Search results for: artistic activities.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1397

Search results for: artistic activities.

977 A Comparative Analysis of Activity-Based Costing and Traditional Costing

Authors: Derya Eren Akyol, Gonca Tuncel, G. Mirac Bayhan

Abstract:

Activity-Based Costing (ABC) which has become an important aspect of manufacturing/service organizations can be defined as a methodology that measures the cost and performance of activities, resources and cost objects. It can be considered as an alternative paradigm to traditional cost-based accounting systems. The objective of this paper is to illustrate an application of ABC method and to compare the results of ABC with traditional costing methods. The results of the application highlight the weak points of traditional costing methods and an S-Curve obtained is used to identify the undercosted and overcosted products of the firm.

Keywords: Activity-based costing, cost drivers, overheads, traditional costing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12541
976 XML based Safe and Scalable Multi-Agent Development Framework

Authors: Rinkaj Goyal, Pravin Chandra, Yogesh Singh

Abstract:

In this paper we describe our efforts to design and implement an agent development framework that has the potential to scale to the size of any underlying network suitable for various ECommerce activities. The main novelty in our framework is it-s capability to allow the development of sophisticated, secured agents which are simple enough to be practical. We have adopted FIPA agent platform reference Model as backbone for implementation along with XML for agent Communication and Java Cryptographic Extension and architecture to realize the security of communication information between agents. The advantage of our architecture is its support of agents development in different languages and Communicating with each other using a more open standard i.e. XML

Keywords: Agent, Agent Development Framework, Agent Coordination, Security

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582
975 Corruption and International Business Community Is Integration into International Business ameans of Reducing Corruption?The case of Russia

Authors: Anouch Mkhitarian

Abstract:

The article examines an opportunity of corruption restriction exercised by international business community in Russia. Integration of Russian economy into the international business does not reduce corruption inside the country. Foreign actors investing in Russia under the condition of obtaining their required rates of returns will be reluctant to harm their investments by involving into anticorruption activities. Furthermore, many Russian firms- competitive advantage could be directly related to their corruption connections. In this case, foreign investments would only accentuate corrupt companies- success by supporting them financially

Keywords: Corrution, FDI, Russian Federation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564
974 Simulation Programs to Education of Crisis Management Members

Authors: Jiri Barta

Abstract:

This paper deals with a simulation programs and technologies using in the educational process for members of the crisis management. Risk analysis, simulation, preparation and planning are among the main activities of workers of crisis management. Made correctly simulation of emergency defines the extent of the danger. On this basis, it is possible to effectively prepare and plan measures to minimize damage. The paper is focused on simulation programs that are trained at the University of Defence. Implementation of the outputs from simulation programs in decision-making processes of crisis staffs is one of the main tasks of the research project.

Keywords: Crisis Management, Continuity, Critical Infrastructure, Dangerous substance, Education, Flood, Simulation Programs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1697
973 The Impact Behavior of the Predecessor and Successor on the Transmission of Family Businesses in Tunisia

Authors: B. Kettana

Abstract:

Nowadays, financial and economic crises are growing more and reach more countries and sectors. These events have, as a result, a considerable impact on the activities of the firms which think unstable and in danger. But besides this heavy uncertainty which weighs on the different firms, the family firm, object of our research, is not only confronted with these external difficulties but also with an internal challenge and of size: that of transmission. Indeed, the transmission of an organization from one generation to another can succeed as it can fail; leaving considerable damage. Our research registers as part of these problems since we tried to understand relation between the behavior of two main actors of the process of succession, predecessor and successor; and the success of transmission.

Keywords: Family business, transmission, success, predecessor, successor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1475
972 Students- uses of Wiki in Teacher Education: A Statistical Analysis

Authors: Said Hadjerrouit

Abstract:

Wikis are considered to be part of Web 2.0 technologies that potentially support collaborative learning and writing. Wikis provide opportunities for multiple users to work on the same document simultaneously. Most wikis have also a page for written group discussion. Nevertheless, wikis may be used in different ways depending on the pedagogy being used, and the constraints imposed by the course design. This work explores students- uses of wiki in teacher education. The analysis is based on a taxonomy for classifying students- activities and actions carried out on the wiki. The article also discusses the implications for using wikis as collaborative writing tools in teacher education.

Keywords: Behaviorism, collaborative writing, socioconstructivism, taxonomy, web 2.0 technology, wiki

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1878
971 Transformation of Course Timetablinng Problem to RCPSP

Authors: M. Ahmad, M. Gourgand, C. Caux

Abstract:

The Resource-Constrained Project Scheduling Problem (RCPSP) is concerned with single-item or small batch production where limited resources have to be allocated to dependent activities over time. Over the past few decades, a lot of work has been made with the use of optimal solution procedures for this basic problem type and its extensions. Brucker and Knust[1] discuss, how timetabling problems can be modeled as a RCPSP. Authors discuss high school timetabling and university course timetabling problem as an example. We have formulated two mathematical formulations of course timetabling problem in a new way which are the prototype of single-mode RCPSP. Our focus is to show, how course timetabling problem can be transformed into RCPSP. We solve this transformation model with genetic algorithm.

Keywords: Course Timetabling, Integer programming, Combinatorial optimizations

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1983
970 Statistical Description in the Turbulent Near Wake of a Rotating Circular Cylinder

Authors: Sharul S. Dol, U. Azimov, Robert J. Martinuzzi

Abstract:

Turbulence studies were made in the wake of a rotating circular cylinder in a uniform free stream. The interest was to examine the turbulence properties at the suppression of periodicity in vortex formation process. An experimental study of the turbulent near wake of a rotating circular cylinder was made at a Reynolds number of 9000 for velocity ratios, λ between 0 and 2.7. Hot-wire anemometry and particle image velocimetry results indicate that the rotation of the cylinder causes significant changes in the vortical activities. The turbulence quantities are getting smaller as λ increases due to suppression of coherent vortex structures.

Keywords: Rotating circular cylinder, Reynolds stress, vortex.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1642
969 Web portal As A Knowledge Management System In The Universities

Authors: Marjan Mansourvar, Norizan Mohd Yasin

Abstract:

The development of Web has affected different aspects of our lives, such as communication, sharing knowledge, searching for jobs, social activities, etc. The web portal as a gateway in the World Wide Web is a starting point for people who are connecting to the Internet. The web portal as the type of knowledge management system provides a rich space to share and search information as well as communication services like free email or content provision for the users. This research aims to discover the university needs to the web portal as a necessary tool for students in the universities to help them in getting the required information. A survey was conducted to gather students' requirements which can be incorporated in to portal to be developed.

Keywords: Knowledge, Knowledge management system, Knowledge sharing, web portal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1835
968 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: Network, network security, gray code, physical layer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2126
967 Comparative Analysis of Chemical Composition and Biological Activities of Ajuga genevensis L. in in vitro Culture and Intact Plants

Authors: Naira Sahakyan, Margarit Petrosyan, Armen Trchounian

Abstract:

One of the tasks in contemporary biotechnology, pharmacology and other fields of human activities is to obtain biologically active substances from plants. They are very essential in the treatment of many diseases due to their actually high therapeutic value without visible side effects. However, sometimes the possibility of obtaining the metabolites is limited due to the reduction of wild-growing plants. That is why the plant cell cultures are of great interest as alternative sources of biologically active substances. Besides, during the monitored cultivation, it is possible to obtain substances that are not synthesized by plants in nature. Isolated culture of Ajuga genevensis with high growth activity and ability of regeneration was obtained using MS nutrient medium. The agar-diffusion method showed that aqueous extracts of callus culture revealed high antimicrobial activity towards various gram-positive (Bacillus subtilis A1WT; B. mesentericus WDCM 1873; Staphylococcus aureus WDCM 5233; Staph. citreus WT) and gram-negative (Escherichia coli WKPM M-17; Salmonella typhimurium TA 100) microorganisms. The broth dilution method revealed that the minimal and half maximal inhibitory concentration values against E. coli corresponded to the 70 μg/mL and 140 μg/mL concentration of the extract respectively. According to the photochemiluminescent analysis, callus tissue extracts of leaf and root origin showed higher antioxidant activity than the same quantity of A. genevensis intact plant extract. A. genevensis intact plant and callus culture extracts showed no cytotoxic effect on K-562 suspension cell line of human chronic myeloid leukemia. The GC-MS analysis showed deep differences between the qualitative and quantitative composition of callus culture and intact plant extracts. Hexacosane (11.17%); n-hexadecanoic acid (9.33%); and 2-methoxy-4-vinylphenol (4.28%) were the main components of intact plant extracts. 10-Methylnonadecane (57.0%); methoxyacetic acid, 2-tetradecyl ester (17.75%) and 1-Bromopentadecane (14.55%) were the main components of A. genevensis callus culture extracts. Obtained data indicate that callus culture of A. genevensis can be used as an alternative source of biologically active substances.

