures. Subsequent research endeavors will concentrate on refining the energy-saving model, exploring additional functional enhancements, and assessing its broader applicability across various healthcare and industry sectors.

Keywords: Energy-efficient, fog computing, IoT, telehealth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 85
413 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: Authentication, computer security, keylogger, privacy, information leakage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 777
412 Identification Common Microbes Observed on Polyester Tufting

Authors: A. Ashjaran, M.E. Yazdanshenas, R. Ghazi Saeidi, S. Moghadamifar

Abstract:

Tufting carpet is a very suitable substrate for growing microorganism such as pathogenic microbes, due to the direct touch with human body, long washing periods and laying on the floor; in fact there are 3 major problems: To risk human health, Prepare bad odors and Destruction of the products.. In the presented research, for investigation of presence most common microbes on polyester tufting, first goods laid in a public place (in the corridor fair) for 30 days and the existence of some microbes were investigate on it with two methods of enrichment in nutrient environments such as thioglycolate and noutrunt brath, and shake the dust off the polyester tufting onto cultivation mediums such as blood agar and noutrunt agar. After the microorganism colonics are grown, the colonies were separated and six microbial tests such as cataloes and sitrat were carried out in five phases on the colonics for identifying the varieties of bacteria. As a result of tests, 5 type of bacteria, such as Escherichia coli, staphylococcus saprophytic as were identified. Each of the mentioned bacteria can be seriously harmful for the heath of human.

Keywords: Microorganisms, Polyester tufting, Escherichia coli, Staphylococcus saprophytic, Blood agar, Thioglycolate

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1664
411 Training on the Ceasing Intention of Betelnut Addiction

Authors: Shu-Mei Liu, Feng-Chuan Pan

Abstract:

According to the governmental data, the cases of oral cancers doubled in the past 10 years. This had brought heavy burden to the patients- family, the society, and the country. The literature generally evidenced the betel nut contained particular chemicals that can cause oral cancers. Research in Taiwan had also proofed that 90 percent of oral cancer patients had experience of betel nut chewing. It is thus important to educate the betel-nut hobbyists to cease such a hazardous behavior. A program was then organized to establish several training classes across different areas specific to help ceasing this particular habit. Purpose of this research was to explore the attitude and intention toward ceasing betel-nut chewing before and after attending the training classes. 50 samples were taken from a ceasing class with average age at 45 years old with high school education (54%). 74% of the respondents were male in service or agricultural industries. Experiences in betel-nut chewing were 5-20 years with a dose of 1-20 pieces per day. The data had shown that 60% of the respondents had cigarette smoking habit, and 30% of the respondents were concurrently alcoholic dependent. Research results indicated that the attitude, intentions, and the knowledge on oral cancers were found significant different between before and after attendance. This provided evidence for the effectiveness of the training class. However, we do not perform follow-up after the class. Noteworthy is the test result also shown that participants who were drivers as occupation, or habitual smokers or alcoholic dependents would be less willing to quit the betel-nut chewing. The test results indicated as well that the educational levels and the type of occupation may have significant impacts on an individual-s decisions in taking betel-nut or substance abuse.

Keywords: Oral cancer, betel-nut ceasing class, attitude, intention

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1880
410 Village Construction under China-s Rapid Urbanization: The Role and Strategy of Planning in the Rural Areas

Authors: Chen Zhang, Jiwu Wang

Abstract:

With China's urbanization continuing to accelerate, a amount of rural people flood into China's cities in recent years, and the issue of agriculture, rural areas and farmers is getting more and more serious. In 2005, the Chinese government put forward a plan for “the construction of new rural village", in order to coordinate the development of both urban and rural areas. The planning method of rural region differs sharply from that of urban areas, as same as village social structure and habits of farmer-s life, so the studies which can consider the special needs of village construction in China are absolutely essential. This paper expresses explore current situation and problems existing in the construction of China-s new rural village, such as bigger gap between urban and rural areas, excessive new construction projects, extinct traditional village style and so on. It tries to analyze the deep reason of the present situation of the village from law system, industrial structure, financial sources and planning method. Then it also provides a guide for developing policies and procedures promoting the development of china-s rural areas.

