Search results for: crisis computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2185

Search results for: crisis computing

1885 A Cloud Computing System Using Virtual Hyperbolic Coordinates for Services Distribution

Authors: Telesphore Tiendrebeogo, Oumarou Sié

Abstract:

Cloud computing technologies have attracted considerable interest in recent years. Thus, these latters have become more important for many existing database applications. It provides a new mode of use and of offer of IT resources in general. Such resources can be used “on demand” by anybody who has access to the internet. Particularly, the Cloud platform provides an ease to use interface between providers and users, allow providers to develop and provide software and databases for users over locations. Currently, there are many Cloud platform providers support large scale database services. However, most of these only support simple keyword-based queries and can’t response complex query efficiently due to lack of efficient in multi-attribute index techniques. Existing Cloud platform providers seek to improve performance of indexing techniques for complex queries. In this paper, we define a new cloud computing architecture based on a Distributed Hash Table (DHT) and design a prototype system. Next, we perform and evaluate our cloud computing indexing structure based on a hyperbolic tree using virtual coordinates taken in the hyperbolic plane. We show through our experimental results that we compare with others clouds systems to show our solution ensures consistence and scalability for Cloud platform.

Keywords: virtual coordinates, cloud, hyperbolic plane, storage, scalability, consistency

Procedia PDF Downloads 425
1884 'Refugee Crisis' and Global Labour Relations: Syrian Labour in Turkish Textile Factories

Authors: Katarzyna Czarnota, Inga Hajdarowicz

Abstract:

Political mechanisms of legal, social and economic segregation of refugees and migrants have reproduced and deepened existing hierarchies and inequalities in global labour relations. The consequences of these processes strengthened by current, so called, ‘refugee crisis’, tightening of border regimes, militarisation and closing of Balkan Route, will have a significant impact on future integration policies. One of the fields that require further research is limited access to labour rights of migrants and refugees. Although this phenomenon is experienced by a significant proportion of migrant population, these are the poorest who are also exposed to economic racism. The presentation will tackle the influence of current migration policies on increasing social and class inequalities between migrants, refugees, on the example of Syrian labours in Turkish textile factories. The authors will critically analyse examples of integration policies, especially planned changes in labour law as well as examples of violation of labour rights and exploitation of refugees and migrants in textile factories and industry. The presentation will be based on interviews with Syrian workers, conducted in Turkey and Greece in 2016.

Keywords: refugee crisis, economic racism, global labour relations, exploatation

Procedia PDF Downloads 323
1883 Effects of Allowance for Corporate Equity on the Financing Choices of Belgian Small and Medium-Sized Enterprises in a Crisis Context

Authors: O. Colot, M. Croquet, L. Cultrera, Y. Fandja Collince

Abstract:

The objective of our research is to evaluate the impact of the allowance for corporate equity (ACE) on the financial structure of Belgian SME in order to highlight the potential existence of a fiscal leverage. To limit the biases linked to the rationing of the capital further to the financial crisis, we compare first the dynamic evolution of the financial structure of the Belgian firms over the period 2006-2015 by focusing on three sub-periods: 2006-2008, 2009-2012 and 2013-2015. We give then an international size to this comparison by including SMEs from countries adjoining Belgium (France, Germany, Netherlands and the United Kingdom) and within which there is no ACE. This comparison allows better understanding the fiscal advantage linked to the ACE of firms evolving in a relatively unstable economic environment further to the financial crisis of 2008. This research is relevant given the economic and political context in which Belgium operates and the very uncertain future of the Belgian ACE. The originality of this research is twofold: the long study period and the consideration of the effects of the financial and economic crisis on the financing structure of Belgian SMEs. The results of this research, even though they confirm the existence of a positive fiscal leverage for the tax deduction for venture capital on the financing structure of Belgian SMEs, do not allow the extent of this leverage to be clearly quantified. The comparative evolution of financing structures over the period 2006-2015 of Belgian, French, German, Dutch and English SMEs shows a strong similarity in the overall evolution of their financing.

