Search results for: financial security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5341

Search results for: financial security

1651 On the Development of Medical Additive Manufacturing in Egypt

Authors: Khalid Abdelghany

Abstract:

Additive Manufacturing (AM) is the manufacturing technology that is used to fabricate fast products direct from CAD models in very short time and with minimum operation steps. Jointly with the advancement in medical computer modeling, AM proved to be a very efficient tool to help physicians, orthopedic surgeons and dentists design and fabricate patient-tailored surgical guides, templates and customized implants from the patient’s CT / MRI images. AM jointly with computer-assisted designing/computer-assisted manufacturing (CAD/CAM) technology have enabled medical practitioners to tailor physical models in a patient-and purpose-specific fashion and helped to design and manufacture of templates, appliances and devices with a high range of accuracy using biocompatible materials. In developing countries, there are some technical and financial limitations of implementing such advanced tools as an essential portion of medical applications. CMRDI institute in Egypt has been working in the field of Medical Additive Manufacturing since 2003 and has assisted in the recovery of hundreds of poor patients using these advanced tools. This paper focuses on the surgical and dental use of 3D printing technology in Egypt as a developing country. The presented case studies have been designed and processed using the software tools and additive manufacturing machines in CMRDI through cooperative engineering and medical works. Results showed that the implementation of the additive manufacturing tools in developed countries is successful and could be economical comparing to long treatment plans.

Keywords: additive manufacturing, dental and orthopeadic stents, patient specific surgical tools, titanium implants

Procedia PDF Downloads 300
1650 Level of Roles Performed in Tourism Development: The Case Study of Local Municipality, Chiang Khan District, Loei

Authors: Sukanya Sripho

Abstract:

This paper aims to examine the level of roles performed in tourism development by local people residing in Chiang Khan Sub-District Municipality, Loei Province in Northeast of Thailand. In addition, this study also tested whether personal factors had a relationship with the level of roles performed in tourism development. These personal factors included gender, age, educational level, career, position and duty in the community, average income per month, length of residence and involvement in the tourism industry. The findings revealed a high level in each role performed. These roles were ranked from the highest mean score to the lowest mean score as follows: (1) improving and rejuvenating tourist attractions; (2) improving tourist facilities; (3) promoting people participation; (4) publicizing tourist attractions; (5) protecting for safety and security; and (6) surveying and managing the information of tourist attractions. Furthermore, it was found that position and duty in the community, length of residence and involvement in tourism industry had a relationship with the level of roles performed in tourism development at a significance level of 0.05.

Keywords: Role, local municipality administration, tourism development, Thailand

Procedia PDF Downloads 425
1649 Vulnerability of Indian Agriculture to Climate Change: A Study of the Himalayan Region State

Authors: Rajendra Kumar Isaac, Monisha Isaac

Abstract:

Climate variability and changes are the emerging challenges for Indian agriculture with the growing population to ensure national food security. A study was conducted to assess the Climatic Change effects in medium to low altitude areas of the Himalayan region causing changes in land use and cereal crop productivity with the various climatic parameters. The rainfall and temperature changes from 1951 to 2013 were studied at four locations of varying altitudes, namely Hardwar, Rudra Prayag, Uttar Kashi and Tehri Garwal. It was observed that there is noticeable increment in temperature on all the four locations. It was surprisingly observed that the mean rainfall intensity of 30 minutes duration has increased at the rate of 0.1 mm/hours since 2000. The study shows that the combined effect of increasing temperature, rainfall, runoff and urbanization at the mid-Himalayan region is causing an increase in various climatic disasters and changes in agriculture patterns. A noticeable change in cropping patterns, crop productivity and land use change was observed. Appropriate adaptation and mitigation strategies are necessary to ensure that sustainable and climate-resilient agriculture. Appropriate information is necessary for farmers, as well as planners and decision makers for developing, disseminating and adopting climate-smart technologies.

Keywords: climate variability, agriculture, land use, mitigation strategies

Procedia PDF Downloads 260
1648 Politicization of Humanitarian NGOs: A Comparison Study of Oxfam and Médecins Sans Frontières (MSF)

Authors: Ratih Andaruni Widhiantari

Abstract:

The combination of the expanding population of aid agencies and the act of politicization in humanitarian intervention blurred the distinction between what humanitarianism accept as universal human rights in theory and their practices in humanitarian intervention. Humanitarian organizations were now venturing into the formerly taboo territory of politics that place individuals at risk, for examples, cooperating and coordinating with the intervening states, considering moments of destruction as opportunities for political change and even taking on functions that had once been the exclusive preserve of government. Hence, aid agencies were becoming involved in matters of local or even international politics. This study focuses on the comparison between Oxfam and Médecins Sans Frontières (MSF) or Doctor without Borders different attitudes against political influences in humanitarian aid. It aims to untangle the bewilderment whether the contradictory approach to politics will becoming a barrier to performing their principles as humanitarian actors and also the consequences of taking that one particular position. The analysis of quantitative data and qualitative literature analysis are presented. The findings indicated Oxfam is actively engaged with politics. It welcomed government and private sector to shared cooperation to reach its goals to alleviate global inequalities. On the other hand, MSF has always taken a strong position to refuse any politics influence within their aid programmes. With no financial assistance from any government, MSF is free from any direct politics intervention. Hence, it can work efficiently with a clear objective to respond the demand side pressures from the people in needs. It is still publicly against politic involvement in the humanitarian activity, but practically, it has been moving forward to politicization in its own definition.

Keywords: humanitarian agencies, humanitarian intervention, humanitarian principles, politicization of humanitarianism

Procedia PDF Downloads 263
1647 A Study on Social and Economic Conditions of Street Vendors Using Field Survey Data

Authors: Ruchika Yadav

Abstract:

Street vendors are the integral component of urban economies of the world. They are the distributors of affordable goods and services and provide convenient and accessible retail options to the customers and form a vital part of the social and economic life of a city. A street vendor as an occupation existed for hundreds of years and considered to be as a cornerstone of many cities. In this paper, our objective is to analyze the socio-economic profile of street vendors, identification of their problems and to suggest remedial measures for the betterment based on the observation and suggestions of the street vendors. To conduct this study, primary data has been collected with the help of field survey and direct questionnaire to the respondents in Aligarh City which contains all the information relevant to social and economic conditions. The overall analysis of this study reveals street vendors are the backward sections of the society possess medium to the low-level standard of living due to illiteracy; their working environment and social security issues are not addressed properly. They are unaware of many of the governmental schemes launched for poverty alleviation and their poor accessibility in basic amenities leads to the backward socio-economic status in the society. The results found in this study can be very useful and helping tool for the policymakers to know the socio-economic conditions of the street vendors in detail.

Keywords: abject poverty, socio-economic conditions, street vendors, vulnerability

Procedia PDF Downloads 122
1646 Identification of Factors Affecting Labor Productivity in Construction Projects of Iran

Authors: Elham Dehghan, A. Shirzadi Javid, Mohsen Tadayon

Abstract:

Labor productivity is very important and gained special concerns among professionals in the construction industry, worldwide. Productivity improvements on labors achieve higher cost savings with minimal investment. Due to the fact that profit margins are small on construction projects, cost savings associated with productivity are crucial to become a successful contractor. This research program studies and highlights the factors affecting labor productivity in Iranian construction industry. A questionnaire was used to gather the relevant data from respondents who involve in managing various types of projects in wide areas in Iran. It involved ranking 57 predefined factors divided into 5 categories: Human/Labor; Financial; Management; Equipments/Materials and Environmental. Total 62 feedbacks were analyzed through the Relative Importance Index (RII) technique. The top ten factors affecting construction labor productivity in Iran are: 1) Professional capability of contractor project manager, 2) skills of contractor’s project management team, 3) professional capability of owner project manager, 4) professional capability of Consulting Project manager, 5) discipline working, 6) delay payments by the owner, 7) material shortages, 8) delays in delivery of materials, 9) turnover power of the owner, 10) poor site management. Recommendations have been made in the study to address these factors. The research has direct benefits to key stakeholders in Iranian construction industry.

Keywords: Iranian construction projects, labor, productivity, relative importance index

Procedia PDF Downloads 256
1645 Potential of the Bri and the Indo-Pacific in South Asia: A Comparative Case Study

Authors: Nahian Salsabeel, Faria Leera

Abstract:

—“Whoever controls the Indian Ocean, dominates Asia. This ocean is the key to the seven seas. In the 21st century, the destiny of the world will be decided on its waters” -Alfred Mahan South Asia is increasingly becoming a hub for international politics. Numerous ventures are taking place in the strategic region. Of them, the most prominent is the Belt and Road Initiative (BRI). Originating from the concept of ancient Silk Route, the Chinese Xi Jin Ping regime looks to reestablish the vast connectivity project to connect the world through infrastructure and trade. On the other hand, the US, teamed up with India, Australia and Japan, thereby forming the Quad, have launched their own foreign policy, the Indo-Pacific Strategy. The ambitious 21st century initiative for the development of maritime trade, security and governance focuses critical importance to the Indo-Pacific region, especially to South Asia. Against the backdrop of contemporary political scenario, both the Quad and China airs to establish their own footprint across the region through respective mega projects, the Indo-Pacific Strategy and the BRI. This research employs a comparative case study research method, using a secondary research design. The paper looks at the variety of opportunities and challenges posed by the BRI and the Indo Pacific, and gives the comparative study on both ends.

Keywords: BRI, Foreign Policy, Indo-Pacific, South Asia

Procedia PDF Downloads 147
1644 Determinants of Non-Performing Loans: An Empirical Investigation of Bank-Specific Micro-Economic Factors

Authors: Amir Ikram, Faisal Ijaz, Qin Su

Abstract:

The empirical study was undertaken to explore the determinants of non-performing loans (NPLs) of small and medium enterprises (SMEs) sector held by the commercial banks. Primary data was collected through well-structured survey questionnaire from credit analysts/bankers of 42 branches of 9 commercial banks, operating in the district of Lahore (Pakistan), for 2014-2015. Selective descriptive analysis and Pearson chi-square technique were used to illustrate and evaluate the significance of different variables affecting NPLs. Branch age, duration of the loan, and credit policy were found to be significant determinants of NPLs. The study proposes that bank-specific and SME-specific microeconomic variables directly influence NPLs, while macroeconomic factors act as intermediary variables. Framework exhibiting causal nexus of NPLs was also drawn on the basis of empirical findings. The results elaborate various origins of NPLs and suggest that they are primarily instigated by the loan sanctioning procedure of the financial institution. The paper also underlines the risk management practices adopted by the bank at branch level to averse the risk of loan default. Empirical investigation of bank-specific microeconomic factors of NPLs with respect to Pakistan’s economy is the novelty of the study. Broader strategic policy implications are provided for credit analysts and entrepreneurs.

Keywords: commercial banks, microeconomic factors, non-performing loans, small and medium enterprises

Procedia PDF Downloads 245
1643 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing

Authors: Thomas Yeboah

Abstract:

Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.

Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing

Procedia PDF Downloads 613
1642 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 234
1641 Assessing the Perceptions toward the Impacts of Tourism in Poverty Alleviation: A Basis for Pro-Poor Tourism Policy in Sta. Lucia, Guimba, Nueva Ecija

Authors: Lady Salvador Purganan, Jojo M. Villamin, Noel L. Lansang

Abstract:

Tourism is a multifaceted but interdependent industry. This industry is composed of four major players, the public sector, the private sector, the local community, and the tourists. Each player has a vital role in the success of delivering high-quality tourism products and activities. There are various manifestations of positive economic outcomes that benefit the local community. Pro-poor tourism development approach has a great potential to serve as an avenue for capacity building leading to economic independence since natural attractions and cultural resources are assets that can be capitalized on, especially by the poor, because it is more accessible to them compared to financial resources. In the National Tourism Development Plan 2016-2022, specific mechanisms are not reflected to combat and lower poverty incidence through tourism. The researcher used the multidimensional poverty theory and sustainable tourism theory to formulate indicators in the research instrument and social exchange theory. The expected output of the study is to unlock opportunities, specifically in Brgy. Sta. Lucia, Guimba, Nueva Ecija, by crafting policies taking into utmost consideration local community involvement and participation in the process of tourism development which is essential in attaining inclusive growth and sustainability. This study will apply the sequential explanatory design mixed-method approach.

Keywords: pro-poor tourism, poverty alleviation, livelihood opportunities, tourism development plan

Procedia PDF Downloads 88
1640 Process Integration of Natural Gas Hydrate Production by CH₄-CO₂/H₂ Replacement Coupling Steam Methane Reforming

Authors: Mengying Wang, Xiaohui Wang, Chun Deng, Bei Liu, Changyu Sun, Guangjin Chen, Mahmoud El-Halwagi

Abstract:

Significant amounts of natural gas hydrates (NGHs) are considered potential new sustainable energy resources in the future. However, common used methods for methane gas recovery from hydrate sediments require high investment but with low gas production efficiency, and may cause potential environment and security problems. Therefore, there is a need for effective gas production from hydrates. The natural gas hydrate production method by CO₂/H₂ replacement coupling steam methane reforming can improve the replacement effect and reduce the cost of gas separation. This paper develops a simulation model of the gas production process integrated with steam reforming and membrane separation. The process parameters (i.e., reactor temperature, pressure, H₂O/CH₄ ratio) and the composition of CO₂ and H₂ in the feed gas are analyzed. Energy analysis is also conducted. Two design scenarios with different composition of CO₂ and H₂ in the feed gas are proposed and evaluated to assess the energy efficiency of the novel system. Results show that when the composition of CO₂ in the feed gas is between 43 % and 72 %, there is a certain composition that can meet the requirement that the flow rate of recycled gas is equal to that of feed gas, so as to ensure that the subsequent production process does not need to add feed gas or discharge recycled gas. The energy efficiency of the CO₂ in feed gas at 43 % and 72 % is greater than 1, and the energy efficiency is relatively higher when the CO₂ mole fraction in feed gas is 72 %.

Keywords: Gas production, hydrate, process integration, steam reforming

Procedia PDF Downloads 172
1639 Taking the Whole Picture to Your Supply Chain; Customers Will Take Selfies When Expectations Are Met

Authors: Marcelo Sifuentes López

Abstract:

Strategic performance definition and follow-up processes have to be clear in order to provide value in today’s competitive world. Customer expectations must be linked to internal organization strategic objectives leading to profitability and supported by visibility and flexibility among others.By taking a whole picture of the supply chain, the executive, and its team will define the current supply chain situation and an insight into potential opportunities to improve processes and provide value to main stakeholders. A systematic performance evaluation process based on operational and financial indicators defined by customer requirements needs to be implemented and periodically reviewed in order to mitigate costs and risks on time.Supplier long term relationship and collaboration plays a key role using resources available, real-time communication, innovation and new ways to capitalize global opportunities like emerging markets; efforts have to focus on the reduction of uncertainties in supply and demand. Leadership has to promote consistency of communication and execution involving suppliers, customers, and the entire organization through the support of a strategic sourcing methodology that assure the targeted competitive strategy and sustainable growth. As customer requirements and expectations are met, results could be captured in a casual picture like a “selfie”; where outcomes could be perceived from any desired angle by them; or like most “selfies”, can be taken with a camera held at arm's length by a third party company rather than using a self-timer.

Keywords: supply chain management, competitive advantage, value creation, collaboration and innovation, global marketplace

Procedia PDF Downloads 431
1638 Non-Linear Regression Modeling for Composite Distributions

Authors: Mostafa Aminzadeh, Min Deng

Abstract:

Modeling loss data is an important part of actuarial science. Actuaries use models to predict future losses and manage financial risk, which can be beneficial for marketing purposes. In the insurance industry, small claims happen frequently while large claims are rare. Traditional distributions such as Normal, Exponential, and inverse-Gaussian are not suitable for describing insurance data, which often show skewness and fat tails. Several authors have studied classical and Bayesian inference for parameters of composite distributions, such as Exponential-Pareto, Weibull-Pareto, and Inverse Gamma-Pareto. These models separate small to moderate losses from large losses using a threshold parameter. This research introduces a computational approach using a nonlinear regression model for loss data that relies on multiple predictors. Simulation studies were conducted to assess the accuracy of the proposed estimation method. The simulations confirmed that the proposed method provides precise estimates for regression parameters. It's important to note that this approach can be applied to datasets if goodness-of-fit tests confirm that the composite distribution under study fits the data well. To demonstrate the computations, a real data set from the insurance industry is analyzed. A Mathematica code uses the Fisher information algorithm as an iteration method to obtain the maximum likelihood estimation (MLE) of regression parameters.

Keywords: maximum likelihood estimation, fisher scoring method, non-linear regression models, composite distributions

Procedia PDF Downloads 4
1637 Economic Integration in Eurasia: Modeling of the Current and Future Architecture

Authors: M. G. Shilina

Abstract:

The prospects for political and economic development of the Eurasian space are currently discussed at both governmental and expert levels. New concepts actively proposed by the Eurasian governments require the analysis and search for effective implementation options. In the paper, an attempt to identify effective solutions to the problems surrounding the current economic integration of the Eurasian states is given on the basis of an interdisciplinary, comprehensive, structured analysis. The phenomenon is considered through the prism of the international law, world economy and politics, combined with the study of existing intergovernmental practice. The modeling method was taken as the basis for the research and is supplemented by legal and empirical methods. The detailed multi-level model of practical construction the 'Great Eurasia' (the GE) concept is proposed, the option for building a phased interaction in Eurasia is given through the prism of construction by the Eurasian Economic Union (the EAEU) as the main tool. The Shanghai Cooperation Organization (the SCO) is seen as the most promising element of the model. The SCO is capable of streamlining the formation of the GE and determine the transformation of Eurasia into a common economic space. Effective development of the economic integration between Eurasian states on the framework of the SCO is optimal. The SCO+ could be used as a platform for integration-integration processes formation. The creation of stable financial ties could become the basis for the possible formation of an expanded transregional integration platform. The paper concludes that the implementation of the proposed model could entail a gradual economic rapprochement of Eurasia and beyond.

Keywords: economic integration, The Eurasian Economic Union, The European Union, The Shanghai Cooperation Organization, the silk road economic belt

Procedia PDF Downloads 112
1636 Hacking the Spatial Limitations in Bridging Virtual and Traditional Teaching Methodologies in Sri Lanka

Authors: Manuela Nayantara Jeyaraj

Abstract:

Having moved into the 21st century, it is way past being arguable that innovative technology needs to be incorporated into conventional classroom teaching. Though the Western world has found presumable success in achieving this, it is still a concept under battle in developing countries such as Sri Lanka. Reaching the acme of implementing interactive virtual learning within classrooms is a struggling idealistic fascination within the island. In order to overcome this problem, this study is set to reveal facts that limit the implementation of virtual, interactive learning within the school classrooms and provide hacks that could prove the augmented use of the Virtual World to enhance teaching and learning experiences. As each classroom moves along with the usage of technology to fulfill its functionalities, a few intense hacks provided will build the administrative onuses on a virtual system. These hacks may divulge barriers based on social conventions, financial boundaries, digital literacy, intellectual capacity of the staff, and highlight the impediments in introducing students to an interactive virtual learning environment and thereby provide the necessary actions or changes to be made to succeed and march along in creating an intellectual society built on virtual learning and lifestyle. This digital learning environment will be composed of multimedia presentations, trivia and pop quizzes conducted on a GUI, assessments conducted via a virtual system, records maintained on a database, etc. The ultimate objective of this study could enhance every child's basic learning environment; hence, diminishing the digital divide that exists in certain communities.

Keywords: digital divide, digital learning, digitization, Sri Lanka, teaching methodologies

Procedia PDF Downloads 343
1635 Sustainable Management Practices of International Construction Joint Ventures: A Conceptual Model for Managing Barriers and Risks

Authors: Mershack O. Tetteh, Albert P. C. Chan, Amos Darko, Gabriel Nani

Abstract:

International construction joint ventures (ICJVs) have evolved as an effective approach to sustainable development, given their myriad socio-economic and environmental benefits. Yet, they are not free of barriers and risks. In many studies, it is termed as risks for convenience’s sake. While the barriers and risks continue to affect the success of ICJVs, a systematic and reliable approach for managing them has yet to be developed. This study aims to identify and classify the barriers and risks factors affecting ICJVs through a systematic literature review. Based on a critical review of 54 papers published in peer-reviewed journals from 1990 to 2019, a conceptual framework was proposed for managing the barriers and risks in ICJV operations. The review showed that the barriers can be grouped into six including inter-organizational differences, lack of expertise and confidence, lack of effective planning and strategies, lack of knowledge of ICJV’s fundamentals, conflicts among ICJV entities, and management difficulties. The risks were also categorized into six: policy and political risks, legal risks, financial risks, management risks, project and technical risks, and market risks. The developed model would help practitioners achieve more efficient resource allocation and bring new perspectives for managerial practices in ICJVs. Moreover, it is positioned to alleviate the negligence of previous studies that combined the barriers and risks factors as one checklist.

Keywords: barriers, construction, international construction joint venture, risks, sustainable development

Procedia PDF Downloads 239
1634 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 327
1633 TomoTherapy® System Repositioning Accuracy According to Treatment Localization

Authors: Veronica Sorgato, Jeremy Belhassen, Philippe Chartier, Roddy Sihanath, Nicolas Docquiere, Jean-Yves Giraud

Abstract:

We analyzed the image-guided radiotherapy method used by the TomoTherapy® System (Accuray Corp.) for patient repositioning in clinical routine. The TomoTherapy® System computes X, Y, Z and roll displacements to match the reference CT, on which the dosimetry has been performed, with the pre-treatment MV CT. The accuracy of the repositioning method has been studied according to the treatment localization. For this, a database of 18774 treatment sessions, performed during 2 consecutive years (2016-2017 period) has been used. The database includes the X, Y, Z and roll displacements proposed by TomoTherapy® System as well as the manual correction of these proposals applied by the radiation therapist. This manual correction aims to further improve the repositioning based on the clinical situation and depends on the structures surrounding the target tumor tissue. The statistical analysis performed on the database aims to define repositioning limits to be used as security and guiding tool for the manual adjustment implemented by the radiation therapist. This tool will participate not only to notify potential repositioning errors but also to further improve patient positioning for optimal treatment.

Keywords: accuracy, IGRT MVCT, image-guided radiotherapy megavoltage computed tomography, statistical analysis, tomotherapy, localization

Procedia PDF Downloads 214
1632 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA

Authors: S. Saju, G. Thirugnanam

Abstract:

In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.

Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet

Procedia PDF Downloads 516
1631 Determinants of the Shadow Economy with an Islamic Orientation: An Application to Organization of Islamic Cooperation and Non-Organization of Islamic Cooperation Countries

Authors: Shabeer Khan

Abstract:

The main objective of Islamic Finance is to promote social justice thorough financial inclusion and redistribution of economic resources between rich and poor. The approach of Islamic finance is more comprehensive in nature and covers both formal and informal sectors of the economy, first, through reducing the gap between both sectors, and second by using specific Islamic values to reallocate the wealth between formal and informal sectors. Applying Generalized Method of Movements (GMM) to the annual data spanning from 1995-2015 for 141 countries, this study explores the determinants of informal business sector in Organization of Islamic Cooperation (OIC) countