Search results for: communication policies
3240 Television and Virtual Public Sphere: A Study on Malayali Tribes in Salem District, Tamil Nadu
Authors: P. Viduthalai, A. K. Divakar, V. Natarajan
Abstract:
Media is one of the powerful tools that manipulate the world in numerous aspects especially in the form of a communication process. For instance, the concept of the public sphere, which was earlier represented by landlords and elites has now transformed into a virtual public sphere, which is also represented by marginalized people. Unfortunately, this acquisition is still paradoxical. Though the media proliferation and its effects are humongous, still it has not been the same throughout the world. Inequality in access to media has created a technological divide among people. Finally, globalization and approach by the government towards using media for development communication has significantly changed the way in which the media reaches every nook and corner. Monarchy, oligarchy, republic and democracy together form the basis of most governments of the world. Of which, democracy is the one with the highest involvement and participation of the people. Ideally, the participation of the people is what, that keeps the democracy running. A healthy democracy is possible only when people are able to access information that makes citizens responsible and serves to check the functioning of their elected representatives. On one side the media consumption of people plays a crucial role in the formation of the public sphere, and on the other side, big media conglomerates are a serious threat to community participation, which is a goal that the media should strive for in a country like India. How different people consume these different media, differs greatly from length and breadth of the country. Another aspect of this media consumption is that it isn’t passive. People usage and consumption of media are related with the gratification that they derive from the particular media. This aspect varies from person to person and from society to society according to both internal and external factors. This article sets out from the most underlying belief that Malayali Tribes have adopted television and becomes a part of daily life and a day never passes without it especially after the introduction of Free Television Scheme by the past state government. Though they are living in hilly and socially isolated places, they too have started accessing media for understanding about the people of the plains and their culture, dictated by their interest. Many of these interests appear to have a social and psychological origin. The present research attempts to study how gratification of these needs lead Malayali Tribes to form such a virtual public sphere where they could communicate with people of the plains. Data was collected through survey method, from 300 respondents on “Exposure towards Television and their perception”. Conventional anthropological methods like unstructured interviews were also used to supplement the data collection efforts in the three taluks namely Yercaud, Pethanayankkanpalayam and Panamaraththuppatty in Salem district of TamilNadu. The results highlight the role of Television in gratifying needs of the Malayali Tribes.Keywords: democracy, gratification, Malayali Tribes and television, virtual public sphere
Procedia PDF Downloads 2543239 Simulation of Lean Principles Impact in a Multi-Product Supply Chain
Authors: Matteo Rossini, Alberto Portioli Staudacher
Abstract:
The market competition is moving from the single firm to the whole supply chain one because of increasing competition and growing need for operational efficiencies and customer orientation. Supply chain management allows companies to look beyond their organizational boundaries to develop and leverage resources and capabilities of their supply chain partners. This leads to create competitive advantages in the marketplace and because of this SCM has acquired strategic importance. Lean Approach is a management strategy that focuses on reducing every type of waste present in an organization. This approach is becoming more and more popular among supply chain managers. The supply chain application of lean approach is low diffused. It is not well studied which are the impacts of lean approach principles in a supply chain context. In literature there are only few studies simulating the lean approach performance in single products supply chain. This research work studies the impacts of lean principles implementation along a supply chain. To achieve this, a simulation model of a three-echelon multiproduct product supply chain has been built. Kanban system (and several priority policies) and setup time reduction degrees are implemented in the lean-configured supply chain to apply pull and lot-sizing decrease principles respectively. To evaluate the benefits of lean approach, lean supply chain is compared with an EOQ-configured supply chain. The simulation results show that Kanban system and setup-time reduction improve inventory stock level. They also show that logistics efforts are affected to lean implementation degree. The paper concludes describing performances of lean supply chain in different contexts.Keywords: inventory policy, Kanban, lean supply chain, simulation study, supply chain management, planning
Procedia PDF Downloads 3583238 Understanding Tourism Innovation through Fuzzy Measures
Authors: Marcella De Filippo, Delio Colangelo, Luca Farnia
Abstract:
In recent decades, the hyper-competition of tourism scenario has implicated the maturity of many businesses, attributing a central role to innovative processes and their dissemination in the economy of company management. At the same time, it has defined the need for monitoring the application of innovations, in order to govern and improve the performance of companies and destinations. The study aims to analyze and define the innovation in the tourism sector. The research actions have concerned, on the one hand, some in-depth interviews with experts, identifying innovation in terms of process and product, digitalization, sustainability policies and, on the other hand, to evaluate the interaction between these factors, in terms of substitutability and complementarity in management scenarios, in order to identify which one is essential to be competitive in the global scenario. Fuzzy measures and Choquet integral were used to elicit Experts’ preferences. This method allows not only to evaluate the relative importance of each pillar, but also and more interestingly, the level of interaction, ranging from complementarity to substitutability, between pairs of factors. The results of the survey are the following: in terms of Shapley values, Experts assert that Innovation is the most important factor (32.32), followed by digitalization (31.86), Network (20.57) and Sustainability (15.25). In terms of Interaction indices, given the low degree of consensus among experts, the interaction between couples of criteria on average could be ignored; however, it is worth to note that the factors innovations and digitalization are those in which experts express the highest degree of interaction. However for some of them, these factors have a moderate level of complementarity (with a pick of 57.14), and others consider them moderately substitutes (with a pick of -39.58). Another example, although outlier is the interaction between network and digitalization, in which an expert consider them markedly substitutes (-77.08).Keywords: innovation, business model, tourism, fuzzy
Procedia PDF Downloads 2723237 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students
Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah
Abstract:
Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.Keywords: obesity, food security, body image, self-esteem
Procedia PDF Downloads 763236 Performance Study of ZigBee-Based Wireless Sensor Networks
Authors: Afif Saleh Abugharsa
Abstract:
The IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPAN) with focus on enabling wireless sensor networks. It aims to give a low data rate, low power consumption, and low cost wireless networking on the device-level communication. The objective of this study is to investigate the performance of IEEE 802.15.4 based networks using simulation tool. In this project the network simulator 2 NS2 was used to several performance measures of wireless sensor networks. Three scenarios were considered, multi hop network with a single coordinator, star topology, and an ad hoc on demand distance vector AODV. Results such as packet delivery ratio, hop delay, and number of collisions are obtained from these scenarios.Keywords: ZigBee, wireless sensor networks, IEEE 802.15.4, low power, low data rate
Procedia PDF Downloads 4333235 Adaptable Buildings for More Sustainable Housing: Energy Life Cycle Analysis
Authors: Rafael Santos Fischer, Aloísio Leoni Schmid, Amanda Dalla-Bonna
Abstract:
The life cycle analysis and the energy life cycle analysis are useful design support tools when sustainability becomes imperative. The final phase of buildings life cycle is probably the least known, on which less knowledge is available. In the Brazilian building industry, the lifespan of a building design rarely is treated as a definite design parameter. There is rather a common sense attitude to take any building demands as permanent, and to take for granted that buildings solutions are durable and solid. Housing, being a permanent issue in any society, presents a real challenge to the choice of a design lifespan. In Brazilian history, there was a contrast of the native solutions of collective, non-durable houses built by several nomadic tribes, and the stone and masonry buildings introduced by the sedentary Portuguese conquerors. Durable buildings are commonly associated with welfare. However, social dynamics makes traditional families of both parents and children be just one of several possible arrangements. In addition, a more liberal attitude towards family leads to an increase in the number of people living in alternative arrangements. Japan is an example of country where houses have been made intentionally ephemeral since the half of 20th century. The present article presents the development of a flexible housing design solution on the basis of the Design Science Research approach. A comparison in terms of energy life cycle shows how flexibility and dematerialization may point at a feasible future for housing policies in Brazil.Keywords: adaptability, adaptable building, embodied energy, life cyclce analysis, social housing
Procedia PDF Downloads 5893234 Re-Examining Contracts in Managing and Exploiting Strategic National Resources: A Case in Divestation Process in the Share Distribution of Mining Corporation in West Nusa Tenggara, Indonesia
Authors: Hayyan ul Haq, Zainal Asikin
Abstract:
This work aims to explore the appropriate solution in solving legal problems stemmed from managing and exploiting strategic natural resources in Indonesia. This discussion will be focused on the exploitation of gold mining, i.e. divestation process in the New Mont Corporation, West Nusa Tenggara. These legal problems relate to the deviation of the national budget regulation, UU. No. 19/2012, and the implementation of the divestastion process, which infringes PP. No. 50/2007 concerning the Impelementation Procedure of Regional Cooperation, which is an implementation regulation of UU No. 1/2004 on State’s Treasury. The cooperation model, have been developed by the Provincial Government, failed to create a permanent legal solution through normative approach. It has merely used practical approach that tends (instant solution), by using some loopholes in the divestation process. The above blunders have accumulated by other secondary legal blunders, i.e. good governance principles, particularly justice, transparency, efficiency, effective principles and competitiveness principle. To solve the above problems, this work offers constitutionalisation of contract that aimed at reviewing and coherencing all deviated contracts, rules and policies that have deprived the national and societies’ interest to optimize the strategic natural resources towards the greatest benefit for the greatest number of people..Keywords: constitutionalisation of contract, strategic national resources, divestation, the greatest benefit for the greatest number of people, Indonesian Pancasila values
