Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6008

Search results for: security service

2828 Role of Corporate Social Responsibility in Corporate Governance: Effectiveness of CSR in Human Rights

Authors: Md. Awal Hossain Mollah

Abstract:

Corporate governance is playing a crucial role for ensuring social accountability and responsibility of business organization through Corporate Social Responsibility (CSR) for the last two decades. In Bangladesh, CSR is a growing and popular concept and a recent development. Various business and corporate organizations are playing crucial role for helping vulnerable sections of our society now. For instance, Dutch Bangla Bank has been providing scholarship for under graduate and graduate students in our country which is very helpful for promoting poor and meritorious students in Bangladesh. In this study, how far CSR is playing its role for ensuring human right in Bangladesh will be examined with specific case studies. The study focus will reflect on both developed and developing nations based on literature review and possible empirical evidence.

Keywords: CSR, corporate governance, social security, Bangladesh, scholarships, graduate students, Dutch angla Bank

Procedia PDF Downloads 341
2827 Petri Net Modeling and Simulation of a Call-Taxi System

Authors: T. Godwin

Abstract:

A call-taxi system is a type of taxi service where a taxi could be requested through a phone call or mobile app. A schematic functioning of a call-taxi system is modeled using Petri net, which provides the necessary conditions for a taxi to be assigned by a dispatcher to pick a customer as well as the conditions for the taxi to be released by the customer. A Petri net is a graphical modeling tool used to understand sequences, concurrences, and confluences of activities in the working of discrete event systems. It uses tokens on a directed bipartite multi-graph to simulate the activities of a system. The Petri net model is translated into a simulation model and a call-taxi system is simulated. The simulation model helps in evaluating the operation of a call-taxi system based on the fleet size as well as the operating policies for call-taxi assignment and empty call-taxi repositioning. The developed Petri net based simulation model can be used to decide the fleet size as well as the call-taxi assignment policies for a call-taxi system.

Keywords: call-taxi, discrete event system, petri net, simulation modeling

Procedia PDF Downloads 406
2826 Engineering Practice in Nigerian University: A Microcosm of Engineering Development and Practice in Developing Countries

Authors: Sunday Olufemi Adesogan

Abstract:

There is a strong link between engineering and development. Engineering as a profession is a call to service by the society. Perhaps next to soldiers, engineers are the most patriotic professionals. However, unlike soldiers, they remain servants of society at all times and in all circumstances. Despite their role to the society, engineering profession seems not to be enjoying the respect due to it probably because of failures associated with some engineering projects. This paper focuses on the need to improve on engineering practices for developments in developing countries using Engineering practice in Nigerian Universities as a tool for argument. Purposeful Survey, interview and focus group discussion were carried out among one hundred and twenty (120) reputable firms in Nigeria. The topic was approached through a few projects that the firms have been involved in from the planning stage, some to completion and beyond into the stage of maintenance and monitoring. It is revealed that some factors which are not determined by the engineers themselves impeded progress and full success of engineering practice in developing countries. The key culprit is corruption whose eradication will put the nation on the solid path of effective engineering development and poverty alleviation.

Keywords: development, engineering, practices, sustainable

Procedia PDF Downloads 313
2825 Quantifying Freeway Capacity Reductions by Rainfall Intensities Based on Stochastic Nature of Flow Breakdown

Authors: Hoyoung Lee, Dong-Kyu Kim, Seung-Young Kho, R. Eddie Wilson

Abstract:

This study quantifies a decrement in freeway capacity during rainfall. Traffic and rainfall data were gathered from Highway Agencies and Wunderground weather service. Three inter-urban freeway sections and its nearest weather stations were selected as experimental sites. Capacity analysis found reductions of maximum and mean pre-breakdown flow rates due to rainfall. The Kruskal-Wallis test also provided some evidence to suggest that the variance in the pre-breakdown flow rate is statistically insignificant. Potential application of this study lies in the operation of real time traffic management schemes such as Variable Speed Limits (VSL), Hard Shoulder Running (HSR), and Ramp Metering System (RMS), where speed or flow limits could be set based on a number of factors, including rainfall events and their intensities.