Keywords: allowance for corporate equity, Belgium, financial structure, small and medium sized firms

Procedia PDF Downloads 204
1882 Memristor-A Promising Candidate for Neural Circuits in Neuromorphic Computing Systems

Authors: Juhi Faridi, Mohd. Ajmal Kafeel

Abstract:

The advancements in the field of Artificial Intelligence (AI) and technology has led to an evolution of an intelligent era. Neural networks, having the computational power and learning ability similar to the brain is one of the key AI technologies. Neuromorphic computing system (NCS) consists of the synaptic device, neuronal circuit, and neuromorphic architecture. Memristor are a promising candidate for neuromorphic computing systems, but when it comes to neuromorphic computing, the conductance behavior of the synaptic memristor or neuronal memristor needs to be studied thoroughly in order to fathom the neuroscience or computer science. Furthermore, there is a need of more simulation work for utilizing the existing device properties and providing guidance to the development of future devices for different performance requirements. Hence, development of NCS needs more simulation work to make use of existing device properties. This work aims to provide an insight to build neuronal circuits using memristors to achieve a Memristor based NCS.  Here we throw a light on the research conducted in the field of memristors for building analog and digital circuits in order to motivate the research in the field of NCS by building memristor based neural circuits for advanced AI applications. This literature is a step in the direction where we describe the various Key findings about memristors and its analog and digital circuits implemented over the years which can be further utilized in implementing the neuronal circuits in the NCS. This work aims to help the electronic circuit designers to understand how the research progressed in memristors and how these findings can be used in implementing the neuronal circuits meant for the recent progress in the NCS.

Keywords: analog circuits, digital circuits, memristors, neuromorphic computing systems

Procedia PDF Downloads 174
1881 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 343
1880 From Waste to Wealth: A Future Paradigm for Plastic Management Using Blockchain Technology

Authors: Jim Shi, Jasmine Chang, Nesreen El-Rayes

Abstract:

The world has been experiencing a steadily increasing trend in both the production and consumption of plastic. The global consumer revolution should not have been possible without plastic, thanks to its salient feature of inexpensiveness and durability. But, as a two-edged sword, its durable quality has returned to haunt and even jeopardized us. That exacerbating the plastic crisis has attracted various global initiatives and actions. Simultaneously, firms are eager to adopt new technology as they witness and perceive more potential and merit of Industry 4.0 technologies. For example, Blockchain technology (BCT) is drawing the attention of numerous stakeholders because of its wide range of outstanding features that promise to enhance supply chain operations. However, from a research perspective, most of the literature addresses the plastic crisis from either environmental or social perspectives. In contrast, analysis from the data science perspective and technology is relatively scarce. To this end, this study aims to fill this gap and cover the plastic crisis from a holistic view of environmental, social, technological, and business perspectives. In particular, we propose a mathematical model to examine the inclusion of BCT to enhance and improve the efficiency on the upstream and the downstream sides of the plastic value, where the whole value chain is coordinated systematically, and its interoperability can be optimized. Consequently, the Environmental, Social, and Governance (ESG) goal and Circular Economics (CE) sustainability can be maximized.

Keywords: blockchain technology, plastic, circular economy, sustainability

Procedia PDF Downloads 81
1879 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel

Authors: Audu Aly Fada, Adejoh Apeh Matthew

Abstract:

This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.

Keywords: social conflict, crisis, security, tourism development

Procedia PDF Downloads 401
1878 How Rational Decision-Making Mechanisms of Individuals Are Corrupted under the Presence of Others and the Reflection of This on Financial Crisis Management Situations

Authors: Gultekin Gurcay

Abstract:

It is known that the most crucial influence of the psychological, social and emotional factors that affect any human behavior is to corrupt the rational decision making mechanism of the individuals and cause them to display irrational behaviors. In this regard, the social context of human beings influences the rationality of our decisions, and people tend to display different behaviors when they were alone compared to when they were surrounded by others. At this point, the interaction and interdependence of the behavioral finance and economics with the area of social psychology comes, where intentions and the behaviors of the individuals are being analyzed in the actual or implied presence of others comes into prominence. Within the context of this study, the prevalent theories of behavioral finance, which are The Prospect Theory, The Utility Theory Given Uncertainty and the Five Axioms of Choice under Uncertainty, Veblen’s Hidden Utility Theory, and the concept of ‘Overreaction’ has been examined and demonstrated; and the meaning, existence and validity of these theories together with the social context has been assessed. Finally, in this study the behavior of the individuals in financial crisis situations where the majority of the society is being affected from the same negative conditions at the same time has been analyzed, by taking into account how individual behavior will change according to the presence of the others.