Procedia PDF Downloads 4593233 Recyclable Household Solid Waste Generation and Collection in Beijing, China
Authors: Tingting Liu, Yufeng Wu, Xi Tian, Yu Gong, Tieyong Zuo
Abstract:
The household solid waste generated by household in Beijing is increasing quickly due to rapid population growth and lifestyle changes. However, there are no rigorous data on the generation and collection of the recyclable household solid wastes. The Beijing city government needs this information to make appropriate policies and plans for waste management. To address this information need, we undertook the first comprehensive study of recyclable household solid waste for Beijing. We carried out a survey of 500 families across sixteen districts in Beijing. We also analyzed the quantities, spatial distribution and categories of collected waste handled by curbside recyclers and permanent recycling centers for 340 of the 9797 city-defined residential areas of Beijing. From our results, we estimate that the total quantity of recyclable household solid waste was 1.8 million tonnes generated by Beijing household in 2013 and 71.6% of that was collected. The main generation categories were waste paper (24.4%), waste glass bottle (23.7%) and waste furniture (14.3%). The recycling rate was varied among different kinds of municipal solid waste. Also based on our study, we estimate there were 22.8 thousand curbside recyclers and 5.7 thousand permanent recycling centers in Beijing. The problems of household solid waste collecting system were inadequacies of authorized collection centers, skewed ratios of curbside recyclers and authorized permanent recycling centers, weak recycling awareness of residents and lack of recycling resources statistics and appraisal system. According to the existing problems, we put forward the suggestions to improve household solid waste management.Keywords: Municipal waste; Recyclable waste; Waste categories; Waste collection
Procedia PDF Downloads 2963232 Hidden Populations and Women: New Political, Methodological and Ethical Challenges
Authors: Renée Fregosi
Abstract:
The contribution presently proposed will report on the beginnings of a Franco-Chilean study to be launched in 2015 by a multidisciplinary team of Renée Fregosi Political Science University Paris 3 / CECIEC, Norma Muñoz Public Policies University of Santiago of Chile, Jean-Daniel Lelievre, Medicine Paris 11 University, Marcelo WOLFF Medicine University of Chile, Cecilia Blatrix Political Science University Paris-Tech, Ernesto OTTONE, Political Science University of Chile, Paul DENY Medicine Paris 13 University, Rafael Bugueno Medicine Hospital Urgencia Pública of Santiago, Eduardo CARRASCO Political Science Paris 3 University. The problem of hidden populations challenges some criteria and concepts to re-examine: in particular the concept of target population, sampling methods to "snowball" and the cost-effectiveness criterion that shows the connection of political and scientific fields. Furthermore, if the pattern of homosexual transmission still makes up the highest percentage of the modes of infection with HIV, there is a continuous increase in the number of people infected through heterosexual sex, including women and persons aged 50 years and older. This group can be described as " unknown risk people." Access to these populations is a major challenge and raises methodological, ethical and political issues of prevention, particularly on the issue of screening. This paper proposes an inventory of these types of problems and their articulation, to define a new phase in the prevention against HIV refocused on women.Keywords: HIV testing, hidden populations, difficult to reach PLWHA, women, unknown risk people
Procedia PDF Downloads 5223231 Proposed Intervention to the Attention of Harassment at a Public University
Authors: R. Echeverría Echeverría, C. Carrillo Trujillo, N. Evia Alamilla
Abstract:
Today, bullying is an expression of violence. It is a present problem in different contexts. Bullying and harassment have become subject matter of professional psychology , anthropology and other social sciences and related areas. However, most research on bullying have focused on peer violence and basic education. There is little attention to harassment in higher education. It also has little generation of research and interventions in universities, undergraduate and postgraduate level. The aim of this paper is to present a proposal for intervention to the attention of college students who have had an experience of harassment and / or bullying in a Public University of Merida, Yucatan, Mexico. The methodology was qualitative phenomenological. Semiestructura interview techniques and focus groups were used. 6 students participated who have lived harassment or bullying. Also they are participating teachers and university leaders who play an important role in the presence of such cases. The purpose is to analyze the presence of policies for the prevention, treatment and punishment of those problems. The qualitative data analysis will be based on the general proposal of Rodriguez Gomez Gil Flores and García Jiménez (1999). The results show the need to create a body entrusted to provide timely attention to cases of bullying or harassment that are reported. It is important to take legal and psychological support of the University authorities. It is proposed to create a mechanism to ensure timely care and not victimized who has had the experience; in addition to the punishment of those who exercised to ensure that violence. In discussing the successes and failures of the proposal are highlighted. And the processes that have been facilitated or hampered progress for the project.Keywords: bullying, harassment, intervention, public university
Procedia PDF Downloads 3033230 Hospitality and Migration within the Canadian Social Fabric: Guest and Host Factors in Manitoba
Authors: Nathalie Piquemal, Faiçal Zellama, Bathélemy Bolivar, Leyla Sall
Abstract:
Canada defines itself as a country of immigration and a multicultural nation, ideologically, politically and programmatically (in terms of its integration practices). As such, principles of hospitality may seem, at first glance, incontestable, given the convergence of the views of the majority of Canadian politicians on the need to welcome, each year, a significant number of immigrants and to offer them the hospitality that facilitates their transition to Canadian citizenship. However, immigrants are welcomed in a Canadian societal context in which power and resources are unevenly distributed, resulting in complex social relationships between hosts and newcomers. Qualitative data obtained from newcomers in Winnipeg, Manitoba, Canada, focuses on experiences of hospitality, with special attention to host-guest social and power dynamics, contested policies on foreign credential and micro spaces of belongingin a multicultural context. The act of welcoming a newcomer is inherently shaped by both macropolitical structures and everyday relational practices that can lead to experiences of belonging, marginalisation, empowerment and/or disempowerment depending on economic agenda, humanitarian and humanistic orientations. We first explore the extent to which immigrants experience hospitality in relation to unequal distribution of power and resources as well as cultural discontinuities. We then examine ways in which immigrants have been able to find sanctuaries of hospitality within their own ethnocultural communities. Finally, we discuss the complexity of hospitality in a multicultural context and offer critical insights on host factors that may produce, develop and nurture hospitable environments.Keywords: migration, hospitality, diversity, culture, race
Procedia PDF Downloads 1243229 The Study of Difficulties of Understanding Idiomatic Expressions Encountered by Translators 2021
Authors: Mohamed Elmogbail
Abstract:
The present study aimed at investigating difficulties those Translators encounter in understanding idiomatic expressions between Arabic and English languages. To achieve this goal, the researcher raised the three questions are:(1) What are the major difficulties that translators encounter in translating idiomatic expressions? (2) What factors cause such difficulties that translators encountered in translating idiomatic expressions? (3) What are the possible techniques that should be followed to overcome these difficulties? To answer these questions, the researcher designed questionnaire Table (2) and mentioned tables related to Test Show the second question in the study is about the factors that stand behind the challenges. Translators encounter while translating idiomatic expressions. The translators asked Provided the following factors:1- Because of lack of exposure to the source culture, they do not know the connotations of the cultural words that are related to the environment, food, folklore 2- Misusing dictionaries made the participants unable to find a proper target language idiomatic expression. 3-Lack of using idiomatic expressions in daily life. Table (3): (Questionnaire) Results to the table (3) Questions Of the study are About suggestions that can be inferred to handle these challenges. The questioned translators provided the following solutions:1- translators must be exposed to source language culture, including religion, habits, and traditions.2- translators should also be exposed to source language idiomatic expressions by introducing English culture in textbooks and through participating in extensive English culture courses.3- translators should be familiar with the differences between source and target language cultures.4- translators should avoid literal translation that results in most cases in wrong or poor translation.5- Schools, universities, and institutions should introduce translators to English culture.6- translators should participate in cultural workshops at universities.7- translators should try to use idiomatic expressions in everyday situations.8- translators should read more idiomatic expressions books. And researcher also designed a translation test consisted of 40 excerpts given to a random sample of 100 Translators in Khartoum capital of Sudan to translate them. After Collected data for the study, the researcher proceeded to a more detailed analysis, the methodology used in the analysis of idiomatic expressions Is empirical and descriptive. This study is qualitative by nature, but the quantitative method used the analysis of the data. Some figure and statistics are used, such as (statistical package for the social sciences). The researcher calculated the percentage proportion of each translation expressions. And compared them to each other. The finding of the study showed that most translations are inadequate as the translators faced difficulties while communication, these difficulties were mostly due to their unfamiliarity with idiomatic expressions producing improper equivalence in the communication, and not being able to use translation techniques as required, and resorted to literal translation, furthermore, the study recommended that more comprehensive studies to executed on translating idiomatic expressions to enrich the translation field.Keywords: translation, translators, idioms., expressions
Procedia PDF Downloads 1473228 Capacity Building for Tourism Infrastructure: A Case of Tourism Influenced Regions in Uttar Pradesh, India
Authors: Sayan Munshi, Subrajit Banerjee, Indrani Chakraborty
Abstract:
Tourism is a prime sector in the economic development of many countries in particular the Indian sub-continent. Tourism is considered an integral pillar in the Make in India Program under the Government of India. The statistics of tourism in India had evolved from a past with the formation of History. The sector had shown dynamic changes in the statistics since 1980. With the evolving tourism along with destinations, this sector has been converted into the prime industry, as it not only impacts the destination but on the other hand supports the periphery of the destination. Tourism boost revenue and creates varied economic possibilities for the residents. Due to the influx of tourism in the cities, a load on the infrastructure and services can be observed, specifically in the Physical Infrastructure sectors. Due to the floating population in the designated tourism core of the Urban / Peri-Urban area, issues pertaining to Solid waste management and Transportation are highly observed. Thus, a need for capacity building arises for the infrastructure impacted by tourism, which may result in the upgradation of the lifestyle of the city and its permanent users. As tourism of a region has a dependency on the infrastructure, the paper here focuses on the relationship between tourism potential of a region and the infrastructural determinants of the city or region and hence to derive a structural equation supporting the relationship, further determine a coefficient and suggest the domain of in need of upgradation or retrofitting possibilities. The outcome of the paper is to suggest possible recommendations towards the formation of policies on an urban level to support the tourism potential of the region.Keywords: urban planning, tourism planning, infrastructure, transportation, solid waste management
Procedia PDF Downloads 1203227 Improving Waste Recycling and Resource Productivity by Integrating Smart Resource Tracking System
Authors: Atiq Zaman
Abstract:
The high contamination rate in the recycling waste stream is one of the major problems in Australia. In addition, a lack of reliable waste data makes it even more difficult for designing and implementing an effective waste management plan. This article conceptualizes the opportunity to improve resource productivity by integrating smart resource tracking system (SRTS) into the Australian household waste management system. The application of the smart resource tracking system will be implemented through the following ways: (i) mobile application-based resource tracking system used to measure the household’s material flow; (ii) RFID, smart image and weighing system used to track waste generation, recycling and contamination; (iii) informing and motivating manufacturer and retailers to improve their problematic products’ packaging; and (iv) ensure quality and reliable data through open-sourced cloud data for public use. The smart mobile application, imaging, radio-frequency identification (RFID) and weighing technologies are not new, but the very straightforward idea of using these technologies in the household resource consumption, waste bins and collection trucks will open up a new era of accurately measuring and effectively managing our waste. The idea will bring the most urgently needed reliable, data and clarity on household consumption, recycling behaviour and waste management practices in the context of available local infrastructure and policies. Therefore, the findings of this study would be very important for decision makers to improve resource productivity in the waste industry by using smart resource tracking system.Keywords: smart devices, mobile application, smart sensors, resource tracking, waste management, resource productivity
Procedia PDF Downloads 1443226 Criminal Justice System, Health and Imprisonment in India
Authors: Debolina Chatterjee, Suhita Chopra Chatterjee
Abstract:
Imprisonment is an expansive concept, as it is regulated by laws under criminal justice system of the state. The state sets principles of punishment to control offenders and also puts limits to excess punitive control. One significant way through which it exercises control is through rules governing healthcare of imprisoned population. Prisons signify specialized settings which accommodate both medical and legal concerns. The provision of care operates within the institutional paradigm of punishment. This requires the state to negotiate adequately between goals of punishment and fulfilment of basic human rights of offenders. The present study is based on a critical analysis of prison healthcare standards in India, which include government policies and guidelines. It also demonstrates how healthcare is delivered by drawing insights from a primary study conducted in a correctional home in the state of West Bengal, India, which houses both male and female inmates. Forty women were interviewed through semi-structured interviews, followed by focus group discussions. Doctors and administrative personnel were also interviewed. Findings show how institutional practices control women through subversion of the role of doctors to prison administration. Also, poor healthcare infrastructure, unavailability of specialized services, hierarchies between personnel and inmates make prisons unlikely sites for therapeutic intervention. The paper further discusses how institutional practices foster gender-based discriminatory practices.Keywords: imprisonment, Indian prisons, prison healthcare, punishment
Procedia PDF Downloads 2333225 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 2893224 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 153223 Combline Cavity Bandpass Filter Design and Implementation Using EM Simulation Tool
Authors: Taha Ahmed Özbey, Sedat Nazlıbilek, Alparslan Çağrı Yapıcı
Abstract:
Combline cavity filters have gained significant attention in recent years due to their exceptional narrowband characteristics, high unloaded Q, remarkable out-of-band rejection, and versatile post-manufacturing tuning capabilities. These filters play a vital role in various wireless communication systems, radar applications, and other advanced technologies where stringent frequency selectivity and superior performance are required. This paper represents combined cavity filter design and implementation by coupling matrix synthesis. Limited filter length, 50 dB out-of-band rejection, and agile design were aimed. To do so, CAD tools and intuitive methods were used.Keywords: cavity, band pass filter, cavity combline filter, coupling matrix synthesis
Procedia PDF Downloads 723222 Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa
Abstract:
Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household.Keywords: food security, home gardening, household, income
Procedia PDF Downloads 2253221 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1533220 Health Care Providers' Perceptions on mHealth Workplace Nutrition Wellness Program: A Thematic Analysis
Authors: Kim H. K. Choy, Oliva H. K. Chu, W. Y. Keung, B. Lim, Winnie P. Y. Tang
Abstract:
Background: Health care providers have been identified as an at-risk group for obesity. Mobile health technology can be used to motivate lifestyle behavioral changes. The aim of this study was to investigate hospital-based health care providers’ perceptions of mHealth Workplace Nutrition Wellness Program. Methods: This qualitative study was conducted at a regional hospital in Hong Kong. Ten health care providers were purposively selected for the study. Qualitative data was collected by individual face-to-face semi-structured interviews which were audio-taped, transcribed verbatim and analyzed by thematic analysis. Results: Four themes were identified: (1) mobile health technology motivates lifestyle changes, (2) self-perceived body weight initiates health behavioral changes, (3) organizational support promotes healthy behavior, (4) lack of self-confidence hinders lifestyle modification. The health care providers’ perceptions of mobile health technology, barriers, and facilitators to participation in the mHealth Workplace Nutrition Wellness Program were discussed in the study. Conclusions: Barriers, facilitators, self-perceived body weight and experiences of mobile health technology were associated with intention of participation in mHealth Workplace Nutrition Wellness Program. The knowledge generated from the study could be used to guide the design and implementation of effective interventions, strategies and policies of workplace wellness programs to promote participation for hospital’s employees.Keywords: workplace wellness program, mobile health, barriers, facilitators, qualitative
Procedia PDF Downloads 2593219 Omni-Relay (OR) Scheme-Aided LTE-A Communication Systems
Authors: Hassan Mahasneh, Abu Sesay
Abstract:
We propose the use of relay terminals at the cell edge of an LTE-based cellar system. Each relay terminal is equipped with an omni-directional antenna. We refer to this scheme as the Omni-Relay (OR) scheme. The OR scheme coordinates the inter-cell interference (ICI) stemming from adjacent cells and increases the desired signal level at cell-edge regions. To validate the performance of the OR scheme, we derive the average signal-to-interference plus noise ratio (SINR) and the average capacity and compare it with the conventional universal frequency reuse factor (UFRF). The results show that the proposed OR scheme provides higher average SINR and average capacity compared to the UFRF due to the assistance of the distributed relay nodes.Keywords: the UFRF scheme, the OR scheme, ICI, relay terminals, SINR, spectral efficiency
Procedia PDF Downloads 3413218 Towards Carbon-Free Communities: A Compilation of Urban Design Criteria for Sustainable Neighborhoods
Authors: Atefeh Kalantari
Abstract:
The increase in population and energy consumption has caused environmental crises such as the energy crisis, increased pollution, and climate change, all of which have resulted in a decline in the quality of life, especially in urban environments. Iran is one of the developing countries which faces several challenges concerning energy use and environmental sustainability such as air pollution, climate change, and energy security. On the other hand, due to its favorable geographic characteristics, Iran has diverse and accessible renewable sources, which provide appropriate substitutes to reduce dependence on fossil fuels. Sustainable development programs and post-carbon cities rely on implementing energy policies in different sectors of society, particularly, the built environment sector is one of the main ones responsible for energy consumption and carbon emissions for cities. Because of this, several advancements and programs are being implemented to promote energy efficiency for urban planning, and city experts, like others, are looking for solutions to deal with these problems. Among the solutions provided for this purpose, low-carbon design can be mentioned. Among the different scales, the neighborhood can be mentioned as a suitable scale for applying the principles and solutions of low-carbon urban design; Because the neighborhood as a "building unit of the city" includes elements and flows that all affect the number of CO2 emissions. The article aims to provide criteria for designing a low-carbon and carbon-free neighborhood through descriptive methods and secondary data analysis. The ultimate goal is to promote energy efficiency and create a more resilient and livable environment for local residents.Keywords: climate change, low-carbon urban design, carbon-free neighborhood, resilience
Procedia PDF Downloads 813217 Hybrid Heat Pump for Micro Heat Network
Authors: J. M. Counsell, Y. Khalid, M. J. Stewart
Abstract:
Achieving nearly zero carbon heating continues to be identified by UK government analysis as an important feature of any lowest cost pathway to reducing greenhouse gas emissions. Heat currently accounts for 48% of UK energy consumption and approximately one third of UK’s greenhouse gas emissions. Heat Networks are being promoted by UK investment policies as one means of supporting hybrid heat pump based solutions. To this effect the RISE (Renewable Integrated and Sustainable Electric) heating system project is investigating how an all-electric heating sourceshybrid configuration could play a key role in long-term decarbonisation of heat. For the purposes of this study, hybrid systems are defined as systems combining the technologies of an electric driven air source heat pump, electric powered thermal storage, a thermal vessel and micro-heat network as an integrated system. This hybrid strategy allows for the system to store up energy during periods of low electricity demand from the national grid, turning it into a dynamic supply of low cost heat which is utilized only when required. Currently a prototype of such a system is being tested in a modern house integrated with advanced controls and sensors. This paper presents the virtual performance analysis of the system and its design for a micro heat network with multiple dwelling units. The results show that the RISE system is controllable and can reduce carbon emissions whilst being competitive in running costs with a conventional gas boiler heating system.Keywords: gas boilers, heat pumps, hybrid heating and thermal storage, renewable integrated and sustainable electric
Procedia PDF Downloads 4193216 Islamisation and Actor Networking in Halal Tourism: A Case Study in Central Java, Indonesia
Authors: Hariyadi, Rili Windiasih
Abstract:
Halal tourism is a recent global phenomenon that emerged out of the needs of Muslim tourists. However, works on halal tourism rarely discuss the connection of it to the rising religiosity in Indonesia since halal tourism has been mostly studied in the sphere of tourism, business, and management studies. A few works on the increase of Islamic expressions in Indonesia do mention the recent booming of non-mandatory pilgrimage to Mecca and the emergence of sharia compliant accommodation, yet they do not go into details on the issue. To our best knowledge, there is a lack of more critical, cultural political studies on halal tourism in which the paper attempts to fill in. The paper is a result of fieldwork research in Central Java, Indonesia. The study focuses on sacred sites for pilgrimage and sharia-compliant hotels. It combines in-depth interviews and participatory observation methods to gather the data. It is important for us to take a look at the network of halal tourism actors (businessperson, local government, clerics, etc.) in Central Java, how they conceive halal tourism, and how their networking shape halal tourism discourses, policies, and practices. Despite having numerous Islamic pilgrimage places and being designated by the Ministry of Tourism as one of 12 Muslim friendly tourist destinations, the province is not yet widely recognised as the main destination for halal tourism as it is known as the place for more secular, nationalist groups rather than for more Islamic oriented ones. However, in some of its municipalities, there is increasingly more attention to develop halal tourism. In this study, we found out that the development of halal tourism in Central Java connected to dynamics of Islamisation and ideological competition as well as the influence of the more pragmatist businesspersons in a 'nationalist province' in Indonesia.Keywords: actor networking, halal tourism, Islamisation, Indonesia
Procedia PDF Downloads 1693215 The Communication of Audit Report: Key Audit Matters in United Kingdom
Authors: L. Sierra, N. Gambetta, M. A. Garcia-Benau, M. Orta
Abstract:
Financial scandals and financial crisis have led to an international debate on the value of auditing. In recent years there have been significant legislative reforms aiming to increase markets’ confidence in audit services. In particular, there has been a significant debate on the need to improve the communication of auditors with audit reports users as a way to improve its informative value and thus, to improve audit quality. The International Auditing and Assurance Standards Board (IAASB) has proposed changes to the audit report standards. The International Standard on Auditing 701, Communicating Key Audit Matters (KAM) in the Independent Auditor's Report, has introduced new concepts that go beyond the auditor's opinion and requires to disclose the risks that, from the auditor's point of view, are more significant in the audited company information. Focusing on the companies included in the Financial Times Stock Exchange 100 index, this study aims to focus on the analysis of the determinants of the number of KAM disclosed by the auditor in the audit report and moreover, the analysis of the determinants of the different type of KAM reported during the period 2013-2015. To test the hypotheses in the empirical research, two different models have been used. The first one is a linear regression model to identify the client’s characteristics, industry sector and auditor’s characteristics that are related to the number of KAM disclosed in the audit report. Secondly, a logistic regression model is used to identify the determinants of the number of each KAM type disclosed in the audit report; in line with the risk-based approach to auditing financial statements, we categorized the KAM in 2 groups: Entity-level KAM and Accounting-level KAM. Regarding the auditor’s characteristics impact on the KAM disclosure, the