Keywords: Rural areas, village construction, physical planning, law system, financial sources, Public participation, China.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2005
409 The Smoke Suppression Effect of Copper Oxideon the Epoxy Resin/Intumescent Flame Retardant/Titanate Couple Agent System

Authors: Zhiping Wu, Meiqin Chen, Haikuan Yang, Yunchu Hu

Abstract:

Fire disaster is the major factor to endanger the public and environmental safety. People lost their life during fire disaster mainly be attributed to the dense smoke and toxic gas under combustion, which hinder the escape of people and the rescue of firefighters under fire disaster. The smoke suppression effect of several transitional metals oxide on the epoxy resin treated with intumescent flame retardant and titanate couple agent (EP/IFR/Titanate) system have been investigated. The results showed manganese dioxide has great effect on reducing the smoke density rate (SDR) of EP/IFR/Titanate system; however it has little effect to reduce the maximum smoke density (MSD) of EP/IFR/Titanate system. Copper oxide can decrease the maximum smoke density (MSD) and smoke density rate of EP/IFR/Titanate system substantially. The MSD and SDR of EP/IFR/Titanate system can reduce 20.3% and 39.1% respectively when 2% of copper oxide is introduced.

Keywords: copper oxide, epoxy resin, intumescent flameretardant, smoke suppression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2695
408 Barriers to Competitive Tenders in Building Conservation Works

Authors: Yoke-Mui Lim, Yahaya Ahmad

Abstract:

Conservation works in Malaysia that is procured by public organisation usually follow the traditional approach where the works are tendered based on Bills of Quantities (BQ). One of the purposes of tendering is to enable the selection of a competent contractor that offers a competitive price. While competency of the contractors are assessed by their technical knowledge, experience and track records, the assessment of pricing will be dependent on the tender amount. However, the issue currently faced by the conservation works sector is the difficulty in assessing the competitiveness and reasonableness of the tender amount due to the high variance between the tenders amount. Thus, this paper discusses the factors that cause difficulty to the tenderers in pricing competitively in a bidding exercise for conservation tenders. Data on tendering is collected from interviews with conservation works contractors to gain in-depth understanding of the barriers faced in pricing tenders of conservation works. Findings from the study lent support to the contention that the variance of tender amount is very high amongst tenderers. The factors identified in the survey are the format of BQ, hidden works, experience and labour and material costs.

Keywords: Building Conservation, Malaysia, Bill of Quantities, Tender.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2430
407 Solid Waste Management through Mushroom Cultivation – An Eco Friendly Approach

Authors: Mary Josephine

Abstract:

Waste of certain process can be the input source of  other sectors in order to reduce environmental pollution. Today there  are more and more solid wastes are generated, but only very small  amount of those are recycled. So, the threatening of environmental  pressure to public health is very serious. The methods considered for  the treatment of solid waste are biogas tanks or processing to make  animal feed and fertilizer, however, they did not perform well. An  alternative approach is growing mushrooms on waste residues. This  is regarded as an environmental friendly solution with potential  economical benefit. The substrate producers do their best to produce  quality substrate at low cost. Apart from other methods, this can be  achieved by employing biologically degradable wastes used as the  resource material component of the substrate. Mushroom growing is  a significant tool for the restoration, replenishment and remediation  of Earth’s overburdened ecosphere. One of the rational methods of  waste utilization involves locally available wastes. The present study  aims to find out the yield of mushroom grown on locally available  waste for free and to conserve our environment by recycling wastes.

 

Keywords: Biodegradable, environment, mushroom, remediation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5312
406 Origins of Chicago Common Brick: Examining a Masonry Shell Encasing a New Ando Museum

Authors: Daniel Joseph Whittaker

Abstract:

This paper examines the broad array of historic sites from which Chicago common brick has emerged, and the methods this brick has been utilized within and around a new hybrid structure recently completed-and periodically opened to the public, as a private art, architecture, design, and social activism gallery space. Various technical aspects regarding the structural and aesthetic reuse methods of salvaged brick within the interior and exterior of this new Tadao Ando-designed building in Lincoln Park, Chicago, are explored. This paper expands specifically upon the multiple possible origins of Chicago common brick, as well as the extant brick currently composing the surrounding alley which is integral to demarcating the southern site boundary of the old apartment building now gallery. Themes encompassing Chicago’s archeological and architectural history, local resource extraction, and labor practices permeate this paper’s investigation into urban, social and architectural history and building construction technology advancements through time.