Keywords: capacity randomness, flow breakdown, freeway capacity, rainfall

Procedia PDF Downloads 364
2824 The Modern Paradigm Features of Social Management Based on Postindustrial Theory

Authors: Yulia Totskaya

Abstract:

Nowadays, society is in a postindustrial/informational phase of its development. Certain changes have occurred in different parts of society life as a result of the social reality transformations due to the influence of changes in the productive forces. As a result, the personality has received autonomy and independence, as in her or his hands appeared new means of production–information, knowledge, creativity. In such a society, there is a new middle class, which is called meritocratic. It consists of personalities, who are engaged in highly intelligent, creative work; who independently pursue their own well-being and status; who are active in the economic and social spheres. At the forefront there are such qualities as independence, commitment and self-actualization. This modern, intellectual and sovereign personality is no longer in need of care. The role of management has transformed from a paternalistic to the "service", which is aimed at creating the conditions for citizens’ self-realization to meet their needs through the rendering of public services. Such society alterations motivate the need to change the key parameters of social management, which are identified in this article on the basis of the postindustrial society key features.

Keywords: informational society, postindustrial society, postindustrial sociality, public services, social management

Procedia PDF Downloads 257
2823 Exploring Pisa Monuments Using Mobile Augmented Reality

Authors: Mihai Duguleana, Florin Girbacia, Cristian Postelnicu, Raffaello Brodi, Marcello Carrozzino

Abstract:

Augmented Reality (AR) has taken a big leap with the introduction of mobile applications which co-locate bi-dimensional (e.g. photo, video, text) and tridimensional information with the location of the user enriching his/her experience. This study presents the advantages of using Mobile Augmented Reality (MAR) technologies in traveling applications, improving cultural heritage exploration. We propose a location-based AR application which combines co-location with the augmented visual information about Pisa monuments to establish a friendly navigation in this historic city. AR was used to render contextual visual information in the outdoor environment. The developed Android-based application offers two different options: it provides the ability to identify the monuments positioned close to the user’s position and it offers location information for getting near the key touristic objectives. We present the process of creating the monuments’ 3D map database and the navigation algorithm.

Keywords: augmented reality, electronic compass, GPS, location-based service

Procedia PDF Downloads 266
2822 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 478
2821 Financial Portfolio Optimization in Turkish Electricity Market via Value at Risk

Authors: F. Gökgöz, M. E. Atmaca

Abstract:

Electricity has an indispensable role in human daily life, technological development and economy. It is a special product or service that should be instantaneously generated and consumed. Sources of the world are limited so that effective and efficient use of them is very important not only for human life and environment but also for technological and economic development. Competitive electricity market is one of the important way that provides suitable platform for effective and efficient use of electricity. Besides benefits, it brings along some risks that should be carefully managed by a market player like Electricity Generation Company. Risk management is an essential part in market players’ decision making. In this paper, risk management through diversification is applied with the help of Value at Risk methods for case studies. Performance of optimal electricity sale solutions are measured and the portfolio performance has been evaluated via Sharpe-Ratio, and compared with conventional approach. Biennial historical electricity price data of Turkish Day Ahead Market are used to demonstrate the approach.

Keywords: electricity market, portfolio optimization, risk management, value at risk

Procedia PDF Downloads 295
2820 The Influence of Learning Styles on Learners Grade Achievement in E-Learning Environments: An Empirical Study

Authors: Thomas Yeboah, Gifty Akouko Sarpong

Abstract:

Every learner has a specific learning style that helps him/her to study best. This means that any learning method (e-learning method or traditional face-to-face method) a learner chooses should address the learning style of the learner. Therefore, the main purpose of this research is to investigate whether learners’ grade achievement in e-learning environment is improved for learners with a particular learning style. In this research, purposive sampling technique was employed for selecting the sample size of three hundred and twenty (320) students studying a course UGRC 140 Science and Technology in our Lives at Christian Service University College. Data were analyzed by using, percentages, T -test, and one-way ANOVA. A thorough analysis was done on the data collected and the results revealed that learners with the Assimilator learning style and the converger learning style obtained higher grade achievement than both diverger learning style and accommodative learning style. Again, the results also revealed that accommodative learning style was not good enough for e-learning method.

Keywords: e-learning, learning style, grade achievement, accomodative, divergent, convergent, assimilative

Procedia PDF Downloads 413
2819 The Contribution of Woman Towards Social Development: A Case of Saudi Arabia

Authors: Haga Elimam

Abstract:

The study has contributed to determine the degree to which the women of Saudi Arabia play an imperative role in the developmental processes. This research provided a twofold objective to motivate Saudi females to take part in the development of society. The quantitative design has been implied for assessing outcomes through descriptive statistics techniques. The data has been analyzed by regression analysis. The outcomes of the study showed that when women were provided with health and educational necessities and adequate opportunities, they were able to contribute effectively in achieving desired developmental objectives for the nation. Saudi women constitute approximately half of the society; thus, they are equally provided health and justice rights. It has been concluded through the results of the study that the nature of Saudi society, customs, traditions, and beliefs affect the role played by women of Saudi Arabia. This study examines the tangible changes that comprised all aspects of life due to international exposure.

Keywords: social development, social service, sustainable development, civil society and educational sector

Procedia PDF Downloads 115
2818 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 32
2817 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation

Authors: Y. Atilgan Şengül

Abstract:

Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.

Keywords: healthcare, health informatics, medical record system, questionnaire

Procedia PDF Downloads 156
2816 Human Rights Impact on Citizens Evolution

Authors: Joseph Marzouk Gerais Abdelmalak

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 49
2815 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 122
2814 A Hybrid ICA-GA Algorithm for Solving Multiobjective Optimization of Production Planning Problems

Authors: Omar Ramzi Jasim, Jalal Sultan Ashour

Abstract:

Production Planning or Master Production Schedule (MPS) is a key interface between marketing and manufacturing, since it links customer service directly to efficient use of production resources. Mismanagement of the MPS is considered as one of fundamental problems in operation and it can potentially lead to poor customer satisfaction. In this paper, a hybrid evolutionary algorithm (ICA-GA) is presented, which integrates the merits of both imperialist competitive algorithm (ICA) and genetic algorithm (GA) for solving multi-objective MPS problems. In the presented algorithm, the colonies in each empire has be represented a small population and communicate with each other using genetic operators. By testing on 5 production scenarios, the numerical results of ICA-GA algorithm show the efficiency and capabilities of the hybrid algorithm in finding the optimum solutions. The ICA-GA solutions yield the lower inventory level and keep customer satisfaction high and the required overtime is also lower, compared with results of GA and SA in all production scenarios.

Keywords: master production scheduling, genetic algorithm, imperialist competitive algorithm, hybrid algorithm

Procedia PDF Downloads 451
2813 Inverter IGBT Open–Circuit Fault Detection Using Park's Vectors Enhanced by Polar Coordinates

Authors: Bendiabdellah Azzeddine, Cherif Bilal Djamal Eddine

Abstract:

The three-phase power converter voltage structure is widely used in many power applications but its failure can lead to partial or total loss of control of the phase currents and can cause serious system malfunctions or even a complete system shutdown. To ensure continuity of service in all circumstances, effective and rapid techniques of detection and location of inverter fault is to be implemented. The present paper is dedicated to open-circuit fault detection in a three-phase two-level inverter fed induction motor. For detection purpose, the proposed contribution addresses the Park’s current vectors associated to a polar coordinates calculation tool to compute the exact value of the fault angle corresponding directly to the faulty IGBT switch. The merit of the proposed contribution is illustrated by experimental results.

Keywords: diagnosis, detection, Park’s vectors, polar coordinates, open-circuit fault, inverter, IGBT switch

Procedia PDF Downloads 382
2812 Political Determinants of Sovereign Spread: The Great East-West Divide

Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic

Abstract:

We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.

Keywords: sovereign bonds, European Union, developing countries, political determinants

Procedia PDF Downloads 293
2811 Transformative Economic Policies in India: A Political Economy Analysis of IMF Influence, Sectoral Shifts, and Political Transitions

Authors: Vrajesh Rawal

Abstract:

India's economic landscape has witnessed significant transformations over the past decades, characterized by shifts from agrarian to service-oriented economies. Recently, there has been a growing emphasis on transitioning towards a manufacturing-led growth model driven by factors such as demographic changes, technological advancements, and evolving global trade dynamics. These changes reflect broader efforts to enhance industrialization, boost employment opportunities, and diversify the economic base beyond traditional sectors. Within this context, this research focuses on understanding the specific drivers and dynamics behind India's shift from a predominantly service-based economy to one centered on manufacturing. It seeks to explore how political ideologies influence economic policies and shape sectoral priorities, with a particular focus on contrasting approaches between the Indian National Congress (INC) and the Bharatiya Janata Party (BJP). Additionally, the study evaluates the alignment of IMF policy recommendations with India's economic goals and priorities within the theoretical frameworks of neoliberalism and political economy theory. Despite the extensive literature on India's economic reforms and political economy, there remains a gap in understanding how political ideology influences sectoral shifts and economic policy outcomes, particularly in the context of IMF recommendations. Existing studies often focus narrowly on either political ideologies or economic reforms without fully integrating both perspectives. This research aims to bridge this gap by providing a comprehensive analysis that integrates political economy theories with empirical evidence from political speeches, government documents, and IMF reports. Through qualitative content analysis of speeches by political leaders, document analysis of key governmental documents, and scrutiny of party manifestos, this research demonstrates how political ideologies translate into distinct economic strategies and developmental agendas. It highlights the extent to which IMF policy prescriptions align with India's economic objectives and how these interactions shape broader socio-economic outcomes. The theoretical framework of neoliberalism and political economy theory provides a lens to interpret these findings, offering insights into the complex interplay between economic policies, political ideologies, and institutional frameworks in India. The findings of this study are expected to provide valuable insights for policymakers, researchers, and practitioners involved in economic governance and development planning in India. By understanding the factors driving sectoral shifts and the influence of political ideologies on economic policies, policymakers can make informed decisions to foster sustainable economic growth and development. Implementation of these insights could contribute to refining policy frameworks, enhancing alignment with national development priorities, and optimizing engagement with international financial institutions like the IMF to better meet India's socio-economic challenges and opportunities in the evolving global context.

