Search results for: government data
24293 Environmental Education and Climate Change Resilience Development in Schools of Pakistan
Authors: Mehak Masood
Abstract:
Education is critical for promoting sustainable development and improving the capacity of people to address environment and development issues. It is also critical for achieving environmental and ethical awareness, values and attitudes, skills and behaviour consistent with sustainable development and for effective public participation in decision-making. In this regard, The British Council Pakistan have conducted a need assessment study conducted during the training sessions with three different groups of educationists belonging to both government and public sectors on the topic of Climate Change and Environmental Education (CCEE). This study aims to review perceptions about climate change and environmental education and analyze its need and importance according to educationists of Pakistan.Keywords: environmental education, climate change, resilience development, awareness
Procedia PDF Downloads 42324292 [Keynote Speech]: Feature Selection and Predictive Modeling of Housing Data Using Random Forest
Authors: Bharatendra Rai
Abstract:
Predictive data analysis and modeling involving machine learning techniques become challenging in presence of too many explanatory variables or features. Presence of too many features in machine learning is known to not only cause algorithms to slow down, but they can also lead to decrease in model prediction accuracy. This study involves housing dataset with 79 quantitative and qualitative features that describe various aspects people consider while buying a new house. Boruta algorithm that supports feature selection using a wrapper approach build around random forest is used in this study. This feature selection process leads to 49 confirmed features which are then used for developing predictive random forest models. The study also explores five different data partitioning ratios and their impact on model accuracy are captured using coefficient of determination (r-square) and root mean square error (rsme).Keywords: housing data, feature selection, random forest, Boruta algorithm, root mean square error
Procedia PDF Downloads 32324291 Labor Welfare and Social Security
Authors: Shoaib Alvi
Abstract:
Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.Keywords: labor welfare, internal social responsibility, social security, international conventions
Procedia PDF Downloads 57624290 Corporate Governance in India: A Critical Analysis with Respect to Financial Market Crisis
Authors: Sonal Purohit, Animesh Dubey
Abstract:
Corporate governance deals with the entire network of formal and informal relationship with the management of the company and company’s stakeholders including employees, customers, creditors, local communities, and society in general. The recent financial crisis was truly a global crisis in its nature and effects. The Indian financial markets were not immune to this global financial crisis. It is believed that corporate governance also had a major role to play in staggering the effect of this crisis. The objective of this paper is to examine the failure of prevailing corporate governance practice in India during financial crisis. Lack of appropriate implementation of the corporate government norms was a reason behind the phenomenon of money being pulled-out by FIIs, which constitute major investors and influencers of the Indian financial market.Keywords: corporate governance, FII, financial market, financial crisis
Procedia PDF Downloads 47824289 Image-Based (RBG) Technique for Estimating Phosphorus Levels of Different Crops
Authors: M. M. Ali, Ahmed Al- Ani, Derek Eamus, Daniel K. Y. Tan
Abstract:
In this glasshouse study, we developed the new image-based non-destructive technique for detecting leaf P status of different crops such as cotton, tomato and lettuce. Plants were allowed to grow on nutrient media containing different P concentrations, i.e. 0%, 50% and 100% of recommended P concentration (P0 = no P, L; P1 = 2.5 mL 10 L-1 of P and P2 = 5 mL 10 L-1 of P as NaH2PO4). After 10 weeks of growth, plants were harvested and data on leaf P contents were collected using the standard destructive laboratory method and at the same time leaf images were collected by a handheld crop image sensor. We calculated leaf area, leaf perimeter and RGB (red, green and blue) values of these images. This data was further used in the linear discriminant analysis (LDA) to estimate leaf P contents, which successfully classified these plants on the basis of leaf P contents. The data indicated that P deficiency in crop plants can be predicted using the image and morphological data. Our proposed non-destructive imaging method is precise in estimating P requirements of different crop species.Keywords: image-based techniques, leaf area, leaf P contents, linear discriminant analysis
Procedia PDF Downloads 38224288 Analyzing Land use change and its impacts on the Urban Environment in a Fast Growing Metropolitan City of Pakistan
Authors: Muhammad Nasar-u-Minallah, Dagmar Haase, Salman Qureshi
Abstract:
In a rapidly growing developing country cities are becoming more urbanized leading to modifications in urban climate. Rapid urbanization, especially unplanned urban land expansion, together with climate change has a profound impact on the urban settlement and urban thermal environment. Cities, particularly Pakistan are facing remarkably environmental issues and uneven development, and thus it is important to strengthen the investigation of urban environmental pressure brought by land-use changes and urbanization. The present study investigated the long term modification of the urban environment by urbanization utilizing Spatio-temporal dynamics of land-use change, urban population data, urban heat islands, monthly maximum, and minimum temperature of thirty years, multi remote sensing imageries, and spectral indices such as Normalized Difference Built-up Index and Normalized Difference Vegetation Index. The results indicate rapid growth in an urban built-up area and a reduction in vegetation cover in the last three decades (1990-2020). A positive correlation between urban heat islands and Normalized Difference Built-up Index, whereas a negative correlation between urban heat islands and the Normalized Difference Vegetation Index clearly shows how urbanization is affecting the local environment. The increase in air and land surface temperature temperatures is dangerous to human comfort. Practical approaches, such as increasing the urban green spaces and proper planning of the cities, have been suggested to help prevent further modification of the urban thermal environment by urbanization. The findings of this work are thus important for multi-sectorial use in the cities of Pakistan. By taking into consideration these results, the urban planners, decision-makers, and local government can make different policies to mitigate the urban land use impacts on the urban thermal environment in Pakistan.Keywords: land use, urban environment, local climate, Lahore
Procedia PDF Downloads 11124287 Contraceptive Uptake among Women in Low Socio-Economic Areas in Kenya: Quantitative Analysis of Secondary Data
Authors: J. Waita, S. Wamuhu, J. Makoyo, M. Rachel, T. Ngangari, W. Christine, M. Zipporah
Abstract:
Contraceptive use is one of the key global strategies to alleviate maternal mortality. Global efforts through advocating for contraceptive uptake and service provision has led improved contraceptive prevalence. In Kenya maternal mortality rate has remained a challenged despites efforts by government and non-governmental organizations. Objective: To describe the uptake of contraceptives among women in Tunza Clinics, Kenya. Design and Methods: Ps Kenya through health care marketing fund is implementing a family planning program among its 350 Tunza fractional franchise facilities. Through private partnership, private owned facilities in low socio-economic areas are recruited and trained on contraceptive technology update. The providers are supported through facilitative supervision through a mobile based application Health Network Quality Improvement System (HNQIS) and interpersonal communication through 150 community based volunteers. The data analyzed in this paper was collected between January to July 2017 to show the uptake of modern Contraceptives among women in the Tunza franchise, method mix, age and distribution among the age bracket. Further analysis compares two different service delivery strategies; outreach and walk ins. Supportive supervision HNQIS scores was analyzed. Results: During the time period, a total of 132121 family planning clients were attended in 350 facilities. The average age of clients was 29.6 years. The average number of clients attended in the facilities per month was 18874. 73.7 %( n=132121) of the clients attended in the Tunza facilities were aged above 25 years while 22.1% 20-24 years and 4.2% 15-19 years. On contraceptive method mix, intra uterine device insertions clients contributed to 7.5%, implant insertions 15.3%, pills 11.2%, injections 62.7% while condoms and emergency pills had 2.7% and 0.6% respectively. Analysis of service delivery strategy indicated more than 79% of the clients were walk ins while 21% were attended to during outreaches. Uptake of long term contraceptive methods during outreaches was 73% of the clients while short term modern methods were 27%. Health Network Quality Improvement system assessment scores indicated 51% of the facilities scored over 90%, 25% scoring 80-89% while 21% scored below 80%. Conclusion: Preference for short term methods by women is possibly associated to cost as they are cheaper and easy to administer. When the cost of intra uterine device Implants is meant affordable during outreaches, the uptake is observed to increase. Making intra uterine device and implants affordable to women is a key strategy in increasing contraceptive prevalence hence averting maternal mortality.Keywords: contraceptives, contraceptive uptake, low socio economic, supportive supervision
Procedia PDF Downloads 16824286 Nutrition and Physical Activity Intervention on Health Screening Outcomes for Singaporean Employees: A Worksite Based Randomised Controlled Trial
Authors: Elaine Wong
Abstract:
This research protocol aims to explore and justify the need for nutrition and physical activity intervention to improve health outcomes among SME (Small Medium Enterprise) employees. It was found that the worksite is an ideal and convenient setting for employees to take charge of their health thru active participation in health programmes since they spent a great deal of time at their workplace. This study will examine the impact of both general or/and targeted health interventions in both SME and non-SME companies utilizing the Workplace Health Promotion (WHP) grant over a 12 months period and assessed the improvement in chronic health disease outcomes in Singapore. Random sampling of both non-SME and SME companies will be conducted to undergo health intervention and statistical packages such as Statistical Package for Social Science (SPSS) 25 will be used to examine the impact of both general and targeted interventions on employees who participate and those who do not participate in the intervention and their effects on blood glucose (BG), blood lipid, blood pressure (BP), body mass index (BMI), and body fat percentage. Using focus groups and interviews, the data results will be transcribed to investigate enablers and barriers to workplace health intervention revealed by employees and WHP coordinators that could explain the variation in the health screening results across the organisations. Dietary habits and physical activity levels of the employees participating and not participating in the intervention will be collected before and after intervention to assess any changes in their lifestyle practices. It makes economic sense to study the impact of these interventions on health screening outcomes across various organizations that are existing grant recipients to justify the sustainability of these programmes by the local government. Healthcare policy makers and employers can then tailor appropriate and relevant programmes to manage these escalating chronic health disease conditions which is integral to the competitiveness and productivity of the nation’s workforce.Keywords: chronic diseases, health screening, nutrition and fitness intervention , workplace health
Procedia PDF Downloads 14824285 Design of Visual Repository, Constraint and Process Modeling Tool Based on Eclipse Plug-Ins
Authors: Rushiraj Heshi, Smriti Bhandari
Abstract:
Master Data Management requires creation of Central repository, applying constraints on Repository and designing processes to manage data. Designing of Repository, constraints on repository and business processes is very tedious and time consuming task for large Enterprise. Hence Visual Repository, constraints and Process (Workflow) modeling is the most critical step in Master Data Management.In this paper, we realize a Visual Modeling tool for implementing Repositories, Constraints and Processes based on Eclipse Plugin using GMF/EMF which follows principles of Model Driven Engineering (MDE).Keywords: EMF, GMF, GEF, repository, constraint, process
Procedia PDF Downloads 49724284 Assessment of Knowledge, Attitude, and Practice of Health Care Professionals and Factors Associated with Adverse Drug Reaction Reporting in Public and Private Hospitals of Islamabad
Authors: Zaka Nisa, Farooq Sher
Abstract:
Adverse drug reactions (ADRs) underreporting is a great challenge to Pharmacovigilance. Health care professionals have to consider ADR reporting as their professional obligation, an effective system of ADR reporting is important to improve patient health care and safety. The present study is designed to assess the knowledge, attitude, practice and factors associated with ADR reporting by health care professionals (physicians and pharmacists) in public and private hospitals of Pakistan. A pretested questionnaire was administered to 384 physicians and pharmacists in public and private hospitals. Respondents were evaluated for their knowledge, attitude, and practice related to ADR reporting. The data was analyzed using the SPSS statistical software, the factors which encourage and discourage respondents in reporting ADRs were determined. Most of the respondents have shown a positive attitude towards ADR reporting. The response rate was 95.32%. Of the 367 questionnaires, including 333 (86.5%) physicians and 34 (8.8%) pharmacists with the mean age 28.34 (SD= 6.69), most of the respondents showed poor ADR reporting knowledge (83.1%). The majority of respondents (78.2%) showed positive attitude towards ADR reporting and only (12.3%) hospitals have good ADR reporting practice. Knowledge of respondents in public hospitals (8.6%) was less as compare to those in the private hospitals (29.7%) (P < 0.001). Attitude of respondents in private hospitals was more positive (92.4%) than those in public hospitals (68.8%) (P < 0.001). No significant difference was observed in practicing of ADR reporting in public (11.8%) and private hospitals (13.1%) (P value 0.89). Seriousness of ADR, unusualness of reaction, new drug involvement and confidence in diagnosis of ADR were the factors which encourage respondents to report ADR, however, lack of knowledge regarding where and how to report ADR, lack of access to ADR reporting form, managing patients was more important than reporting ADR, legal liability issues were the factors which discourage respondents to report ADR. The study reveals poor knowledge and practice regarding ADR reporting. However positive attitude was seen regarding ADR reporting. There is a need of educational training for health care professionals as well as genuine and continuous efforts are required by Government and health authorities to ensure the proper implementation of ADR reporting system in all of the hospitals.Keywords: adverse drugs reactions (ADR), pharmacovigilance, spontaneous ADR reporting, knowledge of ADR, attitude of health care profesionals, practice of ADR reporting
Procedia PDF Downloads 25824283 Rebuilding Health Post-Conflict: Case Studies from Afghanistan, Cambodia, and Mozambique
Authors: Spencer Rutherford, Shadi Saleh
Abstract:
War and conflict negatively impact all facets of a health system; services cease to function, resources become depleted, and any semblance of governance is lost. Following cessation of conflict, the rebuilding process includes a wide array of international and local actors. During this period, stakeholders must contend with various trade-offs, including balancing sustainable outcomes with immediate health needs, introducing health reform measures while also increasing local capacity, and reconciling external assistance with local legitimacy. Compounding these factors are additional challenges, including coordination amongst stakeholders, the re-occurrence of conflict, and ulterior motives from donors and governments, to name a few. Therefore, the present paper evaluated health system development in three post-conflict countries over a 12-year timeline. Specifically, health policies, health inputs (such infrastructure and human resources), and measures of governance, from the post-conflict periods of Afghanistan, Cambodia, and Mozambique, were assessed against health outputs and other measures. All post-conflict countries experienced similar challenges when rebuilding the health sector, including; division and competition between donors, NGOs, and local institutions; urban and rural health inequalities; and the re-occurrence of conflict. However, countries also employed unique and effective mechanisms for reconstructing their health systems, including; government engagement of the NGO and private sector; integration of competing factions into the same workforce; and collaborative planning for health policy. Based on these findings, best-practice development strategies were determined and compiled into a 12-year framework. Briefly, during the initial stage of the post-conflict period, primary stakeholders should work quickly to draft a national health strategy in collaboration with the government, and focus on managing and coordinating NGOs through performance-based partnership agreements. With this scaffolding in place, the development community can then prioritize the reconstruction of primary health care centers, increasing and retaining health workers, and horizontal integration of immunization services. The final stages should then concentrate on transferring ownership of the health system national institutions, implementing sustainable financing mechanisms, and phasing-out NGO services. Overall, these findings contribute post-conflict health system development by evaluating the process holistically and along a timeline and can be of further use by healthcare managers, policy-makers, and other health professionals.Keywords: Afghanistan, Cambodia, health system development, health system reconstruction, Mozambique, post-conflict, state-building
Procedia PDF Downloads 15924282 Grounded Theory of Consumer Loyalty: A Perspective through Video Game Addiction
Authors: Bassam Shaikh, R. S. A. Jumain
Abstract:
Game addiction has become an extremely important topic in psychology researchers, particularly in understanding and explaining why individuals become addicted (to video games). In previous studies, effect of online game addiction on social responsibilities, health problems, government action, and the behaviors of individuals to purchase and the causes of making individuals addicted on the video games has been discussed. Extending these concepts in marketing, it could be argued than the phenomenon could enlighten and extending our understanding on consumer loyalty. This study took the Grounded Theory approach, and found that motivation, satisfaction, fulfillments, exploration and achievements to be part of the important elements that builds consumer loyalty.Keywords: grounded theory, consumer loyalty, video games, video game addiction
Procedia PDF Downloads 53524281 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 16924280 Welding Process Selection for Storage Tank by Integrated Data Envelopment Analysis and Fuzzy Credibility Constrained Programming Approach
Authors: Rahmad Wisnu Wardana, Eakachai Warinsiriruk, Sutep Joy-A-Ka
Abstract:
Selecting the most suitable welding process usually depends on experiences or common application in similar companies. However, this approach generally ignores many criteria that can be affecting the suitable welding process selection. Therefore, knowledge automation through knowledge-based systems will significantly improve the decision-making process. The aims of this research propose integrated data envelopment analysis (DEA) and fuzzy credibility constrained programming approach for identifying the best welding process for stainless steel storage tank in the food and beverage industry. The proposed approach uses fuzzy concept and credibility measure to deal with uncertain data from experts' judgment. Furthermore, 12 parameters are used to determine the most appropriate welding processes among six competitive welding processes.Keywords: welding process selection, data envelopment analysis, fuzzy credibility constrained programming, storage tank
Procedia PDF Downloads 16824279 Eco-Tourism: A Need for Sustainable Development
Authors: Chandni Laddha
Abstract:
Tourism was earlier considered as an activity performed by people only for the purpose of entertainment. However, the present era demand for adding something more to the concept of tourism. Nowadays, people are more protected towards environment, so this paper focuses on the significance of ecotourism for the attainment of sustainable development. Ecotourism is a way of sustainable growth of tourist spots maintaining their natural and actual status quo. The ecotourism in India becomes all the more important because India is famous on world map. Ecotourism believe that there should be sustainable equation between tourist and tourist place. Various aspects related to environmental tourism will be highlighted in this paper. Government efforts for the promotion of ecotourism will be discussed by explaining the tourism policy of India, some acts, rules etc. will also be discussed. The study comes up with some strategies to be adopted and which will lead in promoting the concept of ecotourism for an ecologically sustainable environment.Keywords: tourism, eco-tourism, sustainable development, tourism policy, sustainable environment
Procedia PDF Downloads 43224278 Religion, Education, and Nation: Anticlerical Principle of France and Private School Law of South Korea
Authors: Minjeoung Kim
Abstract:
The education plays an important role of political socialization in politics. In Korean and in France, religion in education is situated in an important place, but religious education in school is dealt differently in two countries. In this article, the author tries to reveal the reason why in France private Catholic schools can keep their religious discipline, but in Korea, private Christian schools cannot insist Christianism to their students. This is because of the different situation of their budget. In Korea, even though private schools are named ‘private’, they cannot be managed without government subsidy but in France, private Catholic schools are owned by private foundation and their budget is based on their own resource. That’s why French private schools do not need to follow governmental guidance but not in Korean case.Keywords: religion, politics, South Korea, France
Procedia PDF Downloads 19124277 Housing Precarity and Pathways: Lived Experiences Among Bangladeshi Migrants in Dublin
Authors: Mohammad Altaf Hossain
Abstract:
A growing body of literature in urban studies has presented that urban precarity has been a lived experience for low-income groups of people in the cities of the Global South. It does not necessarily mean that cities in the Global North, where advanced capitalist economies exist, avoided the adverse realities of urban precarity. As a multifaceted condition, it creates other associated precariousness in lives -for example, economic deprivation, mental stress, and housing precarity. The interrelations between urbanity and precarity have been ubiquitous regardless of the developed and developing countries. People, mainly manual labourers with low incomes, go through uncertainties in every aspect of life. By analysing qualitative data and embracing structure-agency interaction, this paper intends to present how Bangladeshi migrants experience housing precarity in Dublin. Continued population growth and political economy factors such as labour market inequality, financialisation of the private rental sector, and the impact of cuts to government funding for social housing provision are combined to produce a housing supply crisis, affordability, and access in the city. As a result, low-income people practice informality in securing jobs and housing. The macro-structural components of this analysis include the Irish housing policy, the European labour market, the immigration policy, and the financialised housing market. The micro-structural components of South Asian communities’ experiences include social networks and social class. Access to social networks and practices of informality play a significant role in enabling them to negotiate urban precarity, including housing crises and income insecurity. In some cases, the collective agency of ethnic diaspora communities plays a vital role in negotiating with structural constraints.Keywords: housing precarity, housing pathways, migration, agency, Dublin
Procedia PDF Downloads 2624276 Entrepreneurship Success in Jordan
Authors: Atef Aladwan
Abstract:
This research will focus on stimulating greater freedom and facilitating small and medium-sized enterprises (SMEs) in Jordan to create jobs, as it is emerging as a key development issue. It will highlight the importance of integrating SMEs into development strategies. Jordan has potentially a large market for its products as a result of proximity to developed country markets, signing of various free trades agreements with European countries, cheap energy sources and vast sovereign funds willing to invest in the development of local enterprises. It is beginning to be accepted by governments that SMEs rather than government need to be the main player in domestic economic activity, especially as providers of employment opportunities, and hence generators of sources of income for many households. To foster SME development, it is generally recognised that reforms are needed in Jordan in order to bring about a more globally competitive and business-friendly environment.Keywords: SMEs, competitiveness, entrepreneurship, jordan, development
Procedia PDF Downloads 42324275 On the Estimation of Crime Rate in the Southwest of Nigeria: Principal Component Analysis Approach
Authors: Kayode Balogun, Femi Ayoola
Abstract:
Crime is at alarming rate in this part of world and there are many factors that are contributing to this antisocietal behaviour both among the youths and old. In this work, principal component analysis (PCA) was used as a tool to reduce the dimensionality and to really know those variables that were crime prone in the study region. Data were collected on twenty-eight crime variables from National Bureau of Statistics (NBS) databank for a period of fifteen years, while retaining as much of the information as possible. We use PCA in this study to know the number of major variables and contributors to the crime in the Southwest Nigeria. The results of our analysis revealed that there were eight principal variables have been retained using the Scree plot and Loading plot which implies an eight-equation solution will be appropriate for the data. The eight components explained 93.81% of the total variation in the data set. We also found that the highest and commonly committed crimes in the Southwestern Nigeria were: Assault, Grievous Harm and Wounding, theft/stealing, burglary, house breaking, false pretence, unlawful arms possession and breach of public peace.Keywords: crime rates, data, Southwest Nigeria, principal component analysis, variables
Procedia PDF Downloads 44524274 On-Line Data-Driven Multivariate Statistical Prediction Approach to Production Monitoring
Authors: Hyun-Woo Cho
Abstract:
Detection of incipient abnormal events in production processes is important to improve safety and reliability of manufacturing operations and reduce losses caused by failures. The construction of calibration models for predicting faulty conditions is quite essential in making decisions on when to perform preventive maintenance. This paper presents a multivariate calibration monitoring approach based on the statistical analysis of process measurement data. The calibration model is used to predict faulty conditions from historical reference data. This approach utilizes variable selection techniques, and the predictive performance of several prediction methods are evaluated using real data. The results shows that the calibration model based on supervised probabilistic model yielded best performance in this work. By adopting a proper variable selection scheme in calibration models, the prediction performance can be improved by excluding non-informative variables from their model building steps.Keywords: calibration model, monitoring, quality improvement, feature selection
Procedia PDF Downloads 35724273 Attitudes, Experiences and Good Practices of Writing Online Course Material: A Case Study in Makerere University
Authors: Ruth Nsibirano
Abstract:
Online mode of delivery in higher institutions of learning, popularly known in some circles as e-Learning or distance education is a new phenomenon that is steadily taking root in African universities but specifically at Makerere University. For slightly over a decade, the Department of Open and Distance Learning has been offering the first generation mode of distance education. In this, learning and teaching experiences were based on the use of hard copy materials circulated through postal services in a rather correspondence mode. There were more challenges to this including high dropout rates, limited support to the learners and sustainability issues. Fortunately, the Department was supported by the Norwegian Government through a NORHED grant to “leapfrog” to the fifth generation of distance education that makes more use of educational technologies and tools. The capacity of faculty staff was gradually enhanced through a series of training to handle the upgraded structure of fifth generation distance education. The trained staff was then tasked to develop modules befitting an online delivery mode, for use on the program. This paper will present attitudes, experiences of the course writers with a view of sharing the good practices that enabled them leap from e-faculty trainees to distinct online course writers. This perspective will hopefully serve as building blocks to enhance the capacity of other upcoming distance education programs in low capacity universities and also promote the uptake of e-Education on the continent and beyond. Methodologically the findings were collected through individual interviews with the 30 course writers. In addition, semi structured questionnaires were designed to collect data on the profile, challenges and lessons from the writers. Findings show that the attitudes of course writers on project supported activities are so much tagged to the returns from their committed efforts. In conclusion, therefore, it is strategically useful to assess and selectively choose which individual to nominate for involvement at the initial stages.Keywords: distance education, online course content, staff attitudes, best practices in online learning
Procedia PDF Downloads 25324272 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 37824271 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 35824270 Interactive IoT-Blockchain System for Big Data Processing
Authors: Abdallah Al-ZoubI, Mamoun Dmour
Abstract:
The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.Keywords: IoT devices, blockchain, Ethereum, big data
Procedia PDF Downloads 15024269 Keynote Talk: The Role of Internet of Things in the Smart Cities Power System
Authors: Abdul-Rahman Al-Ali
Abstract:
As the number of mobile devices is growing exponentially, it is estimated to connect about 50 million devices to the Internet by the year 2020. At the end of this decade, it is expected that an average of eight connected devices per person worldwide. The 50 billion devices are not mobile phones and data browsing gadgets only, but machine-to-machine and man-to-machine devices. With such growing numbers of devices the Internet of Things (I.o.T) concept is one of the emerging technologies as of recently. Within the smart grid technologies, smart home appliances, Intelligent Electronic Devices (IED) and Distributed Energy Resources (DER) are major I.o.T objects that can be addressable using the IPV6. These objects are called the smart grid internet of things (SG-I.o.T). The SG-I.o.T generates big data that requires high-speed computing infrastructure, widespread computer networks, big data storage, software, and platforms services. A company’s utility control and data centers cannot handle such a large number of devices, high-speed processing, and massive data storage. Building large data center’s infrastructure takes a long time, it also requires widespread communication networks and huge capital investment. To maintain and upgrade control and data centers’ infrastructure and communication networks as well as updating and renewing software licenses which collectively, requires additional cost. This can be overcome by utilizing the emerging computing paradigms such as cloud computing. This can be used as a smart grid enabler to replace the legacy of utilities data centers. The talk will highlight the role of I.o.T, cloud computing services and their development models within the smart grid technologies.Keywords: intelligent electronic devices (IED), distributed energy resources (DER), internet, smart home appliances
Procedia PDF Downloads 32424268 Trafficking of Women and Children and Solutions to Combat It: The Case of Nigeria
Authors: Olatokunbo Yakeem
Abstract:
Human trafficking is a crime against gross violations of human rights. Trafficking in persons is a severe socio-economic dilemma that affects the national and international dimensions. Human trafficking or modern-day-slavery emanated from slavery, and it has been in existence before the 6ᵗʰ century. Today, no country is exempted from dehumanizing human beings, and as a result, it has been an international issue. The United Nations (UN) presented the International Protocol to fight human trafficking worldwide, which brought about the international definition of human trafficking. The protocol is to prevent, suppress, and punish trafficking in persons, especially women and children. The trafficking protocol has a link with transnational organised crime rather than migration. Over a hundred and fifty countries nationwide have enacted their criminal and panel code trafficking legislation from the UN trafficking protocol. Sex trafficking is the most common type of exploitation of women and children. Other forms of this crime involve exploiting vulnerable victims through forced labour, child involvement in warfare, domestic servitude, debt bondage, and organ removal for transplantation. Trafficking of women and children into sexual exploitation represents the highest form of human trafficking than other types of exploitation. Trafficking of women and children can either happen internally or across the border. It affects all kinds of people, regardless of their race, social class, culture, religion, and education levels. However, it is more of a gender-based issue against females. Furthermore, human trafficking can lead to life-threatening infections, mental disorders, lifetime trauma, and even the victim's death. The study's significance is to explore why the root causes of women and children trafficking in Nigeria are based around poverty, entrusting children in the hands of relatives and friends, corruption, globalization, weak legislation, and ignorance. The importance of this study is to establish how the national, regional, and international organisations are using the 3P’s Protection, Prevention, and Prosecution) to tackle human trafficking. The methodology approach for this study will be a qualitative paradigm. The rationale behind this selection is that the qualitative method will identify the phenomenon and interpret the findings comprehensively. The data collection will take the form of semi-structured in-depth interviews through telephone and email. The researcher will use a descriptive thematic analysis to analyse the data by using complete coding. In summary, this study aims to recommend to the Nigerian federal government to include human trafficking as a subject in their educational curriculum for early intervention to prevent children from been coerced by criminal gangs. And the research aims to find the root causes of women and children trafficking. Also, to look into the effectiveness of the strategies in place to eradicate human trafficking globally. In the same vein, the research objective is to investigate how the anti-trafficking bodies such as law enforcement and NGOs collaborate to tackle the upsurge in human trafficking.Keywords: children, Nigeria, trafficking, women
Procedia PDF Downloads 18324267 Statistical Analysis of Interferon-γ for the Effectiveness of an Anti-Tuberculous Treatment
Authors: Shishen Xie, Yingda L. Xie
Abstract:
Tuberculosis (TB) is a potentially serious infectious disease that remains a health concern. The Interferon Gamma Release Assay (IGRA) is a blood test to find out if an individual is tuberculous positive or negative. This study applies statistical analysis to the clinical data of interferon-gamma levels of seventy-three subjects who diagnosed pulmonary TB in an anti-tuberculous treatment. Data analysis is performed to determine if there is a significant decline in interferon-gamma levels for the subjects during a period of six months, and to infer if the anti-tuberculous treatment is effective.Keywords: data analysis, interferon gamma release assay, statistical methods, tuberculosis infection