Keywords: Masonry construction, history brickmaking, private museums, Chicago Illinois, Tadao Ando.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 932
405 Development of One-Axis Didactic Solar Tracker for Photovoltaic Panels

Authors: L. J. de Bessa Neto, M. R. B. Guerra Vale, F. K. O. M. Varella Guerra

Abstract:

In recent years, solar energy has established itself as one of the main sources of renewable energy, gaining a large space in electricity generation around the world. However, due to the low performance of photovoltaic panels, technologies need to be sought to maximize the production of electricity. In this regard, the present study aims to develop a prototype of solar tracker for didactics applications, controlled with the Arduino® platform, that enables the movement of photovoltaic plates in relation to the sun positions throughout the day through an electromechanical system, optimizing, thus, the efficiency of solar photovoltaic generation and improvements for the photovoltaic effect. The solar tracking technology developed in this work was presented of the shape oral and practical in two middle schools in the municipality of Mossoró/RN, being one of the public network and other of the private network, always keeping the average age of the students, in the case, around 16 years, contemplating an average of 60 students in each of the visits. Thus, it is concluded that the present study contributed substantially to the dissemination of knowledge concerning the photovoltaic solar generation, as well as the study of solar trackers, thus arousing the interest and curiosity of the students regarding the thematic approached.

Keywords: Alternative energy, solar tracker, energy efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 909
404 Students’ Participation in Higher Education Governance in Mainland China

Authors: Rurui (Angelina) Liu

Abstract:

Universities have been one of the most important institutions in society. They shoulder the responsibility to do research and teach further generations. Therefore, the governance of universities has been a heated topic and has been learned for years. Recently, it witnessed great changes, for example, the massification of Higher Education (HE), marketization, and privatization. As a result, more stakeholders are involved in the governance of HE, among which students’ participation in HE becomes more important. However, the research about students’ participation in HE governance in China is not sufficient, and the situation requires improvement. The paper aims to not only fill in the research gap but also put forward practical suggestions to follow the world’s trend of HE governance. The methodology of this paper is literature analysis with comparative studies between China and western countries. The research points out that the current situation of students’ participation in HE governance is unideal due to problems in three fields, values and concepts, mechanisms and systems, as well as student unions. Then, the policy implications are based on these reasons: universities should highlight students’ status, respect their subjectivity and adhere to the service awareness; the government requires to build a sound legal system while universities should establish complete mechanisms and systems; student unions should be encouraged by universities to take part in HE governance affairs with sufficient funds, and autonomy. On the one hand, this paper is a further application of four rationales (consumerism, political-realism, communitarian, democracy, and consequentialism) created by Luescher‐Mamashela for the inevitable trend of students’ participation in HE governance. On the other hand, the suggestions it made benefit the students, universities, and society in practical ways.

Keywords: Students’ participation, higher education governance, Chinese higher education, university power.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 564
403 The Impact of the Knowledge-Sharing Factors on Improving Decision-Making at Sultan Qaboos University Libraries

Authors: Aseela Alhinaai, Suliman Abdullah, Adil Albusaidi

Abstract:

Knowledge has been considered an important asset in private and public organizations. It is utilized in the libraries sector to run different operations of technical services and administrative works. This study aims to identify the impact of the knowledge-sharing factors (technology, collaboration, management support) to improve decision-making at Sultan Qaboos University Libraries. This study conducted a quantitative method using a questionnaire instrument to measure the impact of technology, collaboration, and management support on knowledge sharing that lead to improved decision-making. The study population is the Sultan Qaboos University (SQU) libraries (Main Library, Medical Library, College of Economic and Political Science Library, and Art Library). The results showed that management support, collaboration, and technology use have a positive impact on the knowledge-sharing process, and knowledge sharing positively affects decision making process.