Keywords: political economy, international politics, social science, policy analysis

Procedia PDF Downloads 8
2810 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 13
2809 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 44
2808 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 398
2807 Government Intervention Strategies in Providing Water to Rural Communities in the O R Tambo District Municipality, South Africa

Authors: Cecilia Kunseh Betek

Abstract:

Managing rural water supply systems effectively and efficiently is a challenge in the O R Tambo District Municipality due to the long distances between consumers and municipal centres. This is a couple with the low income of most residents and the government's policy of free basic water which is making rural water provision very difficult. With regard to cartage, the results reveal that the majority (84.4%) of the population covers distances of about 1kilometre to fetch water, and 15.6% travel up kilometer to access water facilities. This means that the water sources are located very far from households, outside the officially legislated array of 200metres. These are many reasons to account for this situation. Firstly, this implies that there are inadequate stand pipes to cater for all the homesteads scattered across the rugged terrain of OR Tambo District municipality. Secondly, and following from the first explanation, it would be seen that funding that is made available is not adequate, or is not efficiently spent on the targeted projects. The situation in the rural areas of South Africa is fraught with cumbersome complexity when it comes to service delivery.

Keywords: water, management, government, rural

Procedia PDF Downloads 266
2806 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria

Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria

Abstract:

The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.

Keywords: dental surgeon, medical devices, sterilization, survey

Procedia PDF Downloads 384
2805 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 485
2804 Introduction of Acute Paediatric Services in Primary Care: Evaluating the Impact on GP Education

Authors: Salman Imran, Chris Healey

Abstract:

Traditionally, medical care of children in England and Wales starts from primary care with a referral to secondary care paediatricians who may not investigate further. Many primary care doctors do not undergo a paediatric rotation/exposure in training. As a result, there are many who have not acquired the necessary skills to manage children hence increasing hospital referral. With the current demand on hospitals in the National Health Service managing more problems in the community is needed. One way of handling this is to set up clinics, meetings and huddles in GP surgeries where professionals involved (general practitioner, paediatrician, health visitor, community nurse, dietician, school nurse) come together and share information which can help improve communication and care. The increased awareness and education that paediatricians can impart in this way will help boost confidence for primary care professionals to be able to be more self-sufficient. This has been tried successfully in other regions e.g., St. Mary’s Hospital in London but is crucial for a more rural setting like ours. The primary aim of this project would be to educate specifically GP’s and generally all other health professionals involved. Additional benefits would be providing care nearer home, increasing patient’s confidence in their local surgery, improving communication and reducing unnecessary patient flow to already stretched hospital resources. Methods: This was done as a plan do study act cycle (PDSA). Three clinics were delivered in different practices over six months where feedback from staff and patients was collected. Designated time for teaching/discussion was used which involved some cases from the actual clinics. Both new and follow up patients were included. Two clinics were conducted by a paediatrician and nurse whilst the 3rd involved paediatrician and local doctor. The distance from hospital to clinics varied from two miles to 22 miles approximately. All equipment used was provided by primary care. Results: A total of 30 patients were seen. All patients found the location convenient as it was nearer than the hospital. 70-90% clearly understood the reason for a change in venue. 95% agreed to the importance of their local doctor being involved in their care. 20% needed to be seen in the hospital for further investigations. Patients felt this to be a more personalised, in-depth, friendly and polite experience. Local physicians felt this to be a more relaxed, familiar and local experience for their patients and they managed to get immediate feedback regarding their own clinical management. 90% felt they gained important learning from the discussion time and the paediatrician also learned about their understanding and gaps in knowledge/focus areas. 80% felt this time was valuable for targeted learning. Equipment, information technology, and office space could be improved for the smooth running of any future clinics. Conclusion: The acute paediatric outpatient clinic can be successfully established in primary care facilities. Careful patient selection and adequate facilities are important. We have demonstrated a further step in the reduction of patient flow to hospitals and upskilling primary care health professionals. This service is expected to become more efficient with experience.