Keywords: conditional variance coefficient, financial crisis, garch model, stock market

Procedia PDF Downloads 240
1877 Media, Politics and Power in the Representation of the Refugee and Migration Crisis in Europe

Authors: Evangelia-Matroni Tomara

Abstract:

This thesis answers the question whether the media representations and reporting in 2015-2016 - especially, after the image of the drowned three-year-old Syrian boy in the Mediterranean Sea which made global headlines in the beginning of September 2015 -, the European Commission regulatory sources material and related reporting, have the power to challenge the conceptualization of humanitarianism or even redefine it. The theoretical foundations of the thesis are based on humanitarianism and its core definitions, the power of media representations and the relative portrayal of migrants, refugees and/or asylum seekers, as well as the dominant migration discourse and EU migration governance. Using content analysis for the media portrayal of migrants (436 newspaper articles) and qualitative content analysis for the European Commission Communication documents from May 2015 until June 2016 that required various depths of interpretation, this thesis allowed us to revise the concept of humanitarianism, realizing that the current crisis may seem to be a turning point for Europe but is not enough to overcome the past hostile media discourses and suppress the historical perspective of security and control-oriented EU migration policies. In particular, the crisis helped to shift the intensity of hostility and the persistence in the state-centric, border-oriented securitization in Europe into a narration of victimization rather than threat where mercy and charity dynamics are dominated and into operational mechanisms, noting the emergency of immediate management of the massive migrations flows, respectively. Although, the understanding of a rights-based response to the ongoing migration crisis, is being followed discursively in both political and media stage, the nexus described, points out that the binary between ‘us’ and ‘them’ still exists, with only difference that the ‘invaders’ are now ‘pathetic’ but still ‘invaders’. In this context, the migration crisis challenges the concept of humanitarianism because rights dignify migrants as individuals only in a discursive or secondary level while the humanitarian work is mostly related with the geopolitical and economic interests of the ‘savior’ states.

Keywords: European Union politics, humanitarianism, immigration, media representation, policy-making, refugees, security studies

Procedia PDF Downloads 293
1876 Indium-Gallium-Zinc Oxide Photosynaptic Device with Alkylated Graphene Oxide for Optoelectronic Spike Processing

Authors: Seyong Oh, Jin-Hong Park

Abstract:

Recently, neuromorphic computing based on brain-inspired artificial neural networks (ANNs) has attracted huge amount of research interests due to the technological abilities to facilitate massively parallel, low-energy consuming, and event-driven computing. In particular, research on artificial synapse that imitate biological synapses responsible for human information processing and memory is in the spotlight. Here, we demonstrate a photosynaptic device, wherein a synaptic weight is governed by a mixed spike consisting of voltage and light spikes. Compared to the device operated only by the voltage spike, ∆G in the proposed photosynaptic device significantly increased from -2.32nS to 5.95nS with no degradation of nonlinearity (NL) (potentiation/depression values were changed from 4.24/8 to 5/8). Furthermore, the Modified National Institute of Standards and Technology (MNIST) digit pattern recognition rates improved from 36% and 49% to 50% and 62% in ANNs consisting of the synaptic devices with 20 and 100 weight states, respectively. We expect that the photosynaptic device technology processed by optoelectronic spike will play an important role in implementing the neuromorphic computing systems in the future.