results show that PwC tends to report a larger number of KAM while KPMG tends to report less KAM in the audit report. Further, PwC reports a larger number of entity-level risk KAM while KPMG reports less account-level risk KAM. The results also show that companies paying higher fees tend to have more entity-level risk KAM and less account-level risk KAM. The materiality level is positively related to the number of account-level risk KAM. Additionally, these study results show that the relationship between client’s characteristics and number of KAM is more evident in account-level risk KAM than in entity-level risk KAM. A highly leveraged company carries a great deal of risk, but due to this, they are usually subject to strong capital providers monitoring resulting in less account-level risk KAM. The results reveal that the number of account-level risk KAM is strongly related to the industry sector in which the company operates assets. This study helps to understand the UK audit market, provides information to auditors and finally, it opens new research avenues in the academia.Keywords: FTSE 100, IAS 701, key audit matters, auditor’s characteristics, client’s characteristics
Procedia PDF Downloads 2313214 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 313213 Non-Contact Digital Music Instrument Using Light Sensing Technology
Authors: Aishwarya Ravichandra, Kirtana Kirtivasan, Adithi Mahesh, Ashwini S.Savanth
Abstract:
A Non-Contact Digital Music System has been conceptualized and implemented to create a new era of digital music. This system replaces the strings of a traditional stringed instrument with laser beams to avoid bruising of the user’s hand. The system consists of seven laser modules, detector modules and distance sensors that form the basic hardware blocks of this instrument. Arduino ATmega2560 microcontroller is used as the primary interface between the hardware and the software. MIDI (Musical Instrument Digital Interface) is used as the protocol to establish communication between the instrument and the virtual synthesizer software.Keywords: Arduino, detector, laser, MIDI, note on, note off, pitch bend, Sharp IR distance sensor
Procedia PDF Downloads 4073212 Infection Control Drill: To Assess the Readiness and Preparedness of Staffs in Managing Suspected Ebola Patients in Tan Tock Seng Hospital Emergency Department
Authors: Le Jiang, Chua Jinxing
Abstract:
Introduction: The recent outbreak of Ebola virus disease in the west Africa has drawn global concern. With a high fatality rate and direct human-to-human transmission, it has spread between countries and caused great damages for patients and family who are affected. Being the designated hospital to manage epidemic outbreak in Singapore, Tan Tock Seng Hospital (TTSH) is facing great challenges in preparation and managing of potential outbreak of emerging infectious disease such as Ebola virus disease. Aim: We conducted an infection control drill in TTSH emergency department to assess the readiness of healthcare and allied health workers in managing suspected Ebola patients. It also helps to review current Ebola clinical protocol and work instruction to ensure more smooth and safe practice in managing Ebola patients in TTSH emergency department. Result: General preparedness level of staffs involved in managing Ebola virus disease in TTSH emergency department is not adequate. Knowledge deficits of staffs on Ebola personal protective equipment gowning and degowning process increase the risk of potential cross contamination in patient care. Loopholes are also found in current clinical protocol, such as unclear instructions and inaccurate information, which need to be revised to promote better staff performance in patient management. Logistic issues such as equipment dysfunction and inadequate supplies can lead to ineffective communication among teams and causing harm to patients in emergency situation. Conclusion: The infection control drill identified the need for more well-structured and clear clinical protocols to be in place to promote participants performance. In addition to quality protocols and guidelines, systemic training and annual refresher for all staffs in the emergency department are essential to prepare staffs for the outbreak of Ebola virus disease. Collaboration and communication with allied health staffs are also crucial for smooth delivery of patient care and minimising the potential human suffering, properties loss or injuries caused by disease. Therefore, more clinical drills with collaboration among various departments involved are recommended to be conducted in the future to monitor and assess readiness of TTSH emergency department in managing Ebola virus disease.Keywords: ebola, emergency department, infection control drill, Tan Tock Seng Hospital
Procedia PDF Downloads 1213211 Hosoya Polynomials of Mycielskian Graphs
Authors: Sanju Vaidya, Aihua Li
Abstract:
Vulnerability measures and topological indices are crucial in solving various problems such as the stability of the communication networks and development of mathematical models for chemical compounds. In 1947, Harry Wiener introduced a topological index related to molecular branching. Now there are more than 100 topological indices for graphs. For example, Hosoya polynomials (also called Wiener polynomials) were introduced to derive formulas for certain vulnerability measures and topological indices for various graphs. In this paper, we will find a relation between the Hosoya polynomials of any graph and its Mycielskian graph. Additionally, using this we will compute vulnerability measures, closeness and betweenness centrality, and extended Wiener indices. It is fascinating to see how Hosoya polynomials are useful in the two diverse fields, cybersecurity and chemistry.Keywords: hosoya polynomial, mycielskian graph, graph vulnerability measure, topological index
Procedia PDF Downloads 69