Keywords: clinics, education, paediatricians, primary care

Procedia PDF Downloads 149
2803 Interior Designing Suggestions and Guidelines for Dementia Patients in Taiwan for Their Wellbeing

Authors: Rina Yadav, Lih-Yau Song

Abstract:

The claim for elderly care center has increased enormously with the world demographic revolution as the number of senior citizens increased in the 21st century. As per the world progress into contemporaneousness, a large number of people are engaged in daily routine to bring about the senior citizens to lose the care that they in fact need. New design suggestions have been made on the basis of available guidelines and two case studies in Taiwan. Interior design can provide positive and sensory stimulation through memory stimulation, and by creating a friendly and comfortable environment for demented older people, which can reduce patient anxiety and reduce stress on caregivers. This report pursues to reveal the better design of an elderly care center with a new tactic in a direction to offer better service for demented elderly people which could upraise their living standard.

Keywords: daycare center, dementia patients, interior designing, older adults

Procedia PDF Downloads 234
2802 Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations

Authors: Mark A. Spooner

Abstract:

The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research.

Keywords: digital forensics, forensic examination, small device, trends

Procedia PDF Downloads 181
2801 Customer Satisfaction and Retention Strategies in Marketing

Authors: Hassan Adedoyin Rasaq

Abstract:

The marketing efforts of the present day business is not just geared towards meeting the consumer’s needs at a price, but ensuring good customer satisfaction, and strategizing on how to retain such customers. Customer satisfaction and retention is achievable through the co-ordination of the marketing mixes; Product, Price, Promotion and Place; Relationship Marketing; After-Sales Service; Rebates/Discounts/Price reduction policy and Total Quality Management (TQM). A first-hand customer, If well satisfied, will become a company’s repeat customer, proceeds to become a client and goes further to become an advocate of the company by applauding the company’s products/services and encouraging others to buy from it. It is the objective of this paper, therefore, to guide business organizations on how to enhance customer satisfaction, and retain existing customers as a means of long-term survival in marketing. The responses of 72 randomly selected Marketing personnel spread across three (3) food and beverage companies in Nigeria were analyzed. One hypothesis was tested using a one-way analysis of variance (ANOVA) statistical tool, and it was discovered that Relationship marketing contributed to organizational profitability and growth.

Keywords: customer satisfaction, retention strategies, marketing, marketing mixes

Procedia PDF Downloads 524
2800 Maximizing Coverage with Mobile Crime Cameras in a Stochastic Spatiotemporal Bipartite Network

Authors: (Ted) Edward Holmberg, Mahdi Abdelguerfi, Elias Ioup

Abstract:

This research details a coverage measure for evaluating the effectiveness of observer node placements in a spatial bipartite network. This coverage measure can be used to optimize the configuration of stationary or mobile spatially oriented observer nodes, or a hybrid of the two, over time in order to fully utilize their capabilities. To demonstrate the practical application of this approach, we construct a SpatioTemporal Bipartite Network (STBN) using real-time crime center (RTCC) camera nodes and NOPD calls for service (CFS) event nodes from New Orleans, La (NOLA). We use the coverage measure to identify optimal placements for moving mobile RTCC camera vans to improve coverage of vulnerable areas based on temporal patterns.

Keywords: coverage measure, mobile node dynamics, Monte Carlo simulation, observer nodes, observable nodes, spatiotemporal bipartite knowledge graph, temporal spatial analysis

Procedia PDF Downloads 82
2799 MCDM Spectrum Handover Models for Cognitive Wireless Networks

Authors: Cesar Hernández, Diego Giral, Fernando Santa

Abstract:

The spectral handoff is important in cognitive wireless networks to ensure an adequate quality of service and performance for secondary user communications. This work proposes a benchmarking of performance of the three spectrum handoff models: VIKOR, SAW and MEW. Four evaluation metrics are used. These metrics are, accumulative average of failed handoffs, accumulative average of handoffs performed, accumulative average of transmission bandwidth and, accumulative average of the transmission delay. As a difference with related work, the performance of the three spectrum handoff models was validated with captured data of spectral occupancy in experiments realized at the GSM frequency band (824 MHz-849 MHz). These data represent the actual behavior of the licensed users for this wireless frequency band. The results of the comparative show that VIKOR Algorithm provides 15.8% performance improvement compared to a SAW Algorithm and, 12.1% better than the MEW Algorithm.

Keywords: cognitive radio, decision making, MEW, SAW, spectrum handoff, VIKOR

Procedia PDF Downloads 414