Keywords: optoelectronic synapse, IGZO (Indium-Gallium-Zinc Oxide) photosynaptic device, optoelectronic spiking process, neuromorphic computing

Procedia PDF Downloads 173
1875 The Study of Intangible Assets at Various Firm States

Authors: Gulnara Galeeva, Yulia Kasperskaya

Abstract:

The study deals with the relevant problem related to the formation of the efficient investment portfolio of an enterprise. The structure of the investment portfolio is connected to the degree of influence of intangible assets on the enterprise’s income. This determines the importance of research on the content of intangible assets. However, intangible assets studies do not take into consideration how the enterprise state can affect the content and the importance of intangible assets for the enterprise`s income. This affects accurateness of the calculations. In order to study this problem, the research was divided into several stages. In the first stage, intangible assets were classified based on their synergies as the underlying intangibles and the additional intangibles. In the second stage, this classification was applied. It showed that the lifecycle model and the theory of abrupt development of the enterprise, that are taken into account while designing investment projects, constitute limit cases of a more general theory of bifurcations. The research identified that the qualitative content of intangible assets significant depends on how close the enterprise is to being in crisis. In the third stage, the author developed and applied the Wide Pairwise Comparison Matrix method. This allowed to establish that using the ratio of the standard deviation to the mean value of the elements of the vector of priority of intangible assets makes it possible to estimate the probability of a full-blown crisis of the enterprise. The author has identified a criterion, which allows making fundamental decisions on investment feasibility. The study also developed an additional rapid method of assessing the enterprise overall status based on using the questionnaire survey with its Director. The questionnaire consists only of two questions. The research specifically focused on the fundamental role of stochastic resonance in the emergence of bifurcation (crisis) in the economic development of the enterprise. The synergetic approach made it possible to describe the mechanism of the crisis start in details and also to identify a range of universal ways of overcoming the crisis. It was outlined that the structure of intangible assets transforms into a more organized state with the strengthened synchronization of all processes as a result of the impact of the sporadic (white) noise. Obtained results offer managers and business owners a simple and an affordable method of investment portfolio optimization, which takes into account how close the enterprise is to a state of a full-blown crisis.

Keywords: analytic hierarchy process, bifurcation, investment portfolio, intangible assets, wide matrix

Procedia PDF Downloads 208
1874 Towards an Adornian Critical Theory of the Environment

Authors: Dominic Roulx

Abstract:

Many scholars have in the past decade emphasized the relevance of Adorno’s criticism of the rationalized domination of nature (Naturbeherrschung) for thinking the environmental crisis. Beyond the intersubjective critical models of thinkers such as Habermas and Honneth, Adorno’s critical theory has the benefit, according to them, of disclosing the entwinement of social and natural domination in a critically productive way. The author will be arguing in this paper that Adorno’s model of critical theory displays a theoretical framework that is both original and relevant for thinking the ins and outs of the currentenvironmental crisis. To do so, he first construe Adorno’s understanding of the historical domination of nature and argue that Adorno’s method for its criticizing is immanent critique. He puts emphasis on how his understanding of the domination of nature implicitly implies an account of thedialectical relationship between reason and nature. In doing so, he presents a naturalistic understanding of his idea of the primacy of the object. Second, regarding Adorno’s concept of nature, he discusses what he sees as the shortcomings of many commentators’ understanding of the concept of nature in Adorno. He contends that they tend to fall short of Adorno’s concept of nature in failing to make sense of its thoroughly negative signification, thereby falling into an uncritical and fetichized comprehension of “nature. Third, he discusses the prospect for a possible “reconciliation” (Versöhnung) of nature with society. Highlighting how the domination of nature proves to produce the necessary conditions for its own overcoming, he contends that reconciliation with nature relies mainly on the subject’s capacity for critical self-reflection.