Procedia PDF Downloads 30624266 Short Text Classification Using Part of Speech Feature to Analyze Students' Feedback of Assessment Components
Authors: Zainab Mutlaq Ibrahim, Mohamed Bader-El-Den, Mihaela Cocea
Abstract:
Students' textual feedback can hold unique patterns and useful information about learning process, it can hold information about advantages and disadvantages of teaching methods, assessment components, facilities, and other aspects of teaching. The results of analysing such a feedback can form a key point for institutions’ decision makers to advance and update their systems accordingly. This paper proposes a data mining framework for analysing end of unit general textual feedback using part of speech feature (PoS) with four machine learning algorithms: support vector machines, decision tree, random forest, and naive bays. The proposed framework has two tasks: first, to use the above algorithms to build an optimal model that automatically classifies the whole data set into two subsets, one subset is tailored to assessment practices (assessment related), and the other one is the non-assessment related data. Second task to use the same algorithms to build an optimal model for whole data set, and the new data subsets to automatically detect their sentiment. The significance of this paper is to compare the performance of the above four algorithms using part of speech feature to the performance of the same algorithms using n-grams feature. The paper follows Knowledge Discovery and Data Mining (KDDM) framework to construct the classification and sentiment analysis models, which is understanding the assessment domain, cleaning and pre-processing the data set, selecting and running the data mining algorithm, interpreting mined patterns, and consolidating the discovered knowledge. The results of this paper experiments show that both models which used both features performed very well regarding first task. But regarding the second task, models that used part of speech feature has underperformed in comparison with models that used unigrams and bigrams.Keywords: assessment, part of speech, sentiment analysis, student feedback
Procedia PDF Downloads 14224265 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
Authors: Jinghui Peng, Shanyu Tang, Jia Li
Abstract:
Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.Keywords: steganalysis, security, Fast Fourier Transform, streaming media
Procedia PDF Downloads 14724264 Bacterial Decontamination of Nurses' White Coats by Application of Antimicrobial Finish
Authors: Priyanka Gupta, Nilanjana Bairagi, Deepti Gupta
Abstract:
New pathogenic strains of microbes are continually emerging and resistance of bacteria to antibiotics is growing. Hospitals in India have a high burden of infections in their intensive care units and general wards. Rising incidence of hospital infections is a matter of great concern in India. This growth is often attributed to the absence of effective infection control strategies in healthcare facilities. Government, therefore, is looking for cost effective strategies that are effective against HAIs. One possible method is by application of an antimicrobial finish on the uniform. But there are limited studies to show the effect of antimicrobial activity of antimicrobial finish treated nurses’ uniforms in a real hospital set up. This paper proposes a prospective non-destructive sampling technique, based on the use of a detachable fabric patch, to assess the effectiveness of silver based antimicrobial agent across five wards in a tertiary care government hospital in Delhi, India. Fabrics like polyester and polyester cotton blend fabric which are more prevalent for making coats were selected for the study. Polyester and polyester cotton blend fabric was treated with silver based antimicrobial (AM) finish. At the beginning of shift, a composite patch of untreated and treated fabric respectively was stitched on the abdominal region on the left and right side of the washed white coat of participating nurse. At the end of the shift, the patch was removed and taken for bacterial sampling on Brain Heart Infusion (BHI) plates. Microbial contamination on polyester and blend fabrics after 6 hours shift was compared in Brain Heart Infusion broth (BHI). All patches treated with silver based antimicrobial agent showed decreased bacterial counts. Percent reduction in the bacterial colonies after the antimicrobial treatment in both fabrics was 81.0 %. Antimicrobial finish was equally effective in reducing microbial adhesion on both fabric types. White coats of nurses become progressively contaminated during clinical care. Type of fabric used to make the coat can affect the extent of contamination which is higher on polyester cotton blend as compared to 100% polyester. The study highlights the importance of silver based antimicrobial finish in the area of uniform hygiene. Bacterial load can be reduced by using antimicrobial finish on hospital uniforms. Hospital staff uniforms endowed with antimicrobial properties may be of great help in reducing the occurrence and spread of infections.Keywords: antimicrobial finish, bacteria, infection control, silver, white coat
Procedia PDF Downloads 215