Keywords: Ajuga genevensis, antibacterial activity, antioxidant activity, callus cultures.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1515
966 Automatic Intelligent Analysis of Malware Behaviour

Authors: H. Dornhackl, K. Kadletz, R. Luh, P. Tavolato

Abstract:

In this paper, we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: Malware behaviour, modelling, parsing, search, pattern matching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1434
965 Gamification as a Tool for Influencing Customers' Behaviour

Authors: B. Zatwarnicka-Madura

Abstract:

The objective of the article was to identify the impacts of gamification on customers' behaviour. The most important applications of games in marketing and mechanisms of gamification are presented in the article. A detailed analysis of the influence of gamification on customers using two brands, Foursquare and Nike, was also presented. Research studies using auditory survey methods were carried out among 176 young respondents, who are potential targets of gamification. The studies confirmed a huge participation of young people in customer loyalty programs with relatively low participation in other gamificationbased marketing activities. The research findings clearly indicate that gamification mechanisms are the most attractive.

Keywords: Customer loyalty, games, gamification, social aspects.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2360
964 A Study and Implementation of On-line Learning Diagnosis and Inquiry System

Authors: YuLung Wu

Abstract:

In Knowledge Structure Graph, each course unit represents a phase of learning activities. Both learning portfolios and Knowledge Structure Graphs contain learning information of students and let teachers know which content are difficulties and fails. The study purposes "Dual Mode On-line Learning Diagnosis System" that integrates two search methods: learning portfolio and knowledge structure. Teachers can operate the proposed system and obtain the information of specific students without any computer science background. The teachers can find out failed students in advance and provide remedial learning resources.

Keywords: Knowledge Structure Graph, On-line LearningDiagnosis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1417
963 Managing Legal, Consumers and Commerce Risks in Phishing

Authors: Dinna N. M. N., Leau Y. B., Habeeb S. A. H., Yanti A. S.

Abstract:

Phishing scheme is a new emerged security issue of E-Commerce Crime in globalization. In this paper, the legal scaffold of Malaysia, United States and United Kingdom are analyzed and followed by discussion on critical issues that rose due to phishing activities. The result revealed that inadequacy of current legal framework is the main challenge to govern this epidemic. However, lack of awareness among consumers, crisis on merchant-s responsibility and lack of intrusion reports and incentive arrangement contributes to phishing proliferating. Prevention is always better than curb. By the end of this paper, some best practices for consumers and corporations are suggested.

Keywords: Phishing, Online Fraud, Business risks, Consumers privacy, Legal Issue, Cyber law.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2211
962 Web Information System for e-Learning

Authors: Anna Angelini, Enrica Gentile, Paola Plantamura, Vito Leonardo Plantamura

Abstract:

A suitable e-learning system management needs to carry out a web-information system in order to allow integrated fruition of data and metadata concerning the activities typical of elearning environment. The definition of a “web information system" for e-learning takes advantage of the potentialities of Web technologies both as for the access to metadata present on the several platforms, and as for the implementation of courseware which make up the relative didactic environment. What information systems have in common is the technological environment on which they are generally implemented and the use of metadata in order to structure information at all cognitive and organization levels. In this work we are going to define a methodology for the implementation of a specific web information system for an e-learning environment.

Keywords: e-learning, information systems, coursemanagement, web-based system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1543
961 Institutional Aspects of Information Security in Russian Economy

Authors: Mingaleva Zhanna, Kapuskina Tatiana

Abstract:

The article touches upon questions of information security in Russian Economy. It covers theoretical bases of information security and causes of its development. The theory is proved by the analysis of business activities and the main tendencies of information security development. Perm region has been chosen as the bases for the analysis, being the fastestdeveloping region that uses methods of information security in managing it economy. As a result of the study the authors of the given article have formulated their own vision of the problem of information security in various branches of economy and stated prospects of information security development and its growing role in Russian economy

Keywords: security of business, management of information security, institutional analyses.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1284
960 Wave Atom Transform Based Two Class Motor Imagery Classification

Authors: Nebi Gedik

Abstract:

Electroencephalography (EEG) investigations of the brain computer interfaces are based on the electrical signals resulting from neural activities in the brain. In this paper, it is offered a method for classifying motor imagery EEG signals. The suggested method classifies EEG signals into two classes using the wave atom transform, and the transform coefficients are assessed, creating the feature set. Classification is done with SVM and k-NN algorithms with and without feature selection. For feature selection t-test approaches are utilized. A test of the approach is performed on the BCI competition III dataset IIIa.