Keywords: german philosophy, adorno, nature, environmental crisis

Procedia PDF Downloads 97
1873 Selecting Skyline Mash-Ups under Uncertainty

Authors: Aymen Gammoudi, Hamza Labbaci, Nizar Messai, Yacine Sam

Abstract:

Web Service Composition (Mash-up) has been considered as a new approach used to offer the user a set of Web Services responding to his request. These approaches can return a set of similar Mash-ups in a given context that makes users unable to select the perfect one. Recent approaches focus on computing the skyline over a set of Quality of Service (QoS) attributes. However, these approaches are not sufficient in a dynamic web service environment where the delivered QoS by a Web service is inherently uncertain. In this paper, we treat the problem of computing the skyline over a set of similar Mash-ups under certain dimension values. We generate dimensions for each Mash-up using aggregation operations applied to the QoS attributes. We then tackle the problem of computing the skyline under uncertain dimensions. We present each dimension value of mash-up using a frame of discernment and introduce the d-dominance using the Evidence Theory. Finally, we propose our experimental results that show both the effectiveness of the introduced skyline extensions and the efficiency of the proposed approaches.

Keywords: web services, uncertain QoS, mash-ups, uncertain dimensions, skyline, evidence theory, d-dominance

Procedia PDF Downloads 234
1872 Management Control Systems in Post-Incubation: An Investigation of Closed Down High-Technology Start-Ups

Authors: Jochen Edmund Kerschenbauer, Roman Salinger, Daniel Strametz

Abstract:

Insufficient informal communication systems can lead to the first crisis (‘Crisis of Leadership’) for start-ups. Management Control Systems (MCS) are one way for high-technology start-ups to successfully overcome these problems. So far the literature has investigated the incubation of a start-up, but focused less on the post-incubation stage. This paper focuses on the use of MCS in post-incubation and, if failed start-ups agree, on how MCS are used. We conducted 14 semi-structured interviews for this purpose, to obtain our results. The overall conclusion is that the majority of the companies were closed down due to a combination of strategic, operative and financial reasons.

Keywords: closed down, high-technology, incubation, levers of control, management control systems, post-incubation, start-ups

Procedia PDF Downloads 1093
1871 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 417
1870 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 90
1869 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 65
1868 Do European Hedge Fund Managers Time Market Liquidity?

Authors: Soumaya Ben Kheilifa, Dorra Mezzez Hmaied

Abstract:

We propose two approaches to examine whether European hedge fund managers can time market liquidity. Using a sample of 1616 European hedge funds, we find evidence of liquidity timing. More importantly, this ability adds economic value to investors. Thus, it represents valuable managerial skill and a major source of European hedge funds’ performance. Also we show that the majority of these funds demonstrate liquidity timing ability especially during liquidity crisis. Finally, it emerged that our main evidence of liquidity timing remains significant after controlling for market timing and volatility timing.

Keywords: european hedge funds, liquidity timing ability, market liquidity, crisis

Procedia PDF Downloads 392
1867 Unfolding the Affective Atmospheres during the COVID-19 Pandemic Crisis: The Constitution and Performance of Affective Governance in Taiwan

Authors: Sang-Ju Yu

Abstract:

This paper examines the changing essences and effects of ‘affective atmosphere’ during the COVID-19 pandemic crisis, which have been facilitated and shaped the ‘affective governance’ in Taiwan. Due to long-term uncertainty and unpredictability, the COVID-19 pandemic not only caused unprecedented global crisis but triggered the public’s negative emotional responses. This paper unravels how the shortage of Personal Protective Equipment and the proliferating fake news heightened people’s fear and anxiety and how specific affective atmospheres can be provoked and manipulated to harness emotional appeals of citizens strategically in Taiwan. Through the in-depth interviews with diverse stakeholders involved, it unfolds the dynamics and strategies of affective governance, wherein public emotions and concerns are now given significant consideration in both policy measures and the affective expression of leadership, spatial arrangement, service delivery, and the interaction with citizens. Addressing psychosocial and emotional needs has become the core of crisis response mechanisms suited to dynamic affective atmospheres and pandemic situation. This paper also demonstrates that epidemic prevention and control is not merely the production of neutral or rational policy-making processes, as it is dominated by multiple emotions resulted from unexpected and salient events at different moments. It provides explicit insight into how different prevention scenarios operated effectively through political and affective mobilisation to strengthen emotional bonding and collective identity which energises collective action. Basically, successful affective governance calls for both negative and positive emotions, for both scientific and political decision-making, for both community and bureaucracy, and both quality and efficiency of private–public collaboration.