Keywords: Knowledge sharing, decision making, information technology, management support, corroboration, Sultan Qaboos University.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 155
402 Simulation Model for Predicting Dengue Fever Outbreak

Authors: Azmi Ibrahim, Nor Azan Mat Zin, Noraidah Sahari Ashaari

Abstract:

Dengue fever is prevalent in Malaysia with numerous cases including mortality recorded over the years. Public education on the prevention of the desease through various means has been carried out besides the enforcement of legal means to eradicate Aedes mosquitoes, the dengue vector breeding ground. Hence, other means need to be explored, such as predicting the seasonal peak period of the dengue outbreak and identifying related climate factors contributing to the increase in the number of mosquitoes. Simulation model can be employed for this purpose. In this study, we created a simulation of system dynamic to predict the spread of dengue outbreak in Hulu Langat, Selangor Malaysia. The prototype was developed using STELLA 9.1.2 software. The main data input are rainfall, temperature and denggue cases. Data analysis from the graph showed that denggue cases can be predicted accurately using these two main variables- rainfall and temperature. However, the model will be further tested over a longer time period to ensure its accuracy, reliability and efficiency as a prediction tool for dengue outbreak.

Keywords: dengue fever, prediction, system dynamic, simulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2336
401 Measuring the Relationship between Customers- Satisfaction and Cognitions: A Case of Janfusun Fancyworld in Taiwan

Authors: Wan-Yu Liu, Yen-Hsiang Liu, Shing-Yi Huang, Hao-Zhi Wen

Abstract:

The private theme parks are gradually surpassing public-owned scenic areas after many years of development and have become a mainstream choice for domestic tourists. Previous studies show that visitors from different backgrounds differ in consumer behavior and satisfaction factors. An understanding of visitor satisfaction is therefore of extreme importance to operators of privately-owned theme parks. Importance-Performance Analysis (IPA) is used to measure consumer's potential satisfaction with services and has become a widely used management tool for strength and weakness analysis for brands, products, services and point of sales. As IPA has so far not been used to evaluate the visitor satisfaction with privately-owned theme parks, in this study the IPA method is used to analyze visitor satisfaction with Janfusun Fancyworld (one of the most popular private theme parks in Taiwan) and to rank visitor focus and satisfaction on/in theme park facilities and services. Results of the analysis provide private theme park operators with an understanding of user or consumer demands as well as an assessment of the quality of services currently offered.

Keywords: Satisfaction, Importance-Performance Analysis, Theme Parks, Janfusun Fancyworld.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2448
400 A Study on Teachers’, Students’ and Their Parents’ Views on the FATIH Project

Authors: Şemsettin Şahin, Ahmet Oğuz Aktürk, İsmail Çelik

Abstract:

This study investigated the views of teachers, students and their parents on the FATIH (Movement of Enhancing Opportunities and Improving Technology) Project, which was put into service by the Ministry of National Education in cooperation with the Ministry of Transportation in Turkey in November 2010 for the purpose of increasing students’ success and planned to be completed within 5 years. The study group consisted of teachers employed in a pilot school in the province of Karaman in central Turkey included within the scope of the FATIH Project, students attending this school and parents whose children are students in that school. The research data were collected through forms developed by the researchers to determine the views of teachers, students and parents on the FATIH Project. The descriptive analysis method, one of the qualitative research methods, was used in the study. An analysis of the data revealed that a large majority of the teachers and the students believed that if computers were used to serve their set purpose, then they could make considerable contributions to education. A large majority of the parents, on the other hand, regard the use of computers in education as a great opportunity for the students. The views of the teachers, students and parents on the FATIH Project usually overlap. Most of the participants in the study pointed out that the FATIH Project was intended to use technology effectively in education. Moreover, each individual participant described their role in the FATIH Project in accordance with their relative position and stated that they could perform whatever was expected of them for the effective and efficient use and progress of the Project. The views of the participants regarding the FATIH Project vary according to the kind of the participants.

Keywords: Education, FATIH Project, technology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1595
399 Benefits and Issues of Open-Cut Coal Mining on the Socio-Economic Environment - The Iban Community in Mukah, Sarawak, Malaysia

Authors: Edward Lim

Abstract:

This paper deals principally with the socio-economic impact on the local Iban community in Mukah Division, Sarawak; with the commencement of the open-cut coal mining industry since 2003. To-date there are no actual studies being carried out by either the public or private sector to truly analyze how the Iban community is coping with the advent of a large influx of cash into their society. The Iban community has traditionally been practicing shifting cultivation and farming of domesticated animals; with a portion of the younger generation working as laborers and professional. This paper represents the views and observations of the author supported by some statistical facts extracted from published articles and non-published reports. The paper deals primarily in the following areas: • Background of the coal mining industry in Mukah Division, Sarawak; • Benefits of the coal mining industry towards the Iban community; • Issues / Problems arise in the Iban community because of the presence of the coal mining industry; and • Possible actions that need to be taken to overcome these issues/ problems.

