Search results for: derivative security price
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4212

Search results for: derivative security price

1182 Countering Violent Extremism: Challenges and Possibilities for Muslim Ummah

Authors: Altaf Ahmed

Abstract:

Unhindered progress and advancement of life are directly associated with peace and development. Unfortunately, many modern states are prone to the perilous of social challenges; Violent Extremism is the most ubiquitous adversary among all. Islam in its origin fully supports peace and security; the charter of Madina, the treaty of Hudabia and conquer of Mecca are the biggest examples in this reference. The holy Prophet Muhammad ﷺ always gave priority to peace in these cases. Today, the majority of the Muslim World faces VE and terrorism due to multiple reasons ranging from religious interpretations to political, social and economic conditions. This research will try to explore challenges for Muslim Ummah in maintaining peace and what steps have been taken by it to resolve conflicts among states. In this context, Sustainable development goals (SDGs) will be particularly analysed. SDGs were adopted by all United Nations Member States in 2015. It is an undeniable fact that these are the best peace-building tools. Although there are 17 SDGs, the paper will mainly focus on quality education, zero hunger, end of poverty (social protection), women empowerment, reduced inequalities and economic growth as the best peace-building approaches for eradication of violent extremism.

Keywords: violent extremism, Muslim Ummah, peace, modern world, education

Procedia PDF Downloads 118
1181 Migratory Trajectory of Transnational Street Beggars in South Western, Nigeria

Authors: Usman Adekunle Ojedokun, Adeyinka Abideen Aderinto

Abstract:

Migration remains an important course of action often resort-to by human and some other classes of animal for survival in the face of life-threatening conditions. However, the activity of certain group of immigrants, who are exploiting the socio-economic and environmental challenges in their home countries to conduct street begging across different countries in Africa, is fast becoming a major cause for concern. This paper examined the migratory trajectory of transnational street beggars in South Western, Nigeria. Strain and Migration Network Theories were adopted for the study. The methods of data collection were survey questionnaire, in-depth interview, and key informant interview. Convenience and purposive sampling techniques were employed for the selection of 395 transnational street beggars and 4 key informants were purposively chosen. Findings revealed that transnational street beggars immigrated into Nigeria all year round and all of them came by road. Also, while some of them entered the country officially, others gained entry illegally. The majority (29.3%) arrived through Sokoto, a border State to some neighbouring countries. This study calls for more security measures at the Nigerian borders as a way of controlling the influx of this category of beggars into the country.

Keywords: transnational street beggars, street begging, migration, Nigeria

Procedia PDF Downloads 261
1180 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Adel Atta Youssef Rezkalla

Abstract:

Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 77
1179 Chemical and Electrochemical Syntheses of Two Organic Components of Ginger

Authors: Adrienn Kiss, Karoly Zauer, Gyorgy Keglevich, Rita Molnarne Bernath

Abstract:

Ginger (Zingiber officinale) is a perennial plant from Southeast Asia, widely used as a spice, herb, and medicine for many illnesses since its beneficial health effects were observed thousands of years ago. Among the compounds found in ginger, zingerone [4-hydroxy-3- methoxyphenyl-2-butanone] deserves special attention: it has an anti-inflammatory and antispasmodic effect, it can be used in case of diarrheal disease, helps to prevent the formation of blood clots, has antimicrobial properties, and can also play a role in preventing the Alzheimer's disease. Ferulic acid [(E)-3-(4-hydroxy-3-methoxyphenyl)-prop-2-enoic acid] is another cinnamic acid derivative in ginger, which has promising properties. Like many phenolic compounds, ferulic acid is also an antioxidant. Based on the results of animal experiments, it is assumed to have a direct antitumoral effect in lung and liver cancer. It also deactivates free radicals that can damage the cell membrane and the DNA and helps to protect the skin against UV radiation. The aim of this work was to synthesize these two compounds by new methods. A few of the reactions were based on the hydrogenation of dehydrozingerone [4-(4-Hydroxy-3-methoxyphenyl)-3-buten-2-one] to zingerone. Dehydrozingerone can be synthesized by a relatively simple method from acetone and vanillin with good yield (80%, melting point: 41 °C). Hydrogenation can be carried out chemically, for example by the reaction of zinc and acetic acid, or Grignard magnesium and ethyl alcohol. Another way to complete the reduction is the electrochemical pathway. The electrolysis of dehydrozingerone without diaphragm in aqueous media was attempted to produce ferulic acid in the presence of sodium carbonate and potassium iodide using platinum electrodes. The electrolysis of dehydrozingerone in the presence of potassium carbonate and acetic acid to prepare zingerone was carried out similarly. Ferulic acid was expected to be converted to dihydroferulic acid [3-(4-Hydroxy-3-methoxyphenyl)propanoic acid] in potassium hydroxide solution using iron electrodes, separating the anode and cathode space with a Soxhlet paper sheath impregnated with saturated magnesium chloride solution. For this reaction, ferulic acid was synthesized from vanillin and malonic acid in the presence of pyridine and piperidine (yield: 88.7%, melting point: 173°C). Unfortunately, in many cases, the expected transformations did not happen or took place in low conversions, although gas evolution occurred. Thus, a deeper understanding of these experiments and optimization are needed. Since both compounds are found in different plants, they can also be obtained by alkaline extraction or steam distillation from distinct plant parts (ferulic acid from ground bamboo shoots, zingerone from grated ginger root). The products of these reactions are rich in several other organic compounds as well; therefore, their separation must be solved to get the desired pure material. The products of the reactions described above were characterized by infrared spectral data and melting points. The use of these two simple methods may be informative for the formation of the products. In the future, we would like to study the ferulic acid and zingerone content of other plants and extract them efficiently. The optimization of electrochemical reactions and the use of other test methods are also among our plans.

