CINXE.COM

Search results for: client

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: client</title> <meta name="description" content="Search results for: client"> <meta name="keywords" content="client"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="client" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="client"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 369</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: client</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">369</span> Practice of Mutual Squiggle Story Making as a Variant of Squiggle Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Toshiki%20Ito">Toshiki Ito</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mutual squiggle story making (MSSM ) is the development of Winnicott’s squiggle method in Japan. In the MSSM Method, a therapist has the client freely divide a piece of drawing paper into six spaces, and both the therapist and client do squiggle in each space. All six pictures finished, the therapist then asks the client to create a story using all the pictures. Making a story has the effect of reintegrating what is projected by consciousness. In this paper, the author presented a case with a junior high school girl using MSSM. And it is considered that the advantage of this technique is that (1) it enables non-verbal communication with children and adults who cannot express their feelings verbally. (2) Through this communication, the psychological content of the client and the characteristics of the client's mind can be understood, and (3) It can be said that mutual rapport is deepened by the supportive reaction of the therapist. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MSSM" title="MSSM">MSSM</a>, <a href="https://publications.waset.org/abstracts/search?q=squiggle" title=" squiggle"> squiggle</a>, <a href="https://publications.waset.org/abstracts/search?q=Winnicott" title=" Winnicott"> Winnicott</a>, <a href="https://publications.waset.org/abstracts/search?q=drawing%20method" title=" drawing method"> drawing method</a> </p> <a href="https://publications.waset.org/abstracts/132769/practice-of-mutual-squiggle-story-making-as-a-variant-of-squiggle-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132769.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">199</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">368</span> Effect of Pre-Construction on Construction Schedule and Client Loyalty</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jong%20Hoon%20Kim">Jong Hoon Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun-Soo%20Lee"> Hyun-Soo Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Moonseo%20Park"> Moonseo Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Min%20Jeong"> Min Jeong</a>, <a href="https://publications.waset.org/abstracts/search?q=Inbeom%20Lee"> Inbeom Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Pre-construction is essential in achieving the success of a construction project. Due to the early involvement of project participants in the construction phase, project managers are able to plan ahead and solve issues well in advance leading to the success of the project and the satisfaction of the client. This research utilizes quantitative data derived from construction management projects in order to identify the relationship between pre-construction, construction schedule, and client satisfaction. A total of 65 construction projects and 93 clients were investigated for this research in an attempt to identify (a) the relationship between pre-construction and schedule reduction, and (b) pre-construction and client loyalty. Based on the quantitative analysis, this research was able to establish a negative correlation based on 65 construction projects between pre-construction and project schedule existed. This finding represents that the more pre-construction is performed for a certain project, the overall construction schedule decreased. Then, to determine the relationship between pre-construction and client satisfaction, Net Promoter Score (NPS) of 93 clients from the 65 projects was utilized. Pre-construction and NPS was further analyzed and a positive correlation was found between the two. This infers that clients tend to be more satisfied with projects with higher ratio of pre-construction than those projects with less pre-construction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=client%20loyalty" title="client loyalty">client loyalty</a>, <a href="https://publications.waset.org/abstracts/search?q=NPS" title=" NPS"> NPS</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-construction" title=" pre-construction"> pre-construction</a>, <a href="https://publications.waset.org/abstracts/search?q=schedule%20reduction" title=" schedule reduction"> schedule reduction</a> </p> <a href="https://publications.waset.org/abstracts/48581/effect-of-pre-construction-on-construction-schedule-and-client-loyalty" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48581.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">360</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">367</span> A Principal-Agent Model for Sharing Mechanism in Integrated Project Delivery Context</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shan%20Li">Shan Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Qiuwen%20Ma"> Qiuwen Ma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Integrated project delivery (IPD) is a project delivery method distinguished by a shared risk/rewards mechanism and multiparty agreement. IPD has drawn increasingly attention from construction industry because of its efficiency of solving adversarial problems and reliability to deliver high-performing buildings. However, some evidence showed that some project participants obtained less profit from IPD projects than the typical projects. They attributed it to the unfair IPD sharing mechanism, which resulted in additional time and cost of negotiation on the sharing fractions among project participants. The study is aimed to investigate the reward distribution by constructing a principal-agent model. Based on cooperative game theory, it is examined how to distribute the shared project rewards between client and non-client parties, and identify the sharing fractions among non-client parties. It is found that at least half of the project savings should be allocated to the non-client parties to motivate them to create more project value. Second, the client should raise his sharing fractions when the integration among project participants is efficient. In addition, the client should allocate higher sharing fractions to the non-client party who is more able. This study can help the IPD project participants make fair and motivated sharing mechanisms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cooperative%20game%20theory" title="cooperative game theory">cooperative game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=IPD" title=" IPD"> IPD</a>, <a href="https://publications.waset.org/abstracts/search?q=principal%20agent%20model" title=" principal agent model"> principal agent model</a>, <a href="https://publications.waset.org/abstracts/search?q=sharing%20mechanism" title=" sharing mechanism"> sharing mechanism</a> </p> <a href="https://publications.waset.org/abstracts/92285/a-principal-agent-model-for-sharing-mechanism-in-integrated-project-delivery-context" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92285.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">366</span> Rewriting, Reframing, and Restructuring the Story: A Narrative and Solution Focused Therapy Approach to Family Therapy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eman%20Tadros">Eman Tadros</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Solution Focused Therapy sheds a positive light on a client’s problem(s) by instilling hope, focusing on the connection with the client, and describing the problem in a way to display change being possible. Solution focused therapists highlight clients’ positive strengths, reframe what clients say, do, or believe in a positive statement, action, or belief. Narrative Therapy focuses on the stories individuals tell about their past in which shape their current and future lives. Changing the language used aids clients in reevaluating their values and views of themselves, this then constructs a more positive way of thinking about their story. Both therapies are based on treating each client as an individual with a problem rather than that the individual is a problem and being able to give power back to the client. The purpose of these ideologies is to open a client to alternative understandings. This paper displays how clinicians can empower and identify their clients’ positive strengths and resiliency factors. Narrative and Solution-Focused Techniques will be integrated to instill positivity and empowerment in clients. Techniques such as deconstruction, collaboration, complimenting, miracle/exception/scaling questioning will be analyzed and modeled. Furthermore, bridging Solution Focused Therapy and Narrative Therapy gives a voice to unheard client(s). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=solution%20focused%20therapy" title="solution focused therapy">solution focused therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=narrative%20therapy" title=" narrative therapy"> narrative therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=empowerment" title=" empowerment"> empowerment</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a> </p> <a href="https://publications.waset.org/abstracts/91864/rewriting-reframing-and-restructuring-the-story-a-narrative-and-solution-focused-therapy-approach-to-family-therapy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91864.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">365</span> Ranking the Factors That Influence the Construction Project Success: The Jordanian Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghanim%20A.%20Bekr">Ghanim A. Bekr</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Project success is what must be done for the project to be acceptable to the client, stakeholders and end-users who will be affected by the project. The study of project success and the critical success factors (CSFs) are the means adopted to improve the effectiveness of project. This research is conducted to make an attempt to identify which variables influence the success of project implementation. This study has selected, through an extensive literature review and interviews, (83) factors categorized in (7) groups that the questionnaire respondents were asked to score. The responses from 66 professionals with an average of 15 years of experience in different types of construction projects in Jordan were collected and analyzed using SPSS and most important factors for success for various success criteria are presented depending on the relative importance index to rank the categories. The research revealed the significant groups of factors are: Client related factors, Contractor’s related factors, Project Manager (PM) related factors, and Project management related factors. In addition the top ten sub factors are: Assertion of the client towards short time of the project, availability of skilled labor, Assertion of the client towards high level of the quality, capability of the client in taking risk, previous experience of the PM in similar projects, previous experience of the contractor in similar projects, decision making by the client/ the client’s representative at the right time, assertion of client towards low cost of project, experience in project management in previous projects, and flow of the information among parties. The results would be helpful to construction project professionals in taking proactive measures for successful completion of construction projects in Jordan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20projects" title="construction projects">construction projects</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20success%20factors" title=" critical success factors"> critical success factors</a>, <a href="https://publications.waset.org/abstracts/search?q=Jordan" title=" Jordan"> Jordan</a>, <a href="https://publications.waset.org/abstracts/search?q=project%20success" title=" project success"> project success</a> </p> <a href="https://publications.waset.org/abstracts/88902/ranking-the-factors-that-influence-the-construction-project-success-the-jordanian-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88902.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">364</span> Design and Implementation of Partial Denoising Boundary Image Matching Using Indexing Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bum-Soo%20Kim">Bum-Soo Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jin-Uk%20Kim"> Jin-Uk Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we design and implement a partial denoising boundary image matching system using indexing techniques. Converting boundary images to time-series makes it feasible to perform fast search using indexes even on a very large image database. Thus, using this converting method we develop a client-server system based on the previous partial denoising research in the GUI (graphical user interface) environment. The client first converts a query image given by a user to a time-series and sends denoising parameters and the tolerance with this time-series to the server. The server identifies similar images from the index by evaluating a range query, which is constructed using inputs given from the client, and sends the resulting images to the client. Experimental results show that our system provides much intuitive and accurate matching result. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=boundary%20image%20matching" title="boundary image matching">boundary image matching</a>, <a href="https://publications.waset.org/abstracts/search?q=indexing" title=" indexing"> indexing</a>, <a href="https://publications.waset.org/abstracts/search?q=partial%20denoising" title=" partial denoising"> partial denoising</a>, <a href="https://publications.waset.org/abstracts/search?q=time-series%20matching" title=" time-series matching"> time-series matching</a> </p> <a href="https://publications.waset.org/abstracts/97170/design-and-implementation-of-partial-denoising-boundary-image-matching-using-indexing-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97170.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">363</span> Internet Optimization by Negotiating Traffic Times </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez">Carlos Gonzalez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client&rsquo;s computer. The client using the application software will communicate to the video provider a list of the client&rsquo;s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user&rsquo;s hard disk, which will only be accessed by the application software in the client&rsquo;s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20optimization" title="internet optimization">internet optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20download" title=" video download"> video download</a>, <a href="https://publications.waset.org/abstracts/search?q=future%20demands" title=" future demands"> future demands</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20storage" title=" secure storage"> secure storage</a> </p> <a href="https://publications.waset.org/abstracts/107006/internet-optimization-by-negotiating-traffic-times" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107006.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">362</span> Enhanced Planar Pattern Tracking for an Outdoor Augmented Reality System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20Yu">L. Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20K.%20Li"> W. K. Li</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20K.%20Ong"> S. K. Ong</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Y.%20C.%20Nee"> A. Y. C. Nee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a scalable augmented reality framework for handheld devices is presented. The presented framework is enabled by using a server-client data communication structure, in which the search for tracking targets among a database of images is performed on the server-side while pixel-wise 3D tracking is performed on the client-side, which, in this case, is a handheld mobile device. Image search on the server-side adopts a residual-enhanced image descriptors representation that gives the framework a scalability property. The tracking algorithm on the client-side is based on a gravity-aligned feature descriptor which takes the advantage of a sensor-equipped mobile device and an optimized intensity-based image alignment approach that ensures the accuracy of 3D tracking. Automatic content streaming is achieved by using a key-frame selection algorithm, client working phase monitoring and standardized rules for content communication between the server and client. The recognition accuracy test performed on a standard dataset shows that the method adopted in the presented framework outperforms the Bag-of-Words (BoW) method that has been used in some of the previous systems. Experimental test conducted on a set of video sequences indicated the real-time performance of the tracking system with a frame rate at 15-30 frames per second. The presented framework is exposed to be functional in practical situations with a demonstration application on a campus walk-around. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=augmented%20reality%20framework" title="augmented reality framework">augmented reality framework</a>, <a href="https://publications.waset.org/abstracts/search?q=server-client%20model" title=" server-client model"> server-client model</a>, <a href="https://publications.waset.org/abstracts/search?q=vision-based%20tracking" title=" vision-based tracking"> vision-based tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20search" title=" image search"> image search</a> </p> <a href="https://publications.waset.org/abstracts/53214/enhanced-planar-pattern-tracking-for-an-outdoor-augmented-reality-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">275</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">361</span> Cognitive Behavior Therapy with a Migrant Pakistani in Malaysia: A Single Case Study of Conversion Disorder</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fahad%20R.%20Choudhry.">Fahad R. Choudhry.</a>, <a href="https://publications.waset.org/abstracts/search?q=Khadeeja%20Munawar"> Khadeeja Munawar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This clinical case presents a 24 years old, Muslim Pakistani girl with a history of conversion disorder. Her symptoms comprised fits, restlessness, numbness in legs, poor coordination and balance, burning during urination and retention. A cognitive-behavioral model was used for conceptualizing her problem and devising a management plan based on cognitive behavioral therapy (CBT) and culturally adapted coping statements. She took 13 therapy sessions and was presented with idiosyncratic case conceptualization. Psychoeducation, coping statements, extinction, verbal challenging, and behavioral activation techniques were practiced in a collaborative way for cognitive restructuring of the client. Focus of terminal sessions was on anger management. The client needed a couple of more sessions in order to help her manage her anger. However, the therapy was terminated on the part of the client after attainment of short term goals. The client reported to have a 75 % improvement in her overall condition and remained compliant throughout the therapy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive%20behavioral%20therapy" title="cognitive behavioral therapy">cognitive behavioral therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=conversion%20disorder" title=" conversion disorder"> conversion disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=female" title=" female"> female</a>, <a href="https://publications.waset.org/abstracts/search?q=Muslim" title=" Muslim"> Muslim</a>, <a href="https://publications.waset.org/abstracts/search?q=Pakistani" title=" Pakistani"> Pakistani</a> </p> <a href="https://publications.waset.org/abstracts/107060/cognitive-behavior-therapy-with-a-migrant-pakistani-in-malaysia-a-single-case-study-of-conversion-disorder" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">360</span> The Existence of Field Corn Networks on the Thailand-Burma Border under the Patron-Client Contract Farming System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kettawa%20Boonprakarn">Kettawa Boonprakarn</a>, <a href="https://publications.waset.org/abstracts/search?q=Jedsarid%20Sangkaphan"> Jedsarid Sangkaphan</a>, <a href="https://publications.waset.org/abstracts/search?q=Bejapornd%20Deekhuntod"> Bejapornd Deekhuntod</a>, <a href="https://publications.waset.org/abstracts/search?q=Nuntharat%20Suriyo"> Nuntharat Suriyo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aimed to investigate the existence of field corn networks on the Thailand-Burma border under the patron-client contract farming system. The data of this qualitative study were collected through in-depth interviews with nine key informants. The results of the study revealed that the existence of the field corn networks was associated with the relationship where farmers had to share their crops with protectors in the areas under the influence of the KNU (Karen National Union) and the DKBA (Democratic Karen Buddhist Army) or Burmese soldiers. A Mae Liang, the person who starts a network has a connection with a Thaokae, Luk Rai Hua Chai or the head of a group of farmers, and farmers. They are under the patron-client system with trust and loyalty that enable the head of the group and the farmers in the Burma border side to remain under the same Mae Liang even though the business has been passed down to later generations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=existence" title="existence">existence</a>, <a href="https://publications.waset.org/abstracts/search?q=field-corn%20networks" title=" field-corn networks"> field-corn networks</a>, <a href="https://publications.waset.org/abstracts/search?q=patron-client%20system" title=" patron-client system"> patron-client system</a>, <a href="https://publications.waset.org/abstracts/search?q=contract%20farming" title=" contract farming"> contract farming</a> </p> <a href="https://publications.waset.org/abstracts/3431/the-existence-of-field-corn-networks-on-the-thailand-burma-border-under-the-patron-client-contract-farming-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3431.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">359</span> Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xi%20Xiao">Xi Xiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Chunhui%20Chen"> Chunhui Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Xinyu%20Liu"> Xinyu Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Guangwu%20Hu"> Guangwu Hu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Jiang"> Yong Jiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users&rsquo; real locations. The thorough analysis indicates that the users&rsquo; location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20online%20social%20networks" title="mobile online social networks">mobile online social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=client%2Fserver%20architecture" title=" client/server architecture"> client/server architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20sharing" title=" location sharing"> location sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy-preserving" title=" privacy-preserving"> privacy-preserving</a> </p> <a href="https://publications.waset.org/abstracts/57662/privacy-preserving-location-sharing-system-with-clientserver-architecture-in-mobile-online-social-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">358</span> Quality Determinants of Client Satisfaction: A Case Study of ACE-Australian Consulting Engineers, Sydney, Australia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elham%20S.%20Hasham">Elham S. Hasham</a>, <a href="https://publications.waset.org/abstracts/search?q=Anthony%20S.%20Hasham"> Anthony S. Hasham</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The construction industry is one of Australia’s fastest growing industries and its success is a result of a firm’s client satisfaction with focus on product determinants such as price and quality. Ensuring quality at every phase is a must and building rapport with the client will go a long way. To capitalise on the growing demand for Engineering Consulting Firms (ECFs), we should “redefine the bottom line by allowing client satisfaction, high-quality standards, and profits to be the top priorities”. Consequently, the emphasis should be on improving employee skills through various training provisions. Clients seek consistency and thus expect that all services should be similar in respect to quality and the ability of the service to meet their needs. This calls for empowerment and comfortable work conditions to motivate employees and give them incentive to deliver quality and excellent output. The methodology utilized is triangulation-a combination of both quantitative and qualitative research. The case study-Australian Consulting Engineers (ACE) was established in 1995 and has operations throughout Australia, the Philippines, Europe, U.A.E., K.S.A., and Lebanon. ACE is affiliated with key agencies and support organizations in the engineering industry with International Organization for Standardization (ISO) certifications in Safety and Quality Management. The objective of this study is significant as it sheds light on employee motivation and client satisfaction as imperative determinants of the success of an organization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=leadership" title="leadership">leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20behavior" title=" organizational behavior"> organizational behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=satisfaction" title=" satisfaction"> satisfaction</a> </p> <a href="https://publications.waset.org/abstracts/169303/quality-determinants-of-client-satisfaction-a-case-study-of-ace-australian-consulting-engineers-sydney-australia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">357</span> Exploration of Professional Skepticism among Entry-level Auditors in China from Psychological and Cultural Perspectives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sammy%20Xiaoyan%20Ying">Sammy Xiaoyan Ying</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Professional skepticism remains one of the most important and controversial topics in auditing. This study examines the influence of client cooperativeness and fraud risk on judgments of professional skepticism among Chinese entry-level auditors in the context of evaluation of client-provided audit evidence. Given that the essence of auditors’ PS rests on distrust of clients, this study invokes trust-related theories from psychological and cultural perspectives. Specifically, invoking psychology theories of trust concerning positive relationship between risk and distrust, this study hypothesizes that professional skepticism is likely to be positively associated with client fraud risk. The results support the hypothesis and show that lower (higher) levels of client fraud risk lead to lower (higher) levels of professional skepticism. Furthermore, drawing on analysis of relationship between cooperation and trust, with particular reference to guanxi dynamics in the Chinese culture, this study hypothesizes that professional skepticism is likely to be negatively associated with client cooperativeness. The results support the hypothesis and show that higher (lower) levels of client cooperativeness lead to lower (higher) levels of professional skepticism. The findings may assist audit firms and auditing educators in improving training and education programs and enhancing entry-level auditors’ abilities to maintain professional skepticism. Also, practitioners and regulators may benefit from increasing awareness of psychological factors in influencing professional skepticism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=audit%20judgment" title="audit judgment">audit judgment</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20culture" title=" Chinese culture"> Chinese culture</a>, <a href="https://publications.waset.org/abstracts/search?q=entry-level%20auditor" title=" entry-level auditor"> entry-level auditor</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20skepticism" title=" professional skepticism"> professional skepticism</a> </p> <a href="https://publications.waset.org/abstracts/28958/exploration-of-professional-skepticism-among-entry-level-auditors-in-china-from-psychological-and-cultural-perspectives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28958.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">356</span> The Effectiveness of Dialectical Behavior Therapy in Developing Emotion Regulation Skill for Adolescent with Intellectual Disability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shahnaz%20Safitri">Shahnaz Safitri</a>, <a href="https://publications.waset.org/abstracts/search?q=Rose%20Mini%20Agoes%20Salim"> Rose Mini Agoes Salim</a>, <a href="https://publications.waset.org/abstracts/search?q=Pratiwi%20Widyasari"> Pratiwi Widyasari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Intellectual disability is characterized by significant limitations in intellectual functioning and adaptive behavior that appears before the age of 18 years old. The prominent impacts of intellectual disability in adolescents are failure to establish interpersonal relationships as socially expected and lower academic achievement. Meanwhile, it is known that emotion regulation skills have a role in supporting the functioning of individual, either by nourishing the development of social skills as well as by facilitating the process of learning and adaptation in school. This study aims to look for the effectiveness of Dialectical Behavior Therapy (DBT) in developing emotion regulation skills for adolescents with intellectual disability. DBT's special consideration toward clients’ social environment and their biological condition is foreseen to be the key for developing emotion regulation capacity for subjects with intellectual disability. Through observations on client's behavior, conducted before and after the completion of DBT intervention program, it was found that there is an improvement in client's knowledge and attitudes related to the mastery of emotion regulation skills. In addition, client's consistency to actually practice emotion regulation techniques over time is largely influenced by the support received from the client's social circles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescent" title="adolescent">adolescent</a>, <a href="https://publications.waset.org/abstracts/search?q=dialectical%20behavior%20therapy" title=" dialectical behavior therapy"> dialectical behavior therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion%20regulation" title=" emotion regulation"> emotion regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20disability" title=" intellectual disability"> intellectual disability</a> </p> <a href="https://publications.waset.org/abstracts/72895/the-effectiveness-of-dialectical-behavior-therapy-in-developing-emotion-regulation-skill-for-adolescent-with-intellectual-disability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72895.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">355</span> Analyse of User Interface Design in Mobile Teaching Apps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ashoul">Asma Ashoul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=developer" title="developer">developer</a>, <a href="https://publications.waset.org/abstracts/search?q=application" title=" application"> application</a>, <a href="https://publications.waset.org/abstracts/search?q=interface%20design" title=" interface design"> interface design</a>, <a href="https://publications.waset.org/abstracts/search?q=layout" title=" layout"> layout</a>, <a href="https://publications.waset.org/abstracts/search?q=Agile" title=" Agile"> Agile</a>, <a href="https://publications.waset.org/abstracts/search?q=client" title=" client"> client</a> </p> <a href="https://publications.waset.org/abstracts/146297/analyse-of-user-interface-design-in-mobile-teaching-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146297.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">354</span> The Impact of Client Leadership, Building Information Modelling (BIM) and Integrated Project Delivery (IPD) on Construction Project: A Case Study in UAE</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20W.%20F.%20Che%20Wan%20Putra">C. W. F. Che Wan Putra</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Alshawi"> M. Alshawi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20S.%20Al%20Ahbabi"> M. S. Al Ahbabi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Jabakhanji"> M. Jabakhanji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The construction industry is a multi-disciplinary and multi-national industry, which has an important role to play within the overall economy of any country. There are major challenges to an improved performance within the industry. Particularly lacking is, the ability to capture the large amounts of information generated during the life-cycle of projects and to make these available, in the right format, so that professionals can then evaluate alternative solutions based on life-cycle analysis. The fragmented nature of the industry is the main reason behind the unavailability and ill utilisation of project information. The lack of adequately engaging clients and managing their requirements contributes adversely to construction budget and schedule overruns. This is a difficult task to achieve, particularly if clients are not continuously and formally involved in the design and construction process, which means that the design intent is left to designers that may not always satisfy clients’ requirements. Client lead is strongly recognised in bringing change through better collaboration between project stakeholders. However, one of the major challenges is that collaboration is operated under conventional procurement methods, which hugely limit the stakeholders’ roles and responsibilities to bring about the required level of collaboration. A research has been conducted with a typical project in the UAE. A qualitative research work was conducted including semi-structured interviews with project partners to discover the real reasons behind this delay. The case study also investigated the real causes of the problems and if they can be adequately addressed by BIM and IPD. Special focus was also placed on the Client leadership and the role the Client can play to eliminate/minimize these problems. It was found that part of the ‘key elements’ from which the problems exist can be attributed to the client leadership and the collaborative environment and BIM. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=client%20leadership" title="client leadership">client leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20information%20modelling%20%28BIM%29" title=" building information modelling (BIM)"> building information modelling (BIM)</a>, <a href="https://publications.waset.org/abstracts/search?q=integrated%20project%20delivery%20%28IPD%29" title=" integrated project delivery (IPD)"> integrated project delivery (IPD)</a>, <a href="https://publications.waset.org/abstracts/search?q=case%20study" title=" case study"> case study</a> </p> <a href="https://publications.waset.org/abstracts/36540/the-impact-of-client-leadership-building-information-modelling-bim-and-integrated-project-delivery-ipd-on-construction-project-a-case-study-in-uae" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36540.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">323</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">353</span> Private and Public Health Sector Difference on Client Satisfaction: Results from Secondary Data Analysis in Sindh, Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wajiha%20Javed">Wajiha Javed</a>, <a href="https://publications.waset.org/abstracts/search?q=Arsalan%20Jabbar"> Arsalan Jabbar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nelofer%20Mehboob"> Nelofer Mehboob</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Tafseer"> Muhammad Tafseer</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahid%20Memon"> Zahid Memon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Researchers globally have strived to explore diverse factors that augment the continuation and uptake of family planning methods. Clients’ satisfaction is one of the core determinants facilitating continuation of family planning methods. There is a major debate yet scanty evidence to contrast public and private sectors with respect to client satisfaction. The objective of this study is to compare quality-of-care provided by public and private sectors of Pakistan through a client satisfaction lens. Methods: We used Pakistan Demographic Heath Survey 2012-13 dataset (Sindh province) on a total of 3133 Married Women of Reproductive Age (MWRA) aged 15-49 years. Source of family planning (public/private sector) was the main exposure variable. Outcome variable was client satisfaction judged by ten different dimensions of client satisfaction. Means and standard deviations were calculated for continuous variable while for categorical variable frequencies and percentages were computed. For univariate analysis, Chi-square/Fisher Exact test was used to find an association between clients’ satisfaction in public and private sectors. Ten different multivariate models were made. Variables were checked for multi-collinearity, confounding, and interaction, and then advanced logistic regression was used to explore the relationship between client satisfaction and dependent outcome after adjusting for all known confounding factors and results are presented as OR and AOR (95% CI). Results: Multivariate analyses showed that clients were less satisfied in contraceptive provision from private sector as compared to public sector (AOR 0.92,95% CI 0.63-1.68) even though the result was not statistically significant. Clients were more satisfied from private sector as compared to the public sector with respect to other determinants of quality-of-care (follow-up care (AOR 3.29, 95% CI 1.95-5.55), infection prevention (AOR 2.41, 95% CI 1.60-3.62), counseling services (AOR 2.01, 95% CI 1.27-3.18, timely treatment (AOR 3.37, 95% CI 2.20-5.15), attitude of staff (AOR 2.23, 95% CI 1.50-3.33), punctuality of staff (AOR 2.28, 95% CI 1.92-4.13), timely referring (AOR 2.34, 95% CI 1.63-3.35), staff cooperation (AOR 1.75, 95% CI 1.22-2.51) and complications handling (AOR 2.27, 95% CI 1.56-3.29). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=client%20satisfaction" title="client satisfaction">client satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=family%20planning" title=" family planning"> family planning</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20private%20partnership" title=" public private partnership"> public private partnership</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20care" title=" quality of care"> quality of care</a> </p> <a href="https://publications.waset.org/abstracts/29121/private-and-public-health-sector-difference-on-client-satisfaction-results-from-secondary-data-analysis-in-sindh-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29121.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">352</span> The Effect of Incorporating Animal Assisted Interventions with Trauma Focused Cognitive Behavioral Therapy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kayla%20Renteria">Kayla Renteria</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explored the role animal-assisted psychotherapy (AAP) can play in treating Post-Traumatic Stress Disorder (PTSD) when incorporated into Trauma-informed cognitive behavioral therapy (TF-CBT). A review of the literature was performed to show how incorporating AAP could benefit TF-CBT since this treatment model often presents difficulties, such as client motivation and avoidance of the exposure element of the intervention. In addition, the fluidity of treatment goals during complex trauma cases was explored, as this issue arose in the case study. This study follows the course of treatment of a 12-year-old female presenting with symptoms of PTSD. Treatment consisted of traditional components of the TF-CBT model, with the added elements of AAP to address typical treatment obstacles in TF-CBT. A registered therapy dog worked with the subject in all sessions throughout her treatment. The therapy dog was incorporated into components such as relaxation and coping techniques, narrative therapy techniques, and psychoeducation on the cognitive triangle. Throughout the study, the client’s situation and clinical needs required the therapist to switch goals to focus on current safety and stability. The therapy dog provided support and neurophysiological benefits to the client through AAP during this shift in treatment. The client was assessed quantitatively using the Child PTSD Symptom Scale Self Report for DSM-5 (CPSS-SR-5) before and after therapy and qualitatively through a feedback form given after treatment. The participant showed improvement in CPSS-SR-V scores, and she reported that the incorporation of the therapy animal improved her therapy. The results of this study show how the use of AAP provided the client a solid, consistent relationship with the therapy dog that supported her through processing various types of traumas. Implications of the results of treatment and for future research are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=animal-assisted%20therapy" title="animal-assisted therapy">animal-assisted therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=trauma-focused%20cognitive%20behavioral%20therapy" title=" trauma-focused cognitive behavioral therapy"> trauma-focused cognitive behavioral therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=PTSD%20in%20children" title=" PTSD in children"> PTSD in children</a>, <a href="https://publications.waset.org/abstracts/search?q=trauma%20treatment" title=" trauma treatment"> trauma treatment</a> </p> <a href="https://publications.waset.org/abstracts/146255/the-effect-of-incorporating-animal-assisted-interventions-with-trauma-focused-cognitive-behavioral-therapy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146255.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">217</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">351</span> An Industrial Scada System Remote Control Using Mobile Phones</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmidah%20Elgali">Ahmidah Elgali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control" title="control">control</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial" title=" industrial"> industrial</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=remote" title=" remote"> remote</a>, <a href="https://publications.waset.org/abstracts/search?q=SCADA" title=" SCADA"> SCADA</a> </p> <a href="https://publications.waset.org/abstracts/150682/an-industrial-scada-system-remote-control-using-mobile-phones" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150682.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">350</span> Data Security in Cloud Storage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Rashid">Amir Rashid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20security%20in%20cloud%20computing" title="data security in cloud computing">data security in cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20storage%20architecture" title=" cloud storage architecture"> cloud storage architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20developments" title=" cryptographic developments"> cryptographic developments</a>, <a href="https://publications.waset.org/abstracts/search?q=token%20key" title=" token key"> token key</a> </p> <a href="https://publications.waset.org/abstracts/86108/data-security-in-cloud-storage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86108.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">294</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">349</span> Moderating Effect of Owner&#039;s Influence on the Relationship between the Probability of Client Failure and Going Concern Opinion Issuance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Noor%20Hisham%20Osman">Mohammad Noor Hisham Osman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Razman%20Abdul%20Latiff"> Ahmed Razman Abdul Latiff</a>, <a href="https://publications.waset.org/abstracts/search?q=Zaidi%20Mat%20Daud"> Zaidi Mat Daud</a>, <a href="https://publications.waset.org/abstracts/search?q=Zulkarnain%20Muhamad%20Sori"> Zulkarnain Muhamad Sori</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The problem that Malaysian auditors do not issue going concern opinion (GC opinion) to seriously financially distressed companies is still a pressing issue. Policy makers, particularly the Financial Statement Review Committee (FSRC) of Malaysian Institute of Accountant, have raised this issue as early as in 2009. Similar problem happened in the US, UK, and many developing countries. It is important for auditors to issue GC opinion properly because such opinion is one signal about the viability of a company much needed by stakeholders. There are at least two unanswered questions or research gaps in the literature on determinants of GC opinion. Firstly, is client’s probability of failure associated with GC opinion issuance? Secondly, to what extent influential owners (management, family, and institution) moderate the association between client probability of failure and GC opinion issuance. The objective of this study is, therefore, twofold; (1) To examine the extent of the relationship between the probability of client failure and the issuance of GC opinion and (2) To examine the level of management, family, and institutional ownerships moderate the association between client probability of failure and the issuance of GC opinion. This study is quantitative in nature, and the sources of data are secondary (mainly company’s annual reports). A total of four hypotheses have been developed and tested on data accumulated from annual reports of seriously financially distressed Malaysian public listed companies. Data from 2006 to 2012 on a sample of 644 observations have been analyzed using panel logistic regression. It is found that certainty (rather than probability) of client failure affects the issuance of GC opinion. In addition, it is found that only the level of family ownership does positively moderate the relationship between client probability of failure and GC opinion issuance. This study is a contribution to auditing literature as its findings can enhance our understanding about audit quality; particularly on the variables that are associated with the issuance of GC opinion. The findings of this study shed light on the roles family owners in GC opinion issuance process, and this would open ways for the researcher to suggest measures that can be used to tackle the problem of auditors do not want to issue GC opinion to financially distressed clients. The measures to be suggested can be useful to policy makers in formulating future promulgations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=audit%20quality" title="audit quality">audit quality</a>, <a href="https://publications.waset.org/abstracts/search?q=auditing" title=" auditing"> auditing</a>, <a href="https://publications.waset.org/abstracts/search?q=auditor%20characteristics" title=" auditor characteristics"> auditor characteristics</a>, <a href="https://publications.waset.org/abstracts/search?q=going%20concern%20opinion" title=" going concern opinion"> going concern opinion</a>, <a href="https://publications.waset.org/abstracts/search?q=Malaysia" title=" Malaysia"> Malaysia</a> </p> <a href="https://publications.waset.org/abstracts/93046/moderating-effect-of-owners-influence-on-the-relationship-between-the-probability-of-client-failure-and-going-concern-opinion-issuance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93046.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">260</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">348</span> A Software Tool for Computer Forensic Investigation Using Client-Side Web History Visualization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francisca%20Onaolapo%20Oladipo">Francisca Onaolapo Oladipo</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Afam%20Ugwu"> Peter Afam Ugwu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Records of user activities which are valuable for forensic investigation purposes are provided by web browsers -these records in most cases are not in visual formats that are easily understood, thereby requiring some extra processes. This paper describes the implementation of a software tool for client-side web history visualization providing suitable forensic evidence for investigative purposes. Visual C#, Perl and gnuplot were deployed on Windows Operating System (OS) environment to implement the system and the resulting tool parses and transforms a web browser history into a visual format that enables an investigator to quickly and efficiently explore, understand, and interpret the user online activities in the context of a specific investigation. The system was tested using two forensic cases: the client-side web history files generated by Mozilla Firefox browser was extracted using MozillaHistoryView utility, then parsed and visualized using bar and stacked column charts. From the visual representation, results of user web activities across various productive and non-productive websites were obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=history" title="history">history</a>, <a href="https://publications.waset.org/abstracts/search?q=forensics" title=" forensics"> forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=visualization" title=" visualization"> visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20activities" title=" web activities"> web activities</a> </p> <a href="https://publications.waset.org/abstracts/51348/a-software-tool-for-computer-forensic-investigation-using-client-side-web-history-visualization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">347</span> Male Sex Workers’ Constructions of Selling Sex in South Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tara%20Panday">Tara Panday</a>, <a href="https://publications.waset.org/abstracts/search?q=Despina%20Learmonth"> Despina Learmonth</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sex work is often constructed as being an interaction between male clients and female sex workers. As a result, street-based male sex workers are continuously overlooked in the South African literature. This qualitative study explored male sex workers’ subjective experiences and constructions of their male clients’ identities and the client-sex worker relationship. This research was conducted from a social-constructionist perspective, which allowed for a deeper understanding of the reasons and context driving the choices and actions of male sex workers. Semi-structured face-to-face interviews were conducted with 10 South African men working as sex workers in Cape Town. Data was analysed through thematic analysis. The findings of the study construct the client-sex worker relationship in terms of a professional relationship, constrained choice, sexual identity and need, as well as companionship for pay, potentially highlighting underlying reasons for supply and demand. The data which emerged around the client-sex worker relationship and the clients’ identities also served to illuminate the power-dynamics in the client-sex worker relationship. This data increases insight into the exploitation and disempowerment experienced by male sex workers through verbal abuse, physical and sexual violence, and unfairly enforced laws and regulations. The findings of this study suggest that, in the context of South Africa, male sex workers' experiences of the client-sex worker relationship cannot be completely understood without considering the intersectionality of the triple stigmatisation of: the criminality of sex work, race, and the lack of economic power, which systematically maintains marginalization. Motivating for the Law Reform Commission to continue to review all emerging research may assist with guiding related policy and thereby, the provision of equal human rights and adequate health and social interventions for all sex workers in South Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title="human rights">human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=prostitution" title=" prostitution"> prostitution</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20relations" title=" power relations"> power relations</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20work" title=" sex work"> sex work</a> </p> <a href="https://publications.waset.org/abstracts/10158/male-sex-workers-constructions-of-selling-sex-in-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10158.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">483</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">346</span> [Keynote Speech]: Risk Management during the Rendition Process: Use of Screen-Voice Recordings in Translator Training</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maggie%20Hui">Maggie Hui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Risk management is not a new concept; however, it is an uncharted area as applied to the translation process and translator training. Serving as one of the self-discovery activities in their practicum course, a two-cycle experiment was carried out with a class of 13 MA translation students with an attempt to explore their risk management while translating in a simulated setting that involves translator-client relations. To test the effects of the main variable of translators’ interaction with the simulated clients, the researcher employed control-group translators and two experiment groups (with Group A being the translator in Cycle 1 and the client in Cycle 2, and Group B on the client position in Cycle 1 and the translator position in Cycle 2). Experiment cycle 1 aims to explore if there would be any behavioral difference in risk management between translators with interaction with the simulated clients, i.e. experiment group A, and their counterparts without such interaction, i.e. control group. Design of Cycle 2 concerns the order of playing different roles of the translator and client in the experiment, and provides information to compare behavior of translators of the two experiment groups. Since this is process-oriented research, it is necessary to hypothesize what was happening in the translators’ minds. The researcher made use of a user-friendly screen-voice recording freeware to record subjects’ screen activities, including every word the translator typed and every change they made to the rendition, the websites they browsed and the reference tools they used, in addition to the verbalization of their thoughts throughout the process. The research observes the translation procedures subjects considered and finally adopted, and looks into the justifications for their procedures, in order to interpret their risk management. The qualitative and quantitative results of this study have some implications for translator training: (a) the experience of being a client seems to reinforce the translator’s risk aversion; (b) the use of role-playing simulation can empower students’ learning by enhancing their attitudinal or psycho-physiological competence, interpersonal competence and strategic competence; and (c) the screen-voice recordings serve as a helpful tool for learners to reflect on their rendition processes, i.e. what they performed satisfactorily and unsatisfactorily while translating and what they could do for improvement in future translation tasks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title="risk management">risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=screen-voice%20recordings" title=" screen-voice recordings"> screen-voice recordings</a>, <a href="https://publications.waset.org/abstracts/search?q=simulated%20translator-client%20relations" title=" simulated translator-client relations"> simulated translator-client relations</a>, <a href="https://publications.waset.org/abstracts/search?q=translation%20pedagogy" title=" translation pedagogy"> translation pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=translation%20process-oriented%20research" title=" translation process-oriented research"> translation process-oriented research</a> </p> <a href="https://publications.waset.org/abstracts/63134/keynote-speech-risk-management-during-the-rendition-process-use-of-screen-voice-recordings-in-translator-training" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">345</span> Biosignal Recognition for Personal Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hadri%20Hussain">Hadri Hussain</a>, <a href="https://publications.waset.org/abstracts/search?q=M.Nasir%20Ibrahim"> M.Nasir Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chee-Ming%20Ting"> Chee-Ming Ting</a>, <a href="https://publications.waset.org/abstracts/search?q=Mariani%20Idroas"> Mariani Idroas</a>, <a href="https://publications.waset.org/abstracts/search?q=Fuad%20Numan"> Fuad Numan</a>, <a href="https://publications.waset.org/abstracts/search?q=Alias%20Mohd%20Noor"> Alias Mohd Noor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electrocardiogram" title="electrocardiogram">electrocardiogram</a>, <a href="https://publications.waset.org/abstracts/search?q=phonocardiogram" title=" phonocardiogram"> phonocardiogram</a>, <a href="https://publications.waset.org/abstracts/search?q=hidden%20markov%20model" title=" hidden markov model"> hidden markov model</a>, <a href="https://publications.waset.org/abstracts/search?q=mel%20frequency%20cepstral%20coeffiecients" title=" mel frequency cepstral coeffiecients"> mel frequency cepstral coeffiecients</a>, <a href="https://publications.waset.org/abstracts/search?q=client%20identification" title=" client identification"> client identification</a> </p> <a href="https://publications.waset.org/abstracts/48382/biosignal-recognition-for-personal-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48382.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">280</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">344</span> Investigation of Chord Protocol in Peer to Peer Wireless Mesh Network with Mobility</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Prasanna%20Murali%20Krishna">P. Prasanna Murali Krishna</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20V.%20Subramanyam"> M. V. Subramanyam</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Satya%20Prasad"> K. Satya Prasad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> File sharing in networks are generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. Though, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20mesh%20network%20%28WMN%29" title="wireless mesh network (WMN)">wireless mesh network (WMN)</a>, <a href="https://publications.waset.org/abstracts/search?q=structured%20P2P%0D%0Anetworks" title=" structured P2P networks"> structured P2P networks</a>, <a href="https://publications.waset.org/abstracts/search?q=peer%20to%20peer%20resource%20sharing" title=" peer to peer resource sharing"> peer to peer resource sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=CHORD%20Protocol" title=" CHORD Protocol"> CHORD Protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=DHT" title=" DHT"> DHT</a> </p> <a href="https://publications.waset.org/abstracts/34950/investigation-of-chord-protocol-in-peer-to-peer-wireless-mesh-network-with-mobility" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34950.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">480</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">343</span> Digitalization and High Audit Fees: An Empirical Study Applied to US Firms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arpine%20Maghakyan">Arpine Maghakyan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to study the relationship between the level of industry digitalization and audit fees, especially, the relationship between Big 4 auditor fees and industry digitalization level. On the one hand, automation of business processes decreases internal control weakness and manual mistakes; increases work effectiveness and integrations. On the other hand, it may cause serious misstatements, high business risks or even bankruptcy, typically in early stages of automation. Incomplete automation can bring high audit risk especially if the auditor does not fully understand client’s business automation model. Higher audit risk consequently will cause higher audit fees. Higher audit fees for clients with high automation level are more highlighted in Big 4 auditor’s behavior. Using data of US firms from 2005-2015, we found that industry level digitalization is an interaction for the auditor quality on audit fees. Moreover, the choice of Big4 or non-Big4 is correlated with client’s industry digitalization level. Big4 client, which has higher digitalization level, pays more than one with low digitalization level. In addition, a high-digitalized firm that has Big 4 auditor pays higher audit fee than non-Big 4 client. We use audit fees and firm-specific variables from Audit Analytics and Compustat databases. We analyze collected data by using fixed effects regression methods and Wald tests for sensitivity check. We use fixed effects regression models for firms for determination of the connections between technology use in business and audit fees. We control for firm size, complexity, inherent risk, profitability and auditor quality. We chose fixed effects model as it makes possible to control for variables that have not or cannot be measured. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=audit%20fees" title="audit fees">audit fees</a>, <a href="https://publications.waset.org/abstracts/search?q=auditor%20quality" title=" auditor quality"> auditor quality</a>, <a href="https://publications.waset.org/abstracts/search?q=digitalization" title=" digitalization"> digitalization</a>, <a href="https://publications.waset.org/abstracts/search?q=Big4" title=" Big4"> Big4</a> </p> <a href="https://publications.waset.org/abstracts/67190/digitalization-and-high-audit-fees-an-empirical-study-applied-to-us-firms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67190.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">342</span> Data Security and Privacy Challenges in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Rashid">Amir Rashid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title="cloud security">cloud security</a>, <a href="https://publications.waset.org/abstracts/search?q=IaaS" title=" IaaS"> IaaS</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20data%20privacy%20and%20integrity" title=" cloud data privacy and integrity"> cloud data privacy and integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20cloud" title=" hybrid cloud"> hybrid cloud</a> </p> <a href="https://publications.waset.org/abstracts/72497/data-security-and-privacy-challenges-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72497.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">341</span> How Social Support, Interaction with Clients and Work-Family Conflict Contribute to Mental Well-Being for Employees in the Human Service System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uwe%20C.%20Fischer">Uwe C. Fischer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mental health and well-being for employees working in the human service system are getting more and more important given the increasing rate of absenteeism at work. Besides individual capacities, social and community factors seem to be important in the working setting. Starting from a demand resource framework including the classical demand control aspects, social support systems, specific demands and resources of the client work, and work-family conflict were considered in the present study. We state hypothetically, that these factors have a meaningful association with the mental quality of life of employees working in the field of social, educational and health sectors. 1140 employees, working in human service organizations (education, youth care, nursing etc.) were asked for strains and resources at work (selected scales from Salutogenetic Subjective Work Assessment SALSA and own new scales for client work), work-family conflict, and mental quality of life from the German Short Form Health Survey. Considering the complex influences of the variables, we conducted a multiple hierarchical regression analysis. One third of the whole variance of the mental quality of life can be declared by the different variables of the model. When the variables concerning social influences were included in the hierarchical regression, the influence of work related control resource decreased. Excessive workload, work-family conflict, social support by supervisors, co-workers and other persons outside work, as well as strains and resources associated with client work had significant regression coefficients. Conclusions: Social support systems are crucial in the social, educational and health related service sector, regarding the influence on mental well-being. Especially the work-family conflict focuses on the importance of the work-life balance. Also the specific strains and resources of the client work, measured with new constructed scales, showed great impact on mental health. Therefore occupational health promotion should focus more on the social factors within and outside the working place. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=client%20interaction" title="client interaction">client interaction</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20service%20system" title=" human service system"> human service system</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health" title=" mental health"> mental health</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20support" title=" social support"> social support</a>, <a href="https://publications.waset.org/abstracts/search?q=work-family%20conflict" title=" work-family conflict"> work-family conflict</a> </p> <a href="https://publications.waset.org/abstracts/30587/how-social-support-interaction-with-clients-and-work-family-conflict-contribute-to-mental-well-being-for-employees-in-the-human-service-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30587.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">340</span> Understanding the Lived Experiences of Children and Young People Using Client Preference Tools in Mental Health Therapy: A Systematic Literature Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Charlotte%20Zamani">Charlotte Zamani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Children's and young people’s (CYP’s) perspectives on using client preference tools are central to understanding youth mental health therapy engagement. This systematic literature review attempts to understand the meanings of CYP using preference tools that may allow greater connection with the therapeutic process. Following a systematic search using PRISMA guidelines, seven studies were identified that reported qualitative feedback on preferred treatment options or activities within therapy. The data were analysed using interpretative phenomenological analysis (IPA). Three group experiential themes were found: ‘Tailor my support’, ‘My autonomy leads to greater engagement’ and ‘Preferences facilitate my authentic self’. CYP is broadly divided into those who thrive in decision-making and those who require more support. Being offered a choice in therapy delivery provides easier access and means more freedom for CYP. Preferences in therapy appeared to enable greater self-knowledge and a deeper connection to the therapeutic process. The therapist is integral in using preference tools in therapy. Youth feedback is currently limited, yet essential and ethical in order to understand critical factors of CYP engagement and for future research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=child%20and%20adolescent" title="child and adolescent">child and adolescent</a>, <a href="https://publications.waset.org/abstracts/search?q=client%20preferences" title=" client preferences"> client preferences</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20health%20therapy" title=" mental health therapy"> mental health therapy</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative" title=" qualitative"> qualitative</a> </p> <a href="https://publications.waset.org/abstracts/193129/understanding-the-lived-experiences-of-children-and-young-people-using-client-preference-tools-in-mental-health-therapy-a-systematic-literature-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=12">12</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=13">13</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=client&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10