Keywords: Coal Mining, Iban Community, Malaysia, Sub-Bituminous Coal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2442
398 The Impact of COVID-19 Pandemic on Acute Urology Admissions in a Busy District General Hospital in the UK

Authors: D. Bheenick, M. Young, M. Elmussareh, A. Ali

Abstract:

Coronavirus disease 2019 (COVID-19) has had unprecedented effects on the healthcare system in the UK. The pandemic has impacted every service within secondary care, including urology. Our objective is to determine how COVID-19 has influenced acute urology admissions in a busy district general hospital in the UK. To conduct the study, retrospective data of patients presenting acutely to the urology department were collected between January 13 to March 22, 2020 (pre-lockdown period) and March 23 to May 31, 2020 (lockdown period). The nature of referrals, types of admission encountered, and management required in accordance with the new set of protocols established during the lockdown period were analysed and compared to the same data prior to UK lockdown. Included in the study were 1092 patients. The results show that an overall reduction of 32.5% was seen in the total number of admissions. A marked decrease was seen in non-urological pathology as compared to other categories. Urolithiasis showed the highest proportional increase. Treatment varied proportionately to the diagnosis, with conservative management accounting for the most likely treatment during lockdown. However, the proportion of patients requiring interventions during the lockdown period increased overall. No comparative differences were observed during the two periods in terms of source of referral, length of stay and patient age. The results of the study concluded that the admission rate showed a decrease, with no significant difference in the nature and timing of presentation. Our department was able to continue providing effective management to patients presenting acutely during the COVID-19 outbreak.

Keywords: COVID-19, lockdown, admissions, urology

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 399
397 Harnessing the Potential of Renewable Energy Sources to Reduce Fossil Energy Consumption in the Wastewater Treatment Process

Authors: Hen Friman

Abstract:

Various categories of aqueous solutions are discharged within residential, institutional, commercial, and industrial structures. To safeguard public health and preserve the environment, it is imperative to subject wastewater to treatment processes that eliminate pathogens (such as bacteria and viruses), nutrients (such as nitrogen and phosphorus), and other compounds. Failure to address untreated sewage accumulation can result in an array of adverse consequences. Israel exemplifies a special case in wastewater management. Appropriate wastewater treatment significantly benefits sectors such as agriculture, tourism, horticulture, and industry. Nevertheless, untreated sewage in settlements lacking proper sewage collection or transportation networks remains an ongoing and substantial threat. Notably, the process of wastewater treatment entails substantial energy consumption. Consequently, this study explores the integration of solar energy as a renewable power source within the wastewater treatment framework. By incorporating renewable energy sources into the process, costs can be minimized, and decentralized facilities can be established even in areas lacking adequate infrastructure for traditional treatment methods.

Keywords: Renewable energy, solar energy, decentralized facilities, wastewater treatment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 134
396 The Effect of Religious Tourist Motivation and Satisfaction on Behavioral Intention

Authors: Tao Zhang, Nan Yan

Abstract:

In recent years, the Chaoshan area, a special place located in the southeast of Guangdong province in China, actively protects religious heritage and is developing religious tourism, which is attracting many expatriate Chinese who are coming back for travel and to worship. This paper discussed three questions. Firstly, what is the current situation about the different social background of tourists’ motivation, satisfaction and behavioral intention? Secondly, is there a relationship between the motivation, satisfaction and behavioral intention and the different social backgrounds of tourists? Thirdly, what is the relationship between religious tourists’ motivation, satisfaction and behavioral intention? The research methods use a combination of qualitative analysis and quantitative analysis. Qualitative analysis uses the method of observation and interviews. Convenient sampling technique was used for quantitative analysis. The study showed that the different social backgrounds of tourists’ forms diverse cognition and experiences about religious tourism, and their motivations, satisfaction and behavioral intention as tourists vary. Tourists’ motivation and satisfaction has a positive phase relation. Tourists’ motivation with satisfaction as the intervening variable also has a positive phase effect on tourists’ behavior intention. The result shows that religious tourists’ motivations include experiencing a religious atmosphere, and having a rest and recreation. The result also shows that religious tourists want to travel with their family members and friends. While traveling, religious tourists like to talk with Buddhist monks or nuns. Compared to other tourism types, religious tourists have higher expectations about temple environment, traveling experience, peripheral service and temple management.

Keywords: Behavioral intension, motivation, religious tourism, satisfaction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2026
395 A Structural Support Vector Machine Approach for Biometric Recognition

Authors: Vishal Awasthi, Atul Kumar Agnihotri

Abstract:

Face is a non-intrusive strong biometrics for identification of original and dummy facial by different artificial means. Face recognition is extremely important in the contexts of computer vision, psychology, surveillance, pattern recognition, neural network, content based video processing. The availability of a widespread face database is crucial to test the performance of these face recognition algorithms. The openly available face databases include face images with a wide range of poses, illumination, gestures and face occlusions but there is no dummy face database accessible in public domain. This paper presents a face detection algorithm based on the image segmentation in terms of distance from a fixed point and template matching methods. This proposed work is having the most appropriate number of nodal points resulting in most appropriate outcomes in terms of face recognition and detection. The time taken to identify and extract distinctive facial features is improved in the range of 90 to 110 sec. with the increment of efficiency by 3%.

Keywords: Face recognition, Principal Component Analysis, PCA, Linear Discriminant Analysis, LDA, Improved Support Vector Machine, iSVM, elastic bunch mapping technique.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 493
394 A Simple Epidemiological Model for Typhoid with Saturated Incidence Rate and Treatment Effect

Authors: Steady Mushayabasa

Abstract:

Typhoid fever is a communicable disease, found only in man and occurs due to systemic infection mainly by Salmonella typhi organism. The disease is endemic in many developing countries and remains a substantial public health problem despite recent progress in water and sanitation coverage. Globally, it is estimated that typhoid causes over 16 million cases of illness each year, resulting in over 600,000 deaths. A mathematical model for assessing the impact of educational campaigns on controlling the transmission dynamics of typhoid in the community, has been formulated and analyzed. The reproductive number has been computed. Stability of the model steady-states has been examined. The impact of educational campaigns on controlling the transmission dynamics of typhoid has been discussed through the basic reproductive number and numerical simulations. At its best the study suggests that targeted education campaigns, which are effective at stopping transmission of typhoid more than 40% of the time, will be highly effective at controlling the disease in the community. 

Keywords: Mathematical model, Typhoid, saturated incidence rate, treatment, reproductive number, sensitivity analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3516
393 Disidentification of Historical City Centers: A Comparative Study of the Old and New Settlements of Mardin, Turkey

Authors: Fatma Kürüm Varolgüneş, Fatih Canan

Abstract:

Mardin is one of the unique cities in Turkey with its rich cultural and historical heritage. Mardin’s traditional dwellings have been affected both by natural data such as climate and topography and by cultural data like lifestyle and belief. However, in the new settlements, housing is formed with modern approaches and unsuitable forms clashing with Mardin’s culture and environment. While the city is expanding, traditional textures are ignored. Thus, traditional settlements are losing their identity and are vanishing because of the rapid change and transformation. The main aim of this paper is to determine the physical and social data needed to define the characteristic features of Mardin’s old and new settlements. In this context, based on social and cultural data, old and new settlement formations of Mardin have been investigated from various aspects. During this research, the following methods have been utilized: observations, interviews, public surveys, literature review, as well as site examination via maps, photographs and questionnaire methodology. In conclusion, this paper focuses on how changes in the physical forms of cities affect the typology and the identity of cities, as in the case of Mardin.

Keywords: Urban and local identity, historical city center, traditional settlements, Mardin, Turkey.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1042
392 Distributed Cost-Based Scheduling in Cloud Computing Environment

Authors: Rupali, Anil Kumar Jaiswal

Abstract:

Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc.  Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively.  Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.

Keywords: Physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 850