Keywords: ferulic acid, ginger, synthesis, zingerone

Procedia PDF Downloads 175
1178 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation

Authors: Suman Podder

Abstract:

As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.

Keywords: consumer data right, innovation, open banking, privacy safeguards

Procedia PDF Downloads 140
1177 Controller Design and Experimental Evaluation of a Motorized Assistance for a Patient Transfer Floor Lift

Authors: Donatien Callon, Ian Lalonde, Mathieu Nadeau, Alexandre Girard

Abstract:

Patient transfer is a challenging, critical task because it exposes caregivers to injury risks. Available transfer devices, like floor lifts, lead to improvements but are far from perfect. They do not eliminate the caregivers’ risk of musculoskeletal disorders, and they can be burdensome to use due to their poor maneuverability. This paper presents a new motorized floor lift with a single central motorized wheel connected to an instrumented handle. Admittance controllers are designed to 1) improve the device maneuverability, 2) reduce the required caregiver effort, and 3) ensure the security and comfort of patients. Two controller designs, one with a linear admittance law and a non-linear admittance law with variable damping, were developed and implemented on a prototype. Tests were performed on seven participants to evaluate the performance of the assistance system and the controllers. The experimental results show that 1) the motorized assistance with the variable damping controller improves maneuverability by 28%, 2) reduces the amount of effort required to push the lift by 66%, and 3) provides the same level of patient comfort compared to a standard unassisted floor lift.

Keywords: floor lift, human robot interaction, admittance controller, variable admittance

Procedia PDF Downloads 111
1176 An Informed Application of Emotionally Focused Therapy with Immigrant Couples

Authors: Reihaneh Mahdavishahri

Abstract:

This paper provides a brief introduction to emotionally focused therapy (EFT) and its culturally sensitive and informed application when working with immigrant couples. EFT's grounding in humanistic psychology prioritizes a non-pathologizing and empathic understanding of individuals' experiences, creating a safe space for couples to explore and create new experiences without imposing judgment or prescribing the couple "the right way of interacting" with one another. EFT's emphasis on attachment, bonding, emotions, and corrective emotional experiences makes it a fitting approach to work with multicultural couples, allowing for the corrective emotional experience to be shaped and informed by the couples' unique cultural background. This paper highlights the challenges faced by immigrant couples and explores how immigration adds a complex layer to each partner’s sense of self, their attachment bond, and their sense of safety and security within their relationships. Navigating a new culture, creating a shared sense of purpose, and re-establishing emotional bonds can be daunting for immigrant couples, often leading to a deep sense of disconnection and vulnerability. Reestablishing and fostering secure attachment between the partners in the safety of the therapeutic space can be a protective factor for these couples.

Keywords: attachment, culturally informed care, emotionally focused therapy, immigration

Procedia PDF Downloads 73
1175 Transportation Mode Choice Analysis for Accessibility of the Mehrabad International Airport by Statistical Models

Authors: Navid Mirzaei Varzeghani, Mahmoud Saffarzadeh, Ali Naderan, Amirhossein Taheri

Abstract:

Countries are progressing, and the world's busiest airports see year-on-year increases in travel demand. Passenger acceptability of an airport depends on the airport's appeals, which may include one of these routes between the city and the airport, as well as the facilities to reach them. One of the critical roles of transportation planners is to predict future transportation demand so that an integrated, multi-purpose system can be provided and diverse modes of transportation (rail, air, and land) can be delivered to a destination like an airport. In this study, 356 questionnaires were filled out in person over six days. First, the attraction of business and non-business trips was studied using data and a linear regression model. Lower travel costs, a range of ages more significant than 55, and other factors are essential for business trips. Non-business travelers, on the other hand, have prioritized using personal vehicles to get to the airport and ensuring convenient access to the airport. Business travelers are also less price-sensitive than non-business travelers regarding airport travel. Furthermore, carrying additional luggage (for example, more than one suitcase per person) undoubtedly decreases the attractiveness of public transit. Afterward, based on the manner and purpose of the trip, the locations with the highest trip generation to the airport were identified. The most famous district in Tehran was District 2, with 23 visits, while the most popular mode of transportation was an online taxi, with 12 trips from that location. Then, significant variables in separation and behavior of travel methods to access the airport were investigated for all systems. In this scenario, the most crucial factor is the time it takes to get to the airport, followed by the method's user-friendliness as a component of passenger preference. It has also been demonstrated that enhancing public transportation trip times reduces private transportation's market share, including taxicabs. Based on the responses of personal and semi-public vehicles, the desire of passengers to approach the airport via public transportation systems was explored to enhance present techniques and develop new strategies for providing the most efficient modes of transportation. Using the binary model, it was clear that business travelers and people who had already driven to the airport were the least likely to change.

Keywords: multimodal transportation, demand modeling, travel behavior, statistical models

Procedia PDF Downloads 173
1174 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 170
1173 Oxidovanadium(IV) and Dioxidovanadium(V) Complexes: Efficient Catalyst for Peroxidase Mimetic Activity and Oxidation

Authors: Mannar R. Maurya, Bithika Sarkar, Fernando Avecilla

Abstract:

Peroxidase activity is possibly successfully used for different industrial processes in medicine, chemical industry, food processing and agriculture. However, they bear some intrinsic drawback associated with denaturation by proteases, their special storage requisite and cost factor also. Now a day’s artificial enzyme mimics are becoming a research interest because of their significant applications over conventional organic enzymes for ease of their preparation, low price and good stability in activity and overcome the drawbacks of natural enzymes e.g serine proteases. At present, a large number of artificial enzymes have been synthesized by assimilating a catalytic center into a variety of schiff base complexes, ligand-anchoring, supramolecular complexes, hematin, porphyrin, nanoparticles to mimic natural enzymes. Although in recent years a several number of vanadium complexes have been reported by a continuing increase in interest in bioinorganic chemistry. To our best of knowledge, the investigation of artificial enzyme mimics of vanadium complexes is very less explored. Recently, our group has reported synthetic vanadium schiff base complexes capable of mimicking peroxidases. Herein, we have synthesized monoidovanadium(IV) and dioxidovanadium(V) complexes of pyrazoleone derivateis ( extensively studied on account of their broad range of pharmacological appication). All these complexes are characterized by various spectroscopic techniques like FT-IR, UV-Visible, NMR (1H, 13C and 51V), Elemental analysis, thermal studies and single crystal analysis. The peroxidase mimic activity has been studied towards oxidation of pyrogallol to purpurogallin with hydrogen peroxide at pH 7 followed by measuring kinetic parameters. The Michaelis-Menten behavior shows an excellent catalytic activity over its natural counterparts, e.g. V-HPO and HRP. The obtained kinetic parameters (Vmax, Kcat) were also compared with peroxidase and haloperoxidase enzymes making it a promising mimic of peroxidase catalyst. Also, the catalytic activity has been studied towards the oxidation of 1-phenylethanol in presence of H2O2 as an oxidant. Various parameters such as amount of catalyst and oxidant, reaction time, reaction temperature and solvent have been taken into consideration to get maximum oxidative products of 1-phenylethanol.

Keywords: oxovanadium(IV)/dioxidovanadium(V) complexes, NMR spectroscopy, Crystal structure, peroxidase mimic activity towards oxidation of pyrogallol, Oxidation of 1-phenylethanol

Procedia PDF Downloads 341
1172 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 91
1171 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 538
1170 Benchmarking of Petroleum Tanker Discharge Operations at a Nigerian Coastal Terminal and Jetty Facilitates Optimization of the Ship–Shore Interface

Authors: Bassey O. Bassey

Abstract:

Benchmarking has progressively become entrenched as a requisite activity for process improvement and enhancing service delivery at petroleum jetties and terminals, most especially during tanker discharge operations at the ship – shore interface, as avoidable delays result in extra operating costs, non-productive time, high demurrage payments and ultimate product scarcity. The jetty and terminal in focus had been operational for 3 and 8 years respectively, with proper operational and logistic records maintained to evaluate their progress over time in order to plan and implement modifications and review of procedures for greater technical and economic efficiency. Regular and emergency staff meetings were held on a team, departmental and company-wide basis to progressively address major challenges that were encountered during each operation. The process and outcome of the resultant collectively planned changes carried out within the past two years forms the basis of this paper, which mirrors the initiatives effected to enhance operational and maintenance excellence at the affected facilities. Operational modifications included a second cargo receipt line designated for gasoline, product loss control at jetty and shore ends, enhanced product recovery and quality control, and revival of terminal–jetty backloading operations. Logistic improvements were the incorporation of an internal logistics firm and shipping agency, fast tracking of discharge procedures for tankers, optimization of tank vessel selection process, and third party product receipt and throughput. Maintenance excellence was achieved through construction of two new lay barges and refurbishment of the existing one; revamping of existing booster pump and purchasing of a modern one as reserve capacity; extension of Phase 1 of the jetty to accommodate two vessels and construction of Phase 2 for two more vessels; regular inspection, draining, drying and replacement of cargo hoses; corrosion management program for all process facilities; and an improved, properly planned and documented maintenance culture. Safety, environmental and security compliance were enhanced by installing state-of-the-art fire fighting facilities and equipment, seawater intake line construction as backup for borehole at the terminal, remediation of the shoreline and marine structures, modern spill containment equipment, improved housekeeping and accident prevention practices, and installation of hi-technology security enhancements, among others. The end result has been observed over the past two years to include improved tanker turnaround time, higher turnover on product sales, consistent product availability, greater indigenous human capacity utilisation by way of direct hires and contracts, as well as customer loyalty. The lessons learnt from this exercise would, therefore, serve as a model to be adapted by other operators of similar facilities, contractors, academics and consultants in a bid to deliver greater sustainability and profitability of operations at the ship – shore interface to this strategic industry.

Keywords: benchmarking, optimisation, petroleum jetty, petroleum terminal

Procedia PDF Downloads 366
1169 Women, Culture and Ambiguity: Postcolonial Feminist Critique of Lobola in African Culture and Society

Authors: Goodness Thandi Ntuli

Abstract:

Some cultural aspects in the African context have a tendency of uplifting women while some thrust them into the worst denigration scenarios; hence African Women Theologians refer to culture as a ‘double edged sword. Through socialization and internalization of social norms, some women become custodians of life, denying aspects of the culture that are against them and hand them down to the next generation. This indirectly contributes to the perpetuation of patriarchal tendencies wherein women themselves uphold and endorse such tendencies to their own detriment. One of the findings of the empirical research study conducted among the Zulu young women in the South African context was that, on the one hand, lobola (the bride-price) is one of the cultural practices that contribute a great deal in the vilification of women. On the other hand, a woman whose lobola has been paid is highly esteemed in the cultural context not only by society at large but also by the implicated woman who takes pride in it. Consequently, lobola becomes an ambiguous cultural practice. Thus from the postcolonial feminist perspective, this paper examines and critiques lobola practice while also disclosing and exposing its deep seated cultural reinforcement that is life denying to women. The paper elucidates the original lobola as a cultural practice before colonization and how it became commercialized during colonial times. With commercialization in the modern world, lobola has completely lost its preliminary meaning and ceased to be a life-giving cultural practice, particularly for women. It turned out to be the worst cultural practice that demeans women to the extent that it becomes suicidal to women dignity because, in marriage, they become objects or property to the men who purchased them. Women objectification in marriage does not only leave them culturally trapped in what was perceived to be a good practice, but it also leads to women abuse and gender based or domestic violence. The research has indicated that this kind of violence is escalating and has become so pervasive in the South African context that the country is rated as one of the capital cities of violence against women in the world. Therefore, this paper demonstrates how cultural practices at times indirectly contribute to this national scourge that needs to be condemned, disparaged and rejected. Women in the African context where such cultural activities are still viewed as a norm are in desperate need for true liberation from such ambiguous cultural practices that leave them in the margins in spite of the earned social status they might have achieved.

Keywords: african, ambiguity, critique, culture, feminist, lobola, postcolonial, society

Procedia PDF Downloads 200
1168 Multi-Criteria Decision Making Tool for Assessment of Biorefinery Strategies

Authors: Marzouk Benali, Jawad Jeaidi, Behrang Mansoornejad, Olumoye Ajao, Banafsheh Gilani, Nima Ghavidel Mehr

Abstract:

Canadian forest industry is seeking to identify and implement transformational strategies for enhanced financial performance through the emerging bioeconomy or more specifically through the concept of the biorefinery. For example, processing forest residues or surplus of biomass available on the mill sites for the production of biofuels, biochemicals and/or biomaterials is one of the attractive strategies along with traditional wood and paper products and cogenerated energy. There are many possible process-product biorefinery pathways, each associated with specific product portfolios with different levels of risk. Thus, it is not obvious which unique strategy forest industry should select and implement. Therefore, there is a need for analytical and design tools that enable evaluating biorefinery strategies based on a set of criteria considering a perspective of sustainability over the short and long terms, while selecting the existing core products as well as selecting the new product portfolio. In addition, it is critical to assess the manufacturing flexibility to internalize the risk from market price volatility of each targeted bio-based product in the product portfolio, prior to invest heavily in any biorefinery strategy. The proposed paper will focus on introducing a systematic methodology for designing integrated biorefineries using process systems engineering tools as well as a multi-criteria decision making framework to put forward the most effective biorefinery strategies that fulfill the needs of the forest industry. Topics to be covered will include market analysis, techno-economic assessment, cost accounting, energy integration analysis, life cycle assessment and supply chain analysis. This will be followed by describing the vision as well as the key features and functionalities of the I-BIOREF software platform, developed by CanmetENERGY of Natural Resources Canada. Two industrial case studies will be presented to support the robustness and flexibility of I-BIOREF software platform: i) An integrated Canadian Kraft pulp mill with lignin recovery process (namely, LignoBoost™); ii) A standalone biorefinery based on ethanol-organosolv process.

Keywords: biorefinery strategies, bioproducts, co-production, multi-criteria decision making, tool

Procedia PDF Downloads 232
1167 Parametric Study of the Structures: Influence of the Shells

Authors: Serikma Mourad, Mezidi Amar

Abstract:

The conception (design) of an earthquake-resistant structure is a complex problem seen the necessity of meeting the requirements of security been imperative by the regulations, and of economy been imperative by the increasing costs of the structures. The resistance of a building in the horizontal actions (shares) is mainly ensured by a mixed brace system; for a concrete building, this system is constituted by frame or shells; or both at the same time. After the earthquake of Boumerdes (May 23; 2003) in Algeria, the studies made by experts, ended in modifications of the Algerian Earthquake-resistant Regulation (AER 99). One of these modifications was to widen the use of shells for the brace system. This modification has create a conflict on the quantities, the positions and the type of the shells at adopt. In the present project, we suggest seeing the effect of the variation of the dimensions, the localization and the conditions of rigidity in extremities of shells. The study will be led on a building (F+5) implanted in zone of seismicity average. To do it, we shall proceed to a classic dynamic study of a structure by using 4 alternatives for shells by varying the lengths and number in order to compare the cost of the structure for 4 dispositions of the shells with a technical-economic study of the brace system by the use of different dispositions of shells and to estimate the quantities of necessary materials (concrete and steel).

Keywords: reinforced concrete, mixed brace system, dynamic analysis, beams, shells

Procedia PDF Downloads 325
1166 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 184
1165 Deciphering Information Quality: Unraveling the Impact of Information Distortion in the UK Aerospace Supply Chains

Authors: Jing Jin

Abstract:

The incorporation of artificial intelligence (AI) and machine learning (ML) in aircraft manufacturing and aerospace supply chains leads to the generation of a substantial amount of data among various tiers of suppliers and OEMs. Identifying the high-quality information challenges decision-makers. The application of AI/ML models necessitates access to 'high-quality' information to yield desired outputs. However, the process of information sharing introduces complexities, including distortion through various communication channels and biases introduced by both human and AI entities. This phenomenon significantly influences the quality of information, impacting decision-makers engaged in configuring supply chain systems. Traditionally, distorted information is categorized as 'low-quality'; however, this study challenges this perception, positing that distorted information, contributing to stakeholder goals, can be deemed high-quality within supply chains. The main aim of this study is to identify and evaluate the dimensions of information quality crucial to the UK aerospace supply chain. Guided by a central research question, "What information quality dimensions are considered when defining information quality in the UK aerospace supply chain?" the study delves into the intricate dynamics of information quality in the aerospace industry. Additionally, the research explores the nuanced impact of information distortion on stakeholders' decision-making processes, addressing the question, "How does the information distortion phenomenon influence stakeholders’ decisions regarding information quality in the UK aerospace supply chain system?" This study employs deductive methodologies rooted in positivism, utilizing a cross-sectional approach and a mono-quantitative method -a questionnaire survey. Data is systematically collected from diverse tiers of supply chain stakeholders, encompassing end-customers, OEMs, Tier 0.5, Tier 1, and Tier 2 suppliers. Employing robust statistical data analysis methods, including mean values, mode values, standard deviation, one-way analysis of variance (ANOVA), and Pearson’s correlation analysis, the study interprets and extracts meaningful insights from the gathered data. Initial analyses challenge conventional notions, revealing that information distortion positively influences the definition of information quality, disrupting the established perception of distorted information as inherently low-quality. Further exploration through correlation analysis unveils the varied perspectives of different stakeholder tiers on the impact of information distortion on specific information quality dimensions. For instance, Tier 2 suppliers demonstrate strong positive correlations between information distortion and dimensions like access security, accuracy, interpretability, and timeliness. Conversely, Tier 1 suppliers emphasise strong negative influences on the security of accessing information and negligible impact on information timeliness. Tier 0.5 suppliers showcase very strong positive correlations with dimensions like conciseness and completeness, while OEMs exhibit limited interest in considering information distortion within the supply chain. Introducing social network analysis (SNA) provides a structural understanding of the relationships between information distortion and quality dimensions. The moderately high density of ‘information distortion-by-information quality’ underscores the interconnected nature of these factors. In conclusion, this study offers a nuanced exploration of information quality dimensions in the UK aerospace supply chain, highlighting the significance of individual perspectives across different tiers. The positive influence of information distortion challenges prevailing assumptions, fostering a more nuanced understanding of information's role in the Industry 4.0 landscape.

Keywords: information distortion, information quality, supply chain configuration, UK aerospace industry

Procedia PDF Downloads 64
1164 International-Migration and Land Use Change in Ghana: Assessment of the Multidimensional Effects on National Development

Authors: Baffoe Kingsley

Abstract:

The consequence of the migration of young people from rural farming communities in the global south to the global north is a well-known phenomenon. While climate change and its accompanying socio-economic structures continue to be the driver, what is not really known is how left behinds are compelled to convert lands meant for the production of traditional staples such as cereals, vegetables, and tubers to the production of export-driven cashew plantations due to youth migration. The consequence of such migration on the development of Ghana and its food security is multidimensional. Using an ethnographic research design, the study revealed that the majority of farmers in the area are now aged, and farm labor has become scarce, which has impeded the cultivation of traditional staples for the population. It has also been established that in the absence of farm labor, most farmers have reduced farm sizes for the production of staples and increased the production of cashews. The practice has, in tend, resulted in a scarcity of land for the cultivation of staples. The study recommends further inquiry into how the effects of migration and cashew production as diversification in agriculture influence national development in Ghana.

Keywords: staple food crops, cashew plantations, climate change, migration

Procedia PDF Downloads 53
1163 Management and Conservation of Crop Biodiversity in Karnali Mountains of Nepal

Authors: Chhabi Paudel

Abstract:

The food and nutrition security of the people of the mountain of Karnali province of Nepal is dependent on traditional crop biodiversity. The altitude range of the study area is 1800 meters to 2700 meters above sea level. The climate is temperate to alpine. Farmers are adopting subsistent oriented diversified farming systems and selected crop species, cultivars, and local production systems by their own long adaptation mechanism. The major crop species are finger millet, proso millet, foxtail millet, potato, barley, wheat, mountain rice, buckwheat, Amaranths, medicinal plants, and many vegetable species. The genetic and varietal diversity of those underutilized indigenous crops is also very high, which has sustained farming even in uneven climatic events. Biodiversity provides production synergy, inputs, and other agro-ecological services for self-sustainability. But increase in human population and urban accessibility are seen as threats to biodiversity conservation. So integrated conservation measures are suggested, including agro-tourism and other monetary benefits to the farmers who conserve the local biodiversity.

Keywords: crop biodiversity, climate change, in-situ conservation, resilience, sustainability, agrotourism

Procedia PDF Downloads 97
1162 Perceived Effect of Livelihood Diversification on the Welfare of Rural Households in Niger State, Nigeria

Authors: Oladipo Joseph Ajayi, Yakubu Muhammed, Raufu Olusola Sanusi

Abstract:

This study determined the perceived effect of livelihood diversification on welfare of rural household in Niger state, Nigeria. Multi-stage sampling technique was adopted for sampling the respondents. Data used for the study were obtained from primary source. Structured questionnaire with interview schedule was administered to 180 randomly selected rural farmers in the study area. Descriptive statistics analysis and z-test statistics were used to analyse the data collected. The study revealed the mean age of the household to be 43 years, mean years of schooling was 8.5, mean household size was 6 people, mean farming experience of 17.5 years and mean farm size of 1.8 hectares. The effect of livelihood diversification revealed that livelihood diversification had positive and significant effect on food security (65.6%) and income generation (66.8%) in the study area. The major constraints to diversification in the study area were poor infrastructure, unavailability of credit and climatic risk and uncertainty. The study, therefore, recommended that rural household should be sensitised to diversify their income source into non-farm activities.

Keywords: income, livelihood diversification , rural household, welfare

Procedia PDF Downloads 416
1161 A Case Study of the Saudi Arabian Investment Regime

Authors: Atif Alenezi

Abstract:

The low global oil price poses economic challenges for Saudi Arabia, as oil revenues still make up a great percentage of its Gross Domestic Product (GDP). At the end of 2014, the Consultative Assembly considered a report from the Committee on Economic Affairs and Energy which highlights that the economy had not been successfully diversified. There thus exist ample reasons for modernising the Foreign Direct Investment (FDI) regime, primarily to achieve and maintain prosperity and facilitate peace in the region. Therefore, this paper aims at identifying specific problems with the existing FDI regime in Saudi Arabia and subsequently some solutions to those problems. Saudi Arabia adopted its first specific legislation in 1956, which imposed significant restrictions on foreign ownership. Since then, Saudi Arabia has modernised its FDI framework with the passing of the Foreign Capital Investment Act 1979 and the Foreign Investment Law2000 and the accompanying Executive Rules 2000 and the recently adopted Implementing Regulations 2014.Nonetheless, the legislative provisions contain various gaps and the failure to address these gaps creates risks and uncertainty for investors. For instance, the important topic of mergers and acquisitions has not been addressed in the Foreign Investment Law 2000. The circumstances in which expropriation can be considered to be in the public interest have not been defined. Moreover, Saudi Arabia has not entered into many bilateral investment treaties (BITs). This has an effect on the investment climate, as foreign investors are not afforded typical rights. An analysis of the BITs which have been entered into reveals that the national treatment standard and stabilisation, umbrella or renegotiation provisions have not been included. This is problematic since the 2000 Act does not spell out the applicable standard in accordance with which foreign investors should be treated. Moreover, the most-favoured-nation (MFN) or fair and equitable treatment (FET) standards have not been put on a statutory footing. Whilst the Arbitration Act 2012 permits that investment disputes can be internationalised, restrictions have been retained. The effectiveness of international arbitration is further undermined because Saudi Arabia does not enforce non-domestic arbitral awards which contravene public policy. Furthermore, the reservation to the Convention on the Settlement of Investment Disputes allows Saudi Arabia to exclude petroleum and sovereign disputes. Interviews with foreign investors, who operate in Saudi Arabia highlight additional issues. Saudi Arabia ought not to procrastinate far-reaching structural reforms.

Keywords: FDI, Saudi, BITs, law

Procedia PDF Downloads 409
1160 The Impact of Artificial Intelligence on Sustainable Architecture and Urban Design

Authors: Alfons Aziz Asaad Hozain

Abstract:

The goal of sustainable architecture is to design buildings that have the least negative impact on the environment and provide better conditions for people. What forms of development enhance the area? This question was asked at the Center for the Study of Spatial Development and Building Forms in Cambridge in the late 1960s. This has resulted in many influential articles that have had a profound impact on the practice of urban planning. This article focuses on the sustainability outcomes caused by the climatic conditions of traditional Iranian architecture in hot and dry regions. Since people spend a lot of time at home, it is very important that these homes meet their physical and spiritual needs as well as the cultural and religious aspects of their lifestyle. In a country as large as Iran with different climates, traditional builders have put forward a number of logical solutions to ensure human comfort. With these solutions, the environmental problems of the have long been solved. Taking into account the experiences of traditional architecture in Iran's hot and dry climate, sustainable architecture can be achieved.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 77
1159 Potentials and Impediments in the Development of Ikeji Festival for Cultural Tourism

Authors: Ifegbo Lawrencia Ifegbo

Abstract:

Nigeria is a country with many ethnic groups and therefore endowed with festival of different types and nature, yet no concerted effort is committed towards their development for cultural tourism. This paper assessed the adequacy of tourism potential of the festivals, and most importantly investigated the impediments surrounding their non-development. Ikeji, a masquerade festival of the people of Arondizuogu clan in Imo State of Nigeria was selected for the study. Ethnographic research using observer-as-participant technique was used for conducting the study. This was supplemented by focused group discussion (FGD), key informant and unstructured interviews. The result revealed that there exist so much potentials like masquerading, cultural dances, native and highlife music, drumming, role reversals and traditional dishes in the festival. It was further deduced that poor supply of amenities and infrastructural facilities, insecurity of life, lack of trained indigenous experts in tourism, lack of awareness and publicity for the festival on the part of the host communities were responsible for the non-development into tourism destinations. The implication of this is that unless the government resolves to provide the needed resources for the development of the enormous festivals, and restores security and peace in the country, cultural tourism will rarely thrive in Nigeria.

Keywords: festivals, cultural tourism, tourism potential, cultural resources, tourism development

Procedia PDF Downloads 336
1158 Norm Evolution through Contestation: Role of Legality from Humanitarian Intervention to Responsibility to Protect

Authors: Nazlı Üstünes Demirhan

Abstract:

International norms are subject to pressures of change through contestation during the course of their lifetimes. The nature of the contestation is one of the factors that are likely to have a determinative role in the direction of this change towards a stronger or weaker norm. This paper aims to understand the relation between the legality of contestation and the direction of change in norm strength. Based on a multidimensional norm strength conceptualization, it is hypothesized that use of legal logic and rhetoric of argumentation would have a positive influence for norm strength, whereas non-legal nature of contestation would lack this and weaken the norm. In order to show this, the evolution of the human protection norm between 1999 and 2018 will be examined with reference to two major contestation periods; Kosovo intervention of 1999, which led to the development of R2P doctrine, and Libya intervention of 2011, which is followed by the demise of the norm. The comparative analysis will be conducted through process tracing method with a document analysis on the Security Council meeting minutes, resolutions, and press releases. This study aims to contribute to the norm contestation literature with the introduction of legal process analysis. It also relates to further questions in IR/IL nexus, relating to the value added of norm legality as well as the politics of legalization.

Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, norm strength, responsibility to protect

Procedia PDF Downloads 159
1157 Strategic Redesign of Public Spaces with a Sustainable Approach: Case Study of Parque Huancavilca, Guayaquil

Authors: Juan Carlos Briones Macias

Abstract:

Currently, the Huancavilca City Park in Guayaquil is an abandoned public space that is discovering a growing problem of insecurity, where various problems have been perceived, such as the lack of green areas, deteriorating furniture, insufficient lighting, the use of inadequate cladding materials and very sunny areas due to the lack of planning in the design of green areas. The objective of this scientific article is to redesign Huancavilca Park through public space design strategies for more attractive and comfortable areas, becoming a point of interaction in a safe and accessible way. A mixed methodology (qualitative and quantitative) was applied, obtaining information based on surveys, interviews, field observations, and systematizing the data in the traditional weighting of the structuring aspects of the park. The results were obtained from the methodological design scheme of iterative analysis of public spaces by Jan Güell. It is concluded that the use of urban strategies in the structuring elements of the park, such as vegetation, furniture, generating new activities, and security interventions, will specifically solve all the problems of the Huancavilca Park tested in a Pareto 80/20 Diagram.

Keywords: public space, green areas, vegetation, street furniture, urban analysis

Procedia PDF Downloads 146
1156 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 383
1155 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 211
1154 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport

Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos

Abstract:

Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.

Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform

Procedia PDF Downloads 177
1153 Structure and Magnetic Properties of M-Type Sr-Hexaferrite with Ca, La Substitutions

Authors: Eun-Soo Lim, Young-Min Kang

Abstract:

M-type Sr-hexaferrite (SrFe₁₂O₁₉) have been studied during the past decades because it is the most utilized materials in permanent magnets due to their low price, outstanding chemical stability, and appropriate hard magnetic properties. Many attempts have been made to improve the intrinsic magnetic properties of M-type Sr-hexaferrites (SrM), such as by improving the saturation magnetization (MS) and crystalline anisotropy by cation substitution. It is well proved that the Ca-La-Co substitutions are one of the most successful approaches, which lead to a significant enhancement in the crystalline anisotropy without reducing MS, and thus the Ca-La-Co-doped SrM have been commercialized in high-grade magnet products. In this research, the effect of respective doping of Ca and La into the SrM lattices were studied with assumptions that these elements could substitute both of Fe and Sr sites. The hexaferrite samples of stoichiometric SrFe₁₂O₁₉ (SrM) and the Ca substituted SrM with formulae of Sr₁₋ₓCaₓFe₁₂Oₐ (x = 0.1, 0.2, 0.3, 0.4) and SrFe₁₂₋ₓCaₓOₐ (x = 0.1, 0.2, 0.3, 0.4), and also La substituted SrM of Sr₁₋ₓLaₓFe₁₂Oₐ (x = 0.1, 0.2, 0.3, 0.4) and SrFe₁₂₋ₓLaₓOₐ (x = 0.1, 0.2, 0.3, 0.4) were prepared by conventional solid state reaction processes. X-ray diffraction (XRD) with a Cu Kα radiation source (λ=0.154056 nm) was used for phase analysis. Microstructural observation was conducted with a field emission scanning electron microscopy (FE-SEM). M-H measurements were performed using a vibrating sample magnetometer (VSM) at 300 K. Almost pure M-type phase could be obtained in the all series of hexaferrites calcined at > 1250 ºC. Small amount of Fe₂O₃ phases were detected in the XRD patterns of Sr₁₋ₓCaₓFe₁₂Oₐ (x = 0.2, 0.3, 0.4) and Sr₁₋ₓLaₓFe₁₂Oₐ (x = 0.1, 0.2, 0.3, 0.4) samples. Also, small amount of unidentified secondary phases without the Fe₂O₃ phase were found in the samples of SrFe₁₂₋ₓCaₓOₐ (x = 0.4) and SrFe₁₂₋ₓLaₓOₐ (x = 0.3, 0.4). Although the Ca substitution (x) into SrM structure did not exhibit a clear tendency in the cell parameter change in both series of samples, Sr₁₋ₓCaₓFe₁₂Oₐ and SrFe₁₂₋ₓCaₓOₐ , the cell volume slightly decreased with doping of Ca in the Sr₁₋ₓCaₓFe₁₂Oₐ samples and increased in the SrFe₁₂₋ₓCaₓOₐ samples. Considering relative ion sizes between Sr²⁺ (0.113 nm), Ca²⁺ (0.099 nm), Fe³⁺ (0.064 nm), these results imply that the Ca substitutes both of Sr and Fe in the SrM. A clear tendency of cell parameter change was observed in case of La substitution into Sr site of SrM ( Sr₁₋ₓLaₓFe₁₂Oₐ); the cell volume decreased with increase of x. It is owing to the similar but smaller ion size of La³⁺ (0.106 nm) than that of Sr²⁺. In case of SrFe₁₂₋ₓLaₓOₐ, the cell volume first decreased at x = 0.1 and then remained almost constant with increase of x from 0.2 to 0.4. These results mean that La only substitutes Sr site in the SrM structure. Besides, the microstructure and magnetic properties of these samples, and correlation between them will be revealed.

Keywords: M-type hexaferrite, substitution, cell parameter, magnetic properties

Procedia PDF Downloads 211