Search results for: private security
1163 Internalising Islamic Principles of Theocracy as a Pedestal for Good Governance in Nigeria
Authors: Busari Moshood Olanyi
Abstract:
Good governance remains the expectation of every political party in power, especially in this democratic dispensation of the Nigerian Nation. The need to ensure that the citizenry enjoys the dividends of democracy as often promised during various electioneering campaigns is envisioned to be the motif for different agendas and political slogans by different administrations. Unfortunately, different political agendas towards the security of lives and properties, halting the pillage of the economy by corrupt public officials and creation of employment opportunities for the youths, have a record of setback in the history of political leadership and governance in Nigeria. Therefore, the paper examined the principles of Islamic theocracy in its advocacy for a paradigm shift in the Nigerian political system, with a view to engendering good governance. Islamic political terms such as Shūrā (mutual consultation), ‘Adālah (equality and justice), Khilāfah (succession and stewardship) Majlis ash-Shūrā (consultative forum) and Muḥāsabah (accountability) were espoused as sacrosanct to implementing Islamic theocracy as an alternative system of government in Nigeria. The paper concluded by being flexible on the nomenclature of the suggested political system, considering the multi-religious nature of the country as a political entity. Among other recommendations, infusion of politics into our moral/religious system and not the other way round was considered a good step in the direction of a political paradigm shift for ensuring good governance and guaranteeing its sustainability in Nigeria.Keywords: Nigerian nation, democracy, good governance, Islamic theocracy, paradigm shift
Procedia PDF Downloads 1461162 Evaluation of the Cities Specific Characteristics in the Formation of the Safavid Period Mints
Authors: Mahmood Seyyed, Akram Salehi Heykoei, Hamidreza Safakish Kashani
Abstract:
Among the remaining resource of the past, coins considered as an authentic documents among the most important documentary sources. The coins were minted in a place that called mint. The number and position of the mints in each period reflects the amount of economic power, political security and business growth, which was always fluctuated its position with changing the political and economic condition. Considering that, trade has more growth during the Safavid period than previous ones, the mint also has been in greater importance. It seems the one hand, the growth of economic in Safavid period has a direct link with the number and places of the mints at that time and in the other hand, the mints have been formed in some places because of the specific characteristic of cities and regions. Increasing the number of mints in the north of the country due to the growth of silk trade and in the west and northwest due to the political and commercial relation with Ottoman Empire, also the characteristics such as existence of mines, located in the Silk Road and communication ways, all are the results of this investigation. Accordingly, in this article researcher tries to examine the characteristics that give priority to a city for having mint. With considering that in the various historical periods, the mints were based in the most important cities in terms of political and social, at that time, this article examines the cities specific characteristics in the formation of the mints in Safavid period.Keywords: documentary sources, coins, mint, city, Safavid
Procedia PDF Downloads 2681161 Design of an Ensemble Learning Behavior Anomaly Detection Framework
Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia
Abstract:
Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing
Procedia PDF Downloads 1281160 A Causal Model for Environmental Design of Residential Community for Elderly Well-Being in Thailand
Authors: Porntip Ruengtam
Abstract:
This article is an extension of previous research presenting the relevant factors related to environmental perceptions, residential community, and the design of a healing environment, which have effects on the well-being and requirements of Thai elderly. Research methodology began with observations and interviews in three case studies in terms of the management processes and environment design of similar existing projects in Thailand. The interview results were taken to summarize with related theories and literature. A questionnaire survey was designed for data collection to confirm the factors of requirements in a residential community intended for the Thai elderly. A structural equation model (SEM) was formulated to explain the cause-effect factors for the requirements of a residential community for Thai elderly. The research revealed that the requirements of a residential community for Thai elderly were classified into three groups when utilizing a technique for exploratory factor analysis. The factors were comprised of (1) requirements for general facilities and activities, (2) requirements for facilities related to health and security, and (3) requirements for facilities related to physical exercise in the residential community. The results from the SEM showed the background of elderly people had a direct effect on their requirements for a residential community from various aspects. The results should lead to the formulation of policies for design and management of residential communities for the elderly in order to enhance quality of life as well as both the physical and mental health of the Thai elderly.Keywords: elderly, environmental design, residential community, structural equation modeling
Procedia PDF Downloads 3141159 Mobile Health Apps Can Cause More Harm Due to Health Anxiety Than Good
Authors: Malik Takreem Ahmad, Pablo Lamata, Rasi Mizori
Abstract:
Background: In recent years, mobile health apps have grown in popularity as a means for people to track and manage their health. While there is increasing worry that these applications may potentially contribute to the emergence of health anxiety, they can also help to encourage healthy behaviours and provide access to health information. Objective: The objective of this literature review is to look at available mhealth apps and critically evaluate the compromise between reassurance and anxiety. Methodology: A literature review was carried out to analyse the effects of mhealth apps on the creation of health anxiety within the general population. PubMed and SCOPUS were used to search for relevant articles, and abstracts were screened using inclusion criteria of the terms: mhealth apps; e-Health; healthcare apps; cyberchondria; Health anxiety; illness anxiety disorder. A total of 27 studies were included in the review. Results and discussion: The findings suggest a direct relationship between mobile health app use and health anxiety. The impact of mobile health apps on health anxiety may depend on how they are used - individuals receiving a constant stream of health-related information may trigger unnecessary concern about one's health. The need for more regulation and oversight is identified, which can lead to app quality and safety consistency. There are also concerns about data security and privacy and the resulting "digital gap" for individuals without mobiles or internet access. Conclusion: While health apps can be valuable tools for managing and tracking health, individuals need to use them in a balanced and informed way to avoid increased anxiety.Keywords: mobile health, mhealth apps, cyberchondria, health anxiety
Procedia PDF Downloads 921158 Health Information Needs and Utilization of Information and Communication Technologies by Medical Professionals in a Northern City of India
Authors: Sonika Raj, Amarjeet Singh, Vijay Lakshmi Sharma
Abstract:
Introduction: In 21st century, due to revolution in Information and Communication Technologies (ICTs), there has been phenomenal development in quality and quantity of knowledge in the field of medical science. So, the access to relevant information to physicians is critical to the delivery of effective healthcare services to patients. The study was conducted to assess the information needs and attitudes of the medical professionals; to determine the sources and channels of information used by them; to ascertain the current usage of ICTs and the barriers faced by them in utilization of ICTs in health information access. Methodology: This descriptive cross-sectional study was carried in 2015 on hundred medical professionals working in public and private sectors of Chandigarh. The study used both quantitative and qualitative method for data collection. A semi structured questionnaire and interview schedule was used to collect data on information seeking needs, access to ICTs and barriers to healthcare information access. Five Data analysis was done using SPSS-16 and qualitative data was analyzed using thematic approach. Results: The most preferred sources to access healthcare information were internet (85%), trainings (61%) and communication with colleagues (57%). They wanted information on new drug therapy and latest developments in respective fields. All had access to computer with but almost half assessed their computer knowledge as average and only 3% had received training regarding usage. Educational status (p=0.004), place of work (p=0.004), number of years in job (p=0.004) and sector of job (p=0.04) of doctors were found to be significantly associated with their active search for information. The major themes that emerged from in-views were need; types and sources of healthcare information; exchange of information among different levels of healthcare providers; usage of ICTs to obtain and share information; barriers to access of healthcare information and quality of health information materials and involvement in their development process Conclusion and Recommendations: The medical professionals need information in their in their due course of work. However, information needs of medical professionals were not being adequately met. There should be training of professional regarding internet skills and the course on bioinformatics should be incorporated in the curricula of medical students. The policy framework must be formulated that will encourage and promote the use of ICTs as tools for health information access and dissemination.Keywords: health information, ICTs, medical professionals, qualitative
Procedia PDF Downloads 3501157 Flood Hazard and Risk Mapping to Assess Ice-Jam Flood Mitigation Measures
Authors: Karl-Erich Lindenschmidt, Apurba Das, Joel Trudell, Keanne Russell
Abstract:
In this presentation, we explore options for mitigating ice-jam flooding along the Athabasca River in western Canada. Not only flood hazard, expressed in this case as the probability of flood depths and extents being exceeded, but also flood risk, in which annual expected damages are calculated. Flood risk is calculated, which allows a cost-benefit analysis to be made so that decisions on the best mitigation options are not based solely on flood hazard but also on the costs related to flood damages and the benefits of mitigation. The river ice model is used to simulate extreme ice-jam flood events with which scenarios are run to determine flood exposure and damages in flood-prone areas along the river. We will concentrate on three mitigation options – the placement of a dike, artificial breakage of the ice cover along the river, the installation of an ice-control structure, and the construction of a reservoir. However, any mitigation option is not totally failsafe. For example, dikes can still be overtopped and breached, and ice jams may still occur in areas of the river where ice covers have been artificially broken up. Hence, for all options, it is recommended that zoning of building developments away from greater flood hazard areas be upheld. Flood mitigation can have a negative effect of giving inhabitants a false sense of security that flooding may not happen again, leading to zoning policies being relaxed. (Text adapted from Lindenschmidt [2022] "Ice Destabilization Study - Phase 2", submitted to the Regional Municipality of Wood Buffalo, Alberta, Canada)Keywords: ice jam, flood hazard, flood risk river ice modelling, flood risk
Procedia PDF Downloads 1891156 Role of Diplomacy toward Social Welfare, Equity and Economic Growth: Case Study of President Joko Widodo's Economic Diplomacy in Investment Sector in Indonesia
Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina
Abstract:
Indonesia with its former presidents has enhanced the bilateral cooperation also multilateral cooperation in terms of economy but the result was not significant towards eradicating poverty, unemployment, income inequality, and economic growth. To eradicate these problems, President Joko Widodo through his several points of Nawacita wants to boost Indonesia’s economic relationship and cooperation which manifested in “Economic Diplomacy” as one of Indonesia’s foreign policy priority and he pitches it in international forums. The economic diplomacy does not only attracts prospective countries but also attracts the foreign businessman and investors. The economic diplomacy includes four sectors which are vital for economic growth, one of them is investment. This paper would like to answer how economic diplomacy can have significant impact towards social welfare, equity and economic growth especially in Indonesia. The purpose of this paper is to explore the role of economic diplomacy and its impact toward Indonesia’s welfare, equity, and economic growth. This paper uses the theory of economic diplomacy to link the current international political economic sphere and the impact of economic diplomacy for Indonesia through case study method. The paper affirms that economic diplomacy in investment sector does have significant impact, especially in the development of infrastructures, foreign direct investment in several sectors, and food security.Keywords: economic diplomacy, economic growth, equity, Indonesia, Joko Widodo, social welfare
Procedia PDF Downloads 3101155 Potential Contribution of Local Food Resources towards Sustainable Food Tourism in Nueva Vizcaya
Authors: Marvin Eslava
Abstract:
The over-arching aim of this research is to determine the potential contribution of local food resources to the tourism growth of Nueva Vizcaya. It reviews some of the underpinning concepts and to provide a set of considerations for stakeholders to maximize the opportunity of local food can offer to businesses and the wider community. The basis of the study is to develop a sustainable food tourism model for Nueva Vizcaya. For the purpose of this research, there were 60 total numbers of respondents classified as samples from a six municipality. The respondents of the study were stakeholder consisting of government official, local producers, businessman and Non-government organizations in the selected municipalities of Nueva Vizcaya. Stratified purposive sampling was the appropriate technique that was used to the local government officials and employees, NGOs including the businessmen who are associated with local food resources and local producers. The documentary study, focus group discussion and survey questionnaire was used in order to meet the objectives of the study. Kruskall Wallis test was used to test the variances the ratings of the participants. This was used in the computation of hypothesis. The study concluded that the province of Nueva Vizcaya is blessed for its rich farmlands and fertile mountain soil boasts to produce high quality agricultural products. It is a home of various different indigenous groups creating a wide range of local cuisine. The province has substantial local food development evidence by the various food tourism related resources, increase in facilities and celebrating food tourism related events. The local food resources provide extensive potential economic empowerment and help in building the identity of the province. In addition, the local food resources extensively enhance the agriculture sector and other attractions in the province. Finally, it helps to preserve the authenticity of the food culture and generated pride among all stakeholders extensively. All stakeholders have the same perception on the potential contribution of local food resources to the development of the province of Nueva Vizcaya. The public and private sectors are cognizant on their roles to support the production of local food resources in Nueva Vizcaya. Major challenges and barriers in the development of sustainable food tourism in Nueva Vizcaya include production or supply and marketing.Keywords: local food resources, contribution, food tourism, benefits
Procedia PDF Downloads 2621154 A Compact Ultra-Wide Band Antenna with C-Shaped Slot for WLAN Notching
Authors: Maryam Rasool, Farhan Munir, Fahad Nawaz, Saad Ahmad
Abstract:
A patch antenna operating in the Ultra-Wide Band of frequency (3.1 GHz – 10.6 GHz) is designed with enhanced security from interference from other applications by incorporating the notching technique. Patch antennas in the Ultra-Wide Band are becoming widely famous due to their low power, light weight and high data rate capability. Micro strip patch antenna’s patch can be altered to increase its bandwidth and introduce UWB character in it. The designed antenna is a patch antenna consisting of a conductive sheet of metal mounted over a large sheet of metal called the ground plane with a substrate separating the two. Notched bands are public safety WLAN, WLAN and FSS. Different techniques used to implement the UWB antenna were individually implemented and there results were examined. V shaped patch was then chosen and modified to an arrow shaped patch to give the optimized results operating on the entire UWB region with considerable return loss. The frequency notch prevents the operation of the antenna at a particular range of frequency, hence minimizing interference from other systems. There are countless techniques for introducing the notch but we have used inverted C-shaped slots in the UWB patch to get the notch characteristics as output and also wavelength resonators to introduce notch in UWB band. The designed antenna is simulated in High Frequency Structural Simulator (HFSS) 13.0 by Ansoft.Keywords: HFSS, Notch, UWB, WLAN
Procedia PDF Downloads 4171153 ASEAN Limited Centrality in Connectivity: Managing the China-Japan Infrastructure Competition
Authors: Barbora Valockova
Abstract:
Scholars recommend the establishment of a multilateral coordination mechanism by ASEAN, such as an infrastructure forum, to contain the China-Japan infrastructure financing competition in the region. However, they do not systematically investigate the reasons for its absence. This paper aims to fill the gap by addressing the following question: Why has ASEAN been unable to set up any multilateral coordination mechanism to soften the China-Japan infrastructure financing competition? This paper argues that ASEAN has not been able to set up such a mechanism due to its limited centrality in connectivity. This limited centrality decreases ASEAN’s ability to manage the China-Japan competition in a more comprehensive and coordinated way. Rather, ASEAN acts as a scope setter in connectivity, although this is not completely ineffective. This paper is divided into four sections. The first section explores the key tenets of the concept of ASEAN centrality in connectivity, which is under-examined in the current literature. The second section examines the extent to which ASEAN limited centrality in connectivity is being respected by China and Japan. The third section analyses how various stakeholders, such as ASEAN member states, their leaders and bureaucracy, and foreign private companies prevent ASEAN from attaining stronger centrality. The last section concludes and offers recommendations. Data is gathered using primary sources (official ASEAN, Chinese, and Japanese documents, interviews, etc.) and secondary material. By providing a nuanced analysis of ASEAN centrality in connectivity and developing a new operationalization of the concept, this paper aims to contribute to the international relations literature on ASEAN centrality. Initial findings suggest that while ASEAN limited centrality in connectivity has some effectiveness, it is not sufficient for setting up a multilateral coordination mechanism. While it represents a solid departure point, any potential possessed by ASEAN to evolve beyond a scope setter in connectivity is hampered by stakeholders involved in infrastructure development. While these players and their interactions can have both positive and negative effects on the scope set by ASEAN, it is unlikely that they would allow ASEAN to become the real central player. There can be no stronger ASEAN centrality in connectivity without ASEAN unity and neutrality. However, the last two factors are difficult to attain in the context of infrastructure development since ASEAN member states and stakeholders all have their styles and preferences. All other things being equal, these circumstances favor a loose, vague, and quasi-prescriptive arrangement among the relevant stakeholders.Keywords: ASEAN centrality, China-Japan infrastructure competition, connectivity, scope setter
Procedia PDF Downloads 2001152 Semantic Differences between Bug Labeling of Different Repositories via Machine Learning
Authors: Pooja Khanal, Huaming Zhang
Abstract:
Labeling of issues/bugs, also known as bug classification, plays a vital role in software engineering. Some known labels/classes of bugs are 'User Interface', 'Security', and 'API'. Most of the time, when a reporter reports a bug, they try to assign some predefined label to it. Those issues are reported for a project, and each project is a repository in GitHub/GitLab, which contains multiple issues. There are many software project repositories -ranging from individual projects to commercial projects. The labels assigned for different repositories may be dependent on various factors like human instinct, generalization of labels, label assignment policy followed by the reporter, etc. While the reporter of the issue may instinctively give that issue a label, another person reporting the same issue may label it differently. This way, it is not known mathematically if a label in one repository is similar or different to the label in another repository. Hence, the primary goal of this research is to find the semantic differences between bug labeling of different repositories via machine learning. Independent optimal classifiers for individual repositories are built first using the text features from the reported issues. The optimal classifiers may include a combination of multiple classifiers stacked together. Then, those classifiers are used to cross-test other repositories which leads the result to be deduced mathematically. The produce of this ongoing research includes a formalized open-source GitHub issues database that is used to deduce the similarity of the labels pertaining to the different repositories.Keywords: bug classification, bug labels, GitHub issues, semantic differences
Procedia PDF Downloads 2041151 An Examination of Factors Leading to Knowledge-Sharing Behavior of Sri Lankan Bankers
Authors: Eranga N. Somaratna, Pradeep Dharmadasa
Abstract:
In the current competitive environment, the factors leading to organization success are not limited to the investment of capital, labor, and raw material, but in the ability of knowledge innovation from all the members of an organization. However, knowledge on its own cannot provide organizations with its promised benefits unless it is shared, as organizations are increasingly experiencing unsuccessful knowledge sharing efforts. In such a backdrop and due to the dearth of research in this area in the South Asian context, the study set forth to develop an understanding of the factors that influence knowledge-sharing behavior within an organizational framework, using widely accepted social psychology theories. The purpose of the article is to discover the determinants of knowledge-sharing intention and actual knowledge sharing behaviors of bank employees in Sri Lanka using an aggregate model. Knowledge sharing intentions are widely discussed in literature through the application of Ajzen’s Theory of planned behavior (TPB) and Theory of Social Capital (SCT) separately. Both the theories are rich to explain knowledge sharing intention of workers with limitations. The study, therefore, combines the TPB with SCT in developing its conceptual model. Data were collected through a self-administrated paper-based questionnaire of 199 bank managers from 6 public and private banks of Sri Lanka and analyzed the suggested research model using Structural Equation Modelling (SEM). The study supported six of the nine hypotheses, where Attitudes toward Knowledge Sharing Behavior, Perceived Behavioral Control, Trust, Anticipated Reciprocal Relationships and Actual Knowledge Sharing Behavior were supported while Organizational Climate, Sense of Self-Worth and Anticipated Extrinsic Rewards were not, in determining knowledge sharing intentions. Furthermore, the study investigated the effect of demographic factors of bankers (age, gender, position, education, and experiences) to the actual knowledge sharing behavior. However, findings should be confirmed using a larger sample, as well as through cross-sectional studies. The results highlight the need for theoreticians to combined TPB and SCT in understanding knowledge workers’ intentions and actual behavior; and for practitioners to focus on the perceptions and needs of the individual knowledge worker and the need to cultivate a culture of sharing knowledge in the organization for their mutual benefit.Keywords: banks, employees behavior, knowledge management, knowledge sharing
Procedia PDF Downloads 1331150 Data-Driven Monitoring and Control of Water Sanitation and Hygiene for Improved Maternal Health in Rural Communities
Authors: Paul Barasa Wanyama, Tom Wanyama
Abstract:
Governments and development partners in low-income countries often prioritize building Water Sanitation and Hygiene (WaSH) infrastructure of healthcare facilities to improve maternal healthcare outcomes. However, the operation, maintenance, and utilization of this infrastructure are almost never considered. Many healthcare facilities in these countries use untreated water that is not monitored for quality or quantity. Consequently, it is common to run out of water while a patient is on their way to or in the operating theater. Further, the handwashing stations in healthcare facilities regularly run out of water or soap for months, and the latrines are typically not clean, in part due to the lack of water. In this paper, we present a system that uses Internet of Things (IoT), big data, cloud computing, and AI to initiate WaSH security in healthcare facilities, with a specific focus on maternal health. We have implemented smart sensors and actuators to monitor and control WaSH systems from afar to ensure their objectives are achieved. We have also developed a cloud-based system to analyze WaSH data in real time and communicate relevant information back to the healthcare facilities and their stakeholders (e.g., medical personnel, NGOs, ministry of health officials, facilities managers, community leaders, pregnant women, and new mothers and their families) to avert or mitigate problems before they occur.Keywords: WaSH, internet of things, artificial intelligence, maternal health, rural communities, healthcare facilities
Procedia PDF Downloads 241149 Innovation Management in State-Owned-Enterprises in the Digital Transformation: An Empirical Case Study of Swiss Post
Authors: Jiayun Shen, Lorenz Wyss, Thierry Golliard, Matthias Finger
Abstract:
Innovation is widely recognized as the key for private enterprises to win the market competition. The state-owned-enterprises need to be innovative to compete in the market after the privatization as well. However, it is a lack of research to study how state-owned-enterprises manage innovation to create new products and services. Swiss Post, a Swiss state-owned-enterprises, has established a department to transform the corporate culture and foster innovation to achieve digital transformation. This paper describes the innovation management process at the Swiss Post and analyzes the impacts of the instruments, the organizational structure, and explores the barriers of innovation. This study used qualitative methods based on a review of the literature on innovation management and semi-structured interviews. Being established for over five years, the Swiss Post’s innovation management department has established a software-assisted modularized platform with systematic instruments to help the internal employees with the different innovation processes. It guides the innovators from idea creation to piloting in markets and supports with a separate financing source, with knowledge inputs and coaching, as well as with connections to external partners through the open innovation and venturing team. The platform also adapts to different business units within the corporate with a customized tailor for the various operational business units. The separate financing instruments enabled the creation and further development of new ideas; the coaching services contribute greatly to the transformation of teams’ innovation culture by providing new knowledge, thinking methods, and use cases for inspiration. It also facilitates organizational learning to help the whole corporate with the digital transformation. However, it is also confronted with a big challenge in twofold. Internally, the disruptive projects often hardly overcome the obstacles of long-established operational processes in the traditional business units; externally, the expectations of the public and restrictions from the federal government have become high hurdles for the company to stay and compete in the innovation track.Keywords: empirical case study, innovation management, state-owned-enterprise, Swiss Post
Procedia PDF Downloads 1241148 Impact of Hooliganism on Sports
Authors: Ernest Boateng Nuako
Abstract:
This research is to find the effects of sports hooliganism on Ashanti school sports and find out some possible ways of amending or controlling them if we are to still experience them in our sporting fraternity. The researcher limited himself to the Ashanti region. The sample population was made up of officials, performances, and spectators drawn from four major second-cycle institutions and four basic schools in Ashanti. In all, 150 respondents were used, and all of them fell into the set of population, that is, performers, officials, and spectators. A structured questionnaire consisting of 29 statements where used to solicit views and opinions from the respondents on the effects of sports hooliganism in Ashanti school sports. Microsoft Office Excel tool (MS Excel) was used to analyze the response of the respondents, and the results were expressed in percentages. The study is aimed at finding out the effect sports hooliganism has on school sports festivals in Ghana with the Ashanti region as a case study and identify possible controlling measures to curb down the fast-pace effect of hooliganism on Ashanti regional schools. The research seeks to assist sports officials to identify some effects of sports hooliganism in Ashanti regional schools. It is also there to help officials to identify the influence hooliganism has on sports. This research also serves as a guide to other researchers who want to go into researching sports in the region. This research revealed that sports hooliganism has, in diverse ways, affected school sports in the region. It was also evident from the research study that sanctions, the presence of security, and other employable remedies could be used in controlling this unfortunate incident during our school sports competitions.Keywords: officiating officials, school sports, hooliganism, spectators, performer
Procedia PDF Downloads 1161147 Renewable Energy Industry Trends and Its Contributions to the Development of Energy Resilience in an Era of Accelerating Climate Change
Authors: A. T. Asutosh, J. Woo, M. Kouhirostami, M. Sam, A. Khantawang, C. Cuales, W. Ryor, C. Kibert
Abstract:
Climate change and global warming vortex have grown to alarming proportions. Therefore, the need for a shift in the conceptualization of energy production is paramount. Energy practices have been created in the current situation. Fossil fuels continue their prominence, at the expense of renewable sources. Despite this abundance, a large percentage of the world population still has no access to electricity but there have been encouraging signs in global movement from nonrenewable to renewable energy but means to reverse climate change have been elusive. Worldwide, organizations have put tremendous effort into innovation. Conferences and exhibitions act as a platform that allows a broad exchange of information regarding trends in the renewable energy field. The Solar Power International (SPI) conference and exhibition is a gathering of concerned activists, and probably the largest convention of its kind. This study investigates current development in the renewable energy field, analyzing means by which industry is being applied to the issue. In reviewing the 2019 SPI conference, it was found innovations in recycling and assessing the environmental impacts of the solar products that need critical attention. There is a huge movement in the electrical storage but there exists a large gap in the development of security systems. This research will focus on solar energy, but impacts will be relevant to the entire renewable energy market.Keywords: climate change, renewable energy, solar, trends, research, solar power international, SPI
Procedia PDF Downloads 1091146 Design of Dry Chemical Fire Extinguisher Inspection Equipment in Order to Reduce Ergonomic Risks for Fire Extinguisher Inspectors
Authors: Sitrapee Changmuenwai, Sudaratana Wongweragiat
Abstract:
It is important that a dry chemical fire extinguisher must be inspected for its readiness. For each inspection, the inspectors need to turn the fire extinguisher tank upside down to let the chemical inside the tank move and prevent solidification, which would make the tank not ready for usage when needed. Each tank weighs approximately 16 kg. The inspectors have to turn each tank upside down twice (2 minutes/round). They need to put the tanks over their shoulder close to their ear in order to hear the chemical flow inside the tank or use their hands to feel it. The survey and questionnaire 'The Questionnaire Know Body', which includes neck, left shoulder, upper and lower right arms suggest that all 12 security staffs have the same fatigues. The current dry chemical fire extinguisher inspection affects various ergonomic health problems. Rapid Entire Body Assessment (REBA) is used for evaluation of posture risks so that the working postures may be redesigned or corrected. The dry chemical fire extinguisher inspection equipment has been developed to reduce ergonomic health risks for the inspectors. A REBA analysis has been performed again, and the risk score has been decreased from 13 to 3. In addition, feedbacks from the first trial of the developed equipment show that there are demands to increase the installation in order to reduce the ergonomic health risks.Keywords: dry chemical fire extinguisher inspection equipment, ergonomic, REBA, rapid entire body assessment
Procedia PDF Downloads 1221145 Impact of Aquaculture on Sustainable Development in Nigeria
Authors: Titilayo Shodeinde, Bukola Dawodu
Abstract:
Aquaculture practice in Nigeria is an industry that includes fish development in a controlled situation. It has developed through various stages and stages with its latent capacity yet to be completely tapped. To avow this potential in adding to human advancement, nourishment security and improved way of life, the aquaculture business requires new approaches. Subsequently, this seminar paper reviews the impact of aquaculture on sustainable development in Nigeria. The examination received on subjective research strategy. The segments and the frameworks of business fish cultivating were completely talked about. Additionally, imperatives to business fish cultivating in the area were explained. The systems for advancing business aquaculture, for example, increment in consciousness of aquaculture items, financing of aquaculture data sources, preparing and labor improvement, government support, arrangement of fish ranchers agreeable social orders, access to advances and credit offices, advancement of research exercises, viable fisheries approaches, great institutional structure, and decreasing the degrees of defilement and instability in the district, were plainly brought up as a veritable devices, for changing the current situation with aquaculture in Niger Delta, through arranged, engaged and composed compelling administration procedures, by singular ranchers, government organizations and applicable foundations for economical advancement of the locale specifically and the nation by and large.Keywords: aquaculture, sustainability, Nigeria, research
Procedia PDF Downloads 2201144 Including Local Economic and Anthropometric Parameters in the Design of an Stand up Wheelchair
Authors: Urrutia Fernando, López Jessica, Sánchez Carlos, San Antonio Thalía
Abstract:
Ecuador, as a signatory country of the convention of the rights of persons with disabilities (CRPD) has, in the recent years, strengthened the structures and legal framework required to protect this minority comprised of 13.2% of its total population. However, the reality is that this group has disproportionately low earnings and low educational attainment in comparison with the general population. The main struggles, to promote job placement of wheelchairs users, are environmental discrimination caused by accessibility in structures and transportation, this mainly due to the cost, for private and public entities, of performing the reasonable accommodation they require. It is widely known that product development and production is needed to support effective implementation of the CRPD and that walking and standing are the major life activities, in this context the objective of this investigation is to promote job placement of wheelchair user in the province of Tungurahua by means of the design, production and marketing of a customized stand up wheelchair. Exploratory interviews and measurements were performed in a representative sample of working age wheelchairs users that develop their disability after achieving their physical maturity and that are capable of performing professional activities with their upper limbs, this in order to detect the user’s preference and determine the local economic and anthropometric parameters to be included in the wheelchair design. The findings reveal factors that uniquely impact quality of life and development for people with a mobility disability within the context of the province, first that transportation is a big issue since public buses does not have accessibility for wheelchair users and the absence of curb cuts and the presence of trash bins over the sidewalks among other hinders an economic independent mobility, second that the proposal based in the idea of modifying the wheelchairs to make it able to overcome certain obstacles helps people in wheelchair to improve their independent living and by reducing the costs of modification for the employer could improve their chances of finding work.Keywords: anthropometrics, job placement, stand up wheelchair, user centered design
Procedia PDF Downloads 5571143 Anti-Corruption Strategies for Private Sector Development: Case Study for the Brazilian Automotive Industry
Authors: Rogerio Vieira Dos Reis
Abstract:
Countries like Brazil that despite fighting hard against corruption are not improving their corruption perception, especially due to systemic political corruption, should review their corruption prevention strategies. This thesis brings a case study based on an alternative way of preventing corruption: addressing the corruption drivers in public policies that lead to poor economic performance. After discussing the Brazilian industrial policies adopted recently, especially the measures towards the automotive sector, two corruption issues in this sector are analyzed: facilitating payment for fiscal benefits and buying the extension of fiscal benefits. In-depth interviews conducted with a policymaker and an executive of the automobile sector provide insights for identifying three main corruption drivers: excessive and unnecessary bureaucracy, a complex tax system and the existence of a closed market without setting performance requirements to be achieved by the benefited firms. Both the identification of the drivers of successful industrial policies and the proposal of anti-corruption strategies to ensure developmental outcomes are based on the economic perspective of industrial policy advocated by developmental authors and on the successful South Korean economic development experience. Structural anti-corruption measures include tax reform, the regulation of lobbying and legislation to allow corporate political contribution. Besides improving policymakers’ technical capabilities, measures at the ministry level include redesigning the automotive regimes as long-term policies focused on national investment with simple and clear rules and making fiscal benefits conditional upon performance targets focused on suppliers. This case study is of broader interest because it recommends the importance of adapting performance audits conducted by anti-corruption agencies, to focus not only on the delivery of public services, but also on the identification of potentially highly damaging corruption drivers in public policies that grant fiscal benefits to achieve developmental outcomes.Keywords: Brazilian automotive sector, corruption, economic development, industrial policy, Inovar-Auto
Procedia PDF Downloads 2131142 Feasibility Study for the Implementation of a Condition-Based Maintenance System in the UH-60 Helicopters
Authors: Santos Cabrera, Halbert Yesid, Moncada Nino, Alvaro Fernando, Rincon Cuta, Yeisson Alexis
Abstract:
The present work evaluates the feasibility of implementing a health and use monitoring system (HUMS), based on vibration analysis as a condition-based maintenance program for the UH60L 'Blackhawk' helicopters. The mixed approach used consists of contributions from national and international experts, the analysis of data extracted from the software (Meridium), the correlation of variables derived from the diagnosis of availability, the development, and application of the HUMS system, the evaluation of the latter through of the use of instruments designed for the collection of information using the DELPHI method and data capture with the device installed in the helicopter studied. The results obtained in the investigation reflect the context of maintenance in aerial operations, a reduction of operation and maintenance costs of over 2%, better use of human resources, improvement in availability (5%), and fulfillment of the aircraft’s security standards, enabling the implementation of the monitoring system (HUMS) in the condition-based maintenance program. New elements are added to the study of maintenance based on condition -specifically, in the determination of viability based on qualitative and quantitative data according to the methodology. The use of condition-based maintenance will allow organizations to adjust and reconfigure their strategic, logistical, and maintenance capabilities, aligning them with their strategic objectives of responding quickly and adequately to changes in the environment and operational requirements.Keywords: air transportation sustainability, HUMS, maintenance based condition, maintenance blackhawk capability
Procedia PDF Downloads 1581141 A Transformer-Based Question Answering Framework for Software Contract Risk Assessment
Authors: Qisheng Hu, Jianglei Han, Yue Yang, My Hoa Ha
Abstract:
When a company is considering purchasing software for commercial use, contract risk assessment is critical to identify risks to mitigate the potential adverse business impact, e.g., security, financial and regulatory risks. Contract risk assessment requires reviewers with specialized knowledge and time to evaluate the legal documents manually. Specifically, validating contracts for a software vendor requires the following steps: manual screening, interpreting legal documents, and extracting risk-prone segments. To automate the process, we proposed a framework to assist legal contract document risk identification, leveraging pre-trained deep learning models and natural language processing techniques. Given a set of pre-defined risk evaluation problems, our framework utilizes the pre-trained transformer-based models for question-answering to identify risk-prone sections in a contract. Furthermore, the question-answering model encodes the concatenated question-contract text and predicts the start and end position for clause extraction. Due to the limited labelled dataset for training, we leveraged transfer learning by fine-tuning the models with the CUAD dataset to enhance the model. On a dataset comprising 287 contract documents and 2000 labelled samples, our best model achieved an F1 score of 0.687.Keywords: contract risk assessment, NLP, transfer learning, question answering
Procedia PDF Downloads 1301140 Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells
Authors: Andrea Tundis, Carlos García Cordero, Rolf Egert, Alfredo Garro, Max Mühlhäuser
Abstract:
Resilience is an important system property that relies on the ability of a system to automatically recover from a degraded state so as to continue providing its services. Resilient systems have the means of detecting faults and failures with the added capability of automatically restoring their normal operations. Mastering resilience in the domain of Cyber-Physical Systems is challenging due to the interdependence of hybrid hardware and software components, along with physical limitations, laws, regulations and standards, among others. In order to overcome these challenges, this paper presents a modeling approach, based on the concept of Dynamic Cells, tailored to the management of Smart Grids. Additionally, a heuristic algorithm that works on top of the proposed modeling approach, to find resilient configurations, has been defined and implemented. More specifically, the model supports a flexible representation of Smart Grids and the algorithm is able to manage, at different abstraction levels, the resource consumption of individual grid elements on the presence of failures and faults. Finally, the proposal is evaluated in a test scenario where the effectiveness of such approach, when dealing with complex scenarios where adequate solutions are difficult to find, is shown.Keywords: cyber-physical systems, energy management, optimization, smart grids, self-healing, resilience, security
Procedia PDF Downloads 3271139 Representation of Pashtuns in the Context of Terrorism: A Comparative Study of Bollywood and Lollywood Movies After 9/11
Authors: Aamir Ayub, Yasir Shehzad, Shakeel Ahmad
Abstract:
This research paper aims to understand how the Pashtuns have been represented in relationship to terrorism in post-9/11 Bollywood and Lollywood movies. It focuses particularly on ‘Torbaaz’ from Bollywood and ‘Waar’ from Lollywood in order to define the nature of Pashtun characterization, the functioning of intelligence agencies, as well as the socio-political side of the represented narratives. In this research, the analytical approach developed is applied to contemplate how these films represent or fail to represent Pashtun identity, taking into consideration the cultural, historical and social dimensions. The study also aims to examine the effects of the media, particularly on the different ethnic groups’ perceptions of terrorism. In this case, it covers how the movie relates actual events in society – specifically, socio-political – to the messages in the film regarding the Pashtun people and their portrayal. Such elements may constitute the portrayal of intelligence agencies and their fight against terrorism, state-security dynamics, and the Pashtun society. In conclusion, this research paper focuses on the representation of Pashtuns in films after 9/11 and addresses the issue concerning the representation of ethnic groups in the method of the theme of terrorism. It provides ideas about the role of media in influencing the mind of the society and their attitude towards certain communities after geopolitics upheavals.Keywords: pashtun representation, terrorism, 9/11 attacks, socio-political implications, ethnic representation in media
Procedia PDF Downloads 251138 The Impact of Human Rights Violation in Modern Society
Authors: Hanania Nasan Shokry Abdelmasih
Abstract:
The interface between improvement and human rights has long been the subject of scholarly debate. As an end result, a hard and fast of principles, starting from the proper improvement to a human rights-based totally technique to development, have been adopted to understand the dynamics among the two concepts. In spite of those attempts, the precise link between development and human rights is not yet fully understood. However, the inevitable interdependence between the two standards and the idea that development efforts must be made while respecting human rights have received prominence in recent years. Then again, the emergence of sustainable development as a widely spread method in development dreams and rules similarly complicates this unresolved convergence. The place of sustainable improvement inside the human rights discourse and its role in ensuring the sustainability of improvement programs require systematic research. The purpose of this newsletter is, therefore, to take a look at the relationship between development and human rights, with particular attention to the area of the standards of sustainable improvement in international human rights regulation. It's going to examine whether it recognizes the proper to achieve sustainable improvement. Hence, the Article states that the principles of sustainable improvement are diagnosed immediately or implicitly in numerous human rights devices, which is an affirmative solution to the question posed above. Therefore, this report scrutinizes worldwide and local human rights gadgets, as well as the case regulation and interpretations of human rights in our bodies, to support this speculation.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 361137 Analysis of Crisis Management Systems of United Kingdom and Turkey
Authors: Recep Sait Arpat, Hakan Güreşci
Abstract:
Emergency, disaster and crisis management terms are generally perceived as the same processes. This conflict effects the approach and delegating policy of the political order. Crisis management starts in the aftermath of the mismanagement of disaster and emergency. In the light of the information stated above in this article Turkey and United Kingdom(UK)’s crisis management systems are analyzed. This article’s main aim is to clarify the main points of the emergency management system of United Kingdom and Turkey’s disaster management system by comparing them. To do this: A prototype model of the political decision making processes of the countries is drawn, decision making mechanisms and the planning functions are compared. As a result it’s found that emergency management policy in Turkey is reactive whereas it’s proactive in UK; as the delegating policy Turkey’s system is similar to UK; levels of emergency situations are similar but not the same; the differences are stemming from the civil order and nongovernmental organizations effectiveness; UK has a detailed government engagement model to emergencies, which shapes the doctrine of the approach to emergencies, and it’s successful in gathering and controlling the whole state’s efforts; crisis management is a sub-phase of UK emergency management whereas it’s accepted as a outmoded management perception and the focal point of crisis management perception in UK is security crisis and natural disasters while in Turkey it is natural disasters. In every anlysis proposals are given to Turkey.Keywords: crisis management, disaster management, emergency management, turkey, united kingdom
Procedia PDF Downloads 3721136 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability
Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi
Abstract:
There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitizationKeywords: cybersecurity, supply chain methodology, secure substation, digitization
Procedia PDF Downloads 651135 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan
Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson
Abstract:
Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries
Procedia PDF Downloads 2221134 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks
Authors: Naghmeh Moradpoor Sheykhkanloo
Abstract:
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection
Procedia PDF Downloads 470