Keywords: affective atmospheres, affective governance, COVID-19 pandemic, private-public collaboration

Procedia PDF Downloads 94
1866 Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform

Authors: Shuen-Tai Wang, Hsi-Ya Chang

Abstract:

Cloud virtualization technologies are becoming more and more prevalent, cloud users usually encounter the problem of how to access to the virtualized remote desktops easily over the web without requiring the installation of special clients. To resolve this issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal which running in our cloud platform from anywhere. We implemented a sketch of web interface following the cloud computing concept that seeks to enable collaboration and communication among users for high performance computing. Given the development of remote desktop virtualization, it allows to shift the user’s desktop from the traditional PC environment to the cloud platform, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: virtualization, remote desktop, HTML5, cloud computing

Procedia PDF Downloads 339
1865 Rescaled Range Analysis of Seismic Time-Series: Example of the Recent Seismic Crisis of Alhoceima

Authors: Marina Benito-Parejo, Raul Perez-Lopez, Miguel Herraiz, Carolina Guardiola-Albert, Cesar Martinez

Abstract:

Persistency, long-term memory and randomness are intrinsic properties of time-series of earthquakes. The Rescaled Range Analysis (RS-Analysis) was introduced by Hurst in 1956 and modified by Mandelbrot and Wallis in 1964. This method represents a simple and elegant analysis which determines the range of variation of one natural property (the seismic energy released in this case) in a time interval. Despite the simplicity, there is complexity inherent in the property measured. The cumulative curve of the energy released in time is the well-known fractal geometry of a devil’s staircase. This geometry is used for determining the maximum and minimum value of the range, which is normalized by the standard deviation. The rescaled range obtained obeys a power-law with the time, and the exponent is the Hurst value. Depending on this value, time-series can be classified in long-term or short-term memory. Hence, an algorithm has been developed for compiling the RS-Analysis for time series of earthquakes by days. Completeness time distribution and locally stationarity of the time series are required. The interest of this analysis is their application for a complex seismic crisis where different earthquakes take place in clusters in a short period. Therefore, the Hurst exponent has been obtained for the seismic crisis of Alhoceima (Mediterranean Sea) of January-March, 2016, where at least five medium-sized earthquakes were triggered. According to the values obtained from the Hurst exponent for each cluster, a different mechanical origin can be detected, corroborated by the focal mechanisms calculated by the official institutions. Therefore, this type of analysis not only allows an approach to a greater understanding of a seismic series but also makes possible to discern different types of seismic origins.

Keywords: Alhoceima crisis, earthquake time series, Hurst exponent, rescaled range analysis

Procedia PDF Downloads 321
1864 Cloud-Based Dynamic Routing with Feedback in Formal Methods

Authors: Jawid Ahmad Baktash, Mursal Dawodi, Tomokazu Nagata

Abstract:

With the rapid growth of Cloud Computing, Formal Methods became a good choice for the refinement of message specification and verification for Dynamic Routing in Cloud Computing. Cloud-based Dynamic Routing is becoming increasingly popular. We propose feedback in Formal Methods for Dynamic Routing and Cloud Computing; the model and topologies show how to send messages from index zero to all others formally. The responsibility of proper verification becomes crucial with Dynamic Routing in the cloud. Formal Methods can play an essential role in the routing and development of Networks, and the testing of distributed systems. Event-B is a formal technique that consists of describing the problem rigorously and introduces solutions or details in the refinement steps. Event-B is a variant of B, designed for developing distributed systems and message passing of the dynamic routing. In Event-B and formal methods, the events consist of guarded actions occurring spontaneously rather than being invoked.