Keywords: motor imagery, EEG, wave atom transform, SVM, k-NN, t-test

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 430
959 The Use of TV and the Internet in the Social Context

Authors: Khulood Miliany

Abstract:

This study examines the media habits of young people in Saudi Arabia, in particular their use of the Internet and television in the domestic sphere, and how use of the Internet impacts upon other activities. In order to address the research questions, focus group interviews were conducted with Saudi university students. The study found that television has become a central part of social life within the household where television represents a main source for family time, particularly in Ramadan while the Internet is a solitary activity where it is used in more private spaces. Furthermore, Saudi females were also more likely to have their Internet access monitored and circumscribed by family members, with parents controlling the location and the amount of time spent using the Internet.

Keywords: Domestication of Technology. Internet, Social context, Television, Young people.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2189
958 Retrofitting Measures for Existing Housing Stock in Kazakhstan

Authors: S. Yessengabulov, A. Uyzbayeva

Abstract:

Residential buildings fund of Kazakhstan was built in the Soviet time about 35-60 years ago without considering energy efficiency measures. Currently, most of these buildings are in a rundown condition and fail to meet the minimum of hygienic, sanitary and comfortable living requirements. The paper aims to examine the reports of recent building energy survey activities in the country and provide a possible solution for retrofitting existing housing stock built before 1989 which could be applicable for building envelope in cold climate. Methodology also includes two-dimensional modeling of possible practical solutions and further recommendations.

Keywords: Energy audit, energy efficient buildings in Kazakhstan, retrofit, two-dimensional conduction heat transfer analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1516
957 Anthropometric Profile and Its Influence on the Vital Signs of Baja California College Students

Authors: J. A. Lopez, J. E. Olguín, C. Camargo, G. A. Quijano, R. Martínez

Abstract:

An anthropometric study applied to 1,115 students of the Faculty of Chemical Sciences and Engineering of the Autonomous University of California. Thirteen individual measurements were taken in a sitting position. The results obtained allow forming a reliable anthropometric database for statistical studies and analysis and inferences of specific distributions, so the opinion of experts in occupational medicine recommendations may emit to reduce risks resulting in an alteration of the vital signs during the execution of their school activities. Another use of these analyses is to use them as a reliable reference for future deeper research, to the design of spaces, tools, utensils, workstations, with anthropometric dimensions and ergonomic characteristics suitable to use.

Keywords: Anthropometry, vital signs, students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2525
956 Estimation of Methane from Hydrocarbon Exploration and Production in India

Authors: A. K. Pathak, K. Ojha

Abstract:

Methane is the second most important greenhouse gas (GHG) after carbon dioxide. Amount of methane emission from energy sector is increasing day by day with various activities. In present work, various sources of methane emission from upstream, middle stream and downstream of oil & gas sectors are identified and categorised as per IPCC-2006 guidelines. Data were collected from various oil & gas sector like (i) exploration & production of oil & gas (ii) supply through pipelines (iii) refinery throughput & production (iv) storage & transportation (v) usage. Methane emission factors for various categories were determined applying Tier-II and Tier-I approach using the collected data. Total methane emission from Indian Oil & Gas sectors was thus estimated for the year 1990 to 2007.

Keywords: Carbon credit, Climate change, Methane emission, Oil & Gas production

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2104
955 TOPSIS Method for Supplier Selection Problem

Authors: Omid Jadidi, Fatemeh Firouzi, Enzo Bagliery

Abstract:

Supplier selection, in real situation, is affected by several qualitative and quantitative factors and is one of the most important activities of purchasing department. Since at the time of evaluating suppliers against the criteria or factors, decision makers (DMS) do not have precise, exact and complete information, supplier selection becomes more difficult. In this case, Grey theory helps us to deal with this problem of uncertainty. Here, we apply Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method to evaluate and select the best supplier by using interval fuzzy numbers. Through this article, we compare TOPSIS with some other approaches and afterward demonstrate that the concept of TOPSIS is very important for ranking and selecting right supplier.

Keywords: TOPSIS, fuzzy number, MADM, Supplier selection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12949
954 Teaching Students Collaborative Requirements Engineering: Case Study of Red:Wire

Authors: Dagmar Monett, Sven-Erik Kujat, Marvin Hartmann

Abstract:

This paper discusses the use of a template-based approach for documenting high-quality requirements as part of course projects in an undergraduate Software Engineering course. In order to ease some of the Requirements Engineering activities that are performed when defining requirements by using the template, a new CASE tool, RED:WIRE, was first developed and later tested by students attending the course. Two questionnaires were conceived around a study that aims to analyze the new tool’s learnability as well as other obtained results concerning its usability in particular and the Requirements Engineering skills developed by the students in general.

Keywords: CASE tool, collaborative learning, requirements engineering, undergraduate teaching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1307
953 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we have proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach to reduce the probability of network attacks.

Keywords: Network security, Intrusion detection, Honeypot, Snort, Nmap.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2489
952 Modeling UWSN Simulators – A Taxonomy

Authors: Christhu Raj, Rajeev Sukumaran

Abstract:

In this research article of modeling Underwater Wireless Sensor Network Simulators, we provide a comprehensive overview of the various currently available simulators used in UWSN modeling. In this work, we compare their working environment, software platform, simulation language, key features, limitations and corresponding applications. Based on extensive experimentation and performance analysis, we provide their efficiency for specific applications. We have also provided guidelines for developing protocols in different layers of the protocol stack, and finally these parameters are also compared and tabulated. This analysis is significant for researchers and designers to find the right simulator for their research activities.

Keywords: Underwater Wireless Sensor networks (UWSN), SUNSET, NS2, OPNET, WOSS, DESERT, RECORDS, Aqua- Sim, Aqua- Net Mate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3077
951 Criteria of Selecting 3pl Provider: A Literature Review

Authors: Rajesh Gupta, Anish Sachdeva, Arvind Bhardwaj

Abstract:

Shippers are concentrating on the core competency to stay competitive and outsourcing the logistic activities to the third party who is expert in this field. This third party logistics (3PL) is drawing the due attention at government, industrial, academicians and practitioner-s levels. If the logistics cost in India can be brought down from the current level of 13% of GDP to 9% (level in the U.S.), the savings would be around Rs 3 lakh crore approximately per annum. But the problem with the shippers is to select the suitable 3PL provider. Various criteria for selection of 3PL have been listed in the literature which are discussed in the present literature review. Every shipper will select the criteria suitable to its own requirement which have to be dynamically reviewed time to time so as to fit in the ever changing environment.

Keywords: 3PL, criteria, shipper, outsourcing

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5022
950 Performance Assessment and Optimization of the After-Sale Networks

Authors: H. Izadbakhsh, M.Hour Ali, A. Amirkhani, A. Montazeri, M. Saberi

Abstract:

The after–sales activities are nowadays acknowledged as a relevant source of revenue, profit and competitive advantage in most manufacturing industries. Top and middle management, therefore, should focus on the definition of a structured business performance measurement system for the after-sales business. The paper aims at filling this gap, and presents an integrated methodology for the after-sales network performance measurement, and provides an empirical application to automotive case companies and their official service network. This is the first study that presents an integrated multivariate approach for total assessment and improvement of after-sale services.

Keywords: Data Envelopment Analysis (DEA), Principal Component Analysis (PCA), Automotive companies, After-sale services.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1856
949 Distributed Load Flow Analysis using Graph Theory

Authors: D. P. Sharma, A. Chaturvedi, G.Purohit , R.Shivarudraswamy

Abstract:

In today scenario, to meet enhanced demand imposed by domestic, commercial and industrial consumers, various operational & control activities of Radial Distribution Network (RDN) requires a focused attention. Irrespective of sub-domains research aspects of RDN like network reconfiguration, reactive power compensation and economic load scheduling etc, network performance parameters are usually estimated by an iterative process and is commonly known as load (power) flow algorithm. In this paper, a simple mechanism is presented to implement the load flow analysis (LFA) algorithm. The reported algorithm utilizes graph theory principles and is tested on a 69- bus RDN.

Keywords: Radial Distribution network, Graph, Load-flow, Array.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3098
948 The Marketing Mix in Small Sized Hotels: A Case of Pattaya, Thailand

Authors: Anyapak Prapannetivuth

Abstract:

The purpose of this research is to investigate the marketing mix that is perceived to be important for the small sized hotels in Pattaya. This research provides insights through a review of the marketing activities performed by the small sized hotels. Nine owners & marketing manager of small sized hotels and resorts, all local Chonburi people, were selected for an in-depth interview. The research suggests that seven marketing mixes (e.g. Product, Price, Place, Promotion, People, Physical Evidence and Process) were commonly used by these hotels, however, three types – People, Price and Physical Evidence were considered most important by the owners.

Keywords: Marketing Mix, Marketing Tools, and Small Sized Hotels.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3435