Keywords: cloud, dynamic routing, formal method, Pro-B, event-B

Procedia PDF Downloads 423
1863 The Power of “Merkiavelli”: Representations of Angela Merkel in the Portuguese Press (2008-2015)

Authors: Ana Mouro, Ana Ramalheira

Abstract:

Since 1989, with the Fall of the Berlin Wall, Germany has undergone a profound restructuring political and economic process. When the Euro Crisis broke out, Germany was no longer the “sick man” of Europe. Instead, it had recovered its dominance as the strongest and wealthiest economy within the European Union. With the European Debt Crisis, that has been taking place in the European Union since the end of 2009, Germany´s Chancellor Angela Merkel has gained the power of deciding, so to say, on the fate of the debtor nations, but she neither stands for binding German commitments, nor refuses assistance. A debate on whether Merkel’s hesitation has been deliberated and used as a means of coercion has arisen on international print media, and the Portuguese Press has been no exception. This study, which was conducted by using news reporting, opinion articles, interviews and editorials, published in the Portuguese weekly Expresso and the daily Público, from 2008 to 2015, tries to show how Merkel’s hesitation, depicted in the press by the term “Merkiavelli”, was perceived in Portugal, a country that had to embrace the austerity measures, imposed by the European Central Bank, but defined under Angela Merkel´s leading role.

Keywords: Euro crisis, “Merkiavelli”, cultural studies, Portuguese quality press

Procedia PDF Downloads 258
1862 The Impact of the Interest Rates on Investments in the Context of Financial Crisis

Authors: Joanna Stawska

Abstract:

The main objective of this article is to examine the impact of interest rates on investments in Poland in the context of financial crisis. The paper also investigates the dependence of bank loans to enterprises on interbank market rates. The article studies the impact of interbank market rate on the level of investments in Poland. Besides, this article focuses on the research of the correlation between the level of corporate loans and the amount of investments in Poland in order to determine the indirect impact of central bank interest rates through the transmission mechanism of monetary policy on the real economy. To achieve the objective we have used econometric and statistical research methods like: econometric model and Pearson correlation coefficient. This analysis suggests that the central bank reference rate inversely proportionally affects the level of investments in Poland and this dependence is moderate. This is also important issue because it is related to preparing of Poland to accession to euro area. The research is important from both theoretical and empirical points of view. The formulated conclusions and recommendations determine the practical significance of the paper which may be used in the decision making process of monetary and economic authorities of the country.

Keywords: central bank, financial crisis, interest rate, investments

Procedia PDF Downloads 442
1861 The Positive Impact of COVID-19 on the Level of Investments of U.S. Retail Investors: Evidence from a Quantitative Online Survey and Ordered Probit Analysis

Authors: Corina E. Niculaescu, Ivan Sangiorgi, Adrian R. Bell

Abstract:

The COVID-19 pandemic has been life-changing in many aspects of people’s daily and social lives, but has it also changed attitudes towards investments? This paper explores the effect of the COVID-19 pandemic on retail investors’ levels of investments in the U.S. during the first COVID-19 wave in summer 2020. This is an unprecedented health crisis, which could lead to changes in investment behavior, including irrational behavior in retail investors. As such, this study aims to inform policymakers of what happened to investment decisions during the COVID-19 pandemic so that they can protect retail investors during extreme events like a global health crisis. The study aims to answer two research questions. First, was the level of investments affected by the COVID-19 pandemic, and if so, why? Second, how were investments affected by retail investors’ personal experience with COVID-19? The research analysis is based on primary survey data collected on the Amazon Mechanical Turk platform from a representative sample of U.S. respondents. Responses were collected between the 15th of July and 28th of August 2020 from 1,148 U.S. retail investors who hold mutual fund investments and a savings account. The research explores whether being affected by COVID-19, change in the level of savings, and risk capacity can explain the change in the level of investments by using regression analysis. The dependent variable is changed in investments measured as decrease, no change, and increase. For this reason, the methodology used is ordered probit regression models. The results show that retail investors in the U.S. increased their investments during the first wave of COVID-19, which is unexpected as investors are usually more cautious in crisis times. Moreover, the study finds that those who were affected personally by COVID-19 (e.g., tested positive) were more likely to increase their investments, which is irrational behavior and contradicts expectations. An increase in the level of savings and risk capacity was also associated with increased investments. Overall, the findings show that having personal experience with a health crisis can have an impact on one’s investment decisions as well. Those findings are important for both retail investors and policymakers, especially now that online trading platforms have made trading easily accessible to everyone. There are risks and potential irrational behaviors associated with investment decisions during times of crisis, and it is important that retail investors are aware of them before making financial decisions.

Keywords: COVID-19, financial decision-making, health crisis retail investors, survey

Procedia PDF Downloads 192
1860 The Corona is a Double Virus: The Effect of the Corona on Domestic Violence

Authors: B. Waked Najar

Abstract:

Since the spread of Covid- 19, Israel and other countries suffer from lockdowns and social distance, which impose different kinds of restrictions. On the one side, many organization closed and unemployment increased, bringing about economic problems and distress. On the other side, family ties were damaged due to inability to sustain close relations with some family members and too frequent interactions with others. Unfortunately, conflicts within families, controlling behavior and domestic violence appear more often. Purpose: to examine the phenomenon of domestic violence and its expansion during the Covid-19 crisis, to propose and classify strategies of dealing with it, including encouragement of public systems providing more information and support to domestic violence victims. Methodology: the author strives to reveal methods of supporting domestic violence victims through public and private treatment organizations. The author interviewed battered women and families who experienced violence during the Covid-19 crisis. Findings: victims of domestic violence often feel isolated and helpless. It is a real challenge to track and support them, especially in the traditional minorities’ communities. Research limitations: Many families refused to be interviewed because they did not want to be exposed to the community, especially religious families. Originality: research is aimed to examine a phenomenon of domestic violence during the Covid-19 crisis and methods of help and support the victims, which is not a common theme of research during the pandemic.

Keywords: violence, coronavirus, domestic violence, influence

Procedia PDF Downloads 98
1859 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 140
1858 An Examination of Crisis Communication in Sport: Lessons from Sport Organizations Responding to Coronavirus Disease Outbreak

Authors: Geumchan Hwang

Abstract:

Professional sport leagues in Europe and North America are shut down due to novel coronavirus disease (COVID-19) outbreak. Football leagues in Europe (e.g., La Liga, English Premier League, Bundesliga, Serie A, and Ligue 1) and big four professional sport leagues in North America (e.g., National Football League, Major League Baseball, National Basketball Association, and National Hockey League) are indefinitely suspended or delayed. COVID-19 outbreak has a growing negative impact on economics of sport leagues. For example, loss of revenue in Europe’s top five leagues due to the COVID-19 pandemic was estimated at € 4 billion and loss of revenue in the NBA was estimated at $650 million as of March 2020. In the unprecedented difficult situation, sport teams and leagues try to communicate with sport fans through diverse media platforms. In sport, however, very few studies have been done regarding how sport organizations effectively communicate with sport fans during pandemics, such as COVID-19 outbreak. Understanding sport organizations’ crisis communication is important to develop effective crisis management strategies for sport organizations. Therefore, the purpose of the study is to examine how sport organizations communicate with sport fans via online platforms in COVID-19 outbreak and how sport fans evaluate their communication strategies. 9 official sport league sites (i.e., five major football leagues in Europe and four major sport leagues in North America) and COVID-19 news articles published between January and June in 2020 will be analyzed in terms of coronavirus information, teams and players’ live update, fan interaction, fan support, and community engagement. In addition, comments posted on social media sites (i.e., Facebook and Twitter) of major sport leagues will be also analyzed to examine how sport fans perceive online messages provided by sport leagues as an effective communication strategy. To measure the effectiveness of crisis communication performance, five components (i.e., prompt, compassionate, honest, informative, and interactive) of crisis communication will be collected from leagues’ official websites information and social media posts. Upon completing data collection, content analysis method will be used to evaluate effectiveness of crisis communication among 9 professional sport leagues. The results of the study will provide athletic directors, administrators, and public relations managers in sport organizations with practical information regarding how athlete celebrities and sport organizations should interact with their fans in pandemic situations. In particular, this study will contribute to developing specific crisis management plan for sport organizations. For instance, football teams and leagues in Europe will be able to create standard manuals to minimize damages caused by disease outbreak, such as COVID-19 outbreak.

Keywords: COVID-19, communication, sport leagues, fans

Procedia PDF Downloads 138
1857 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 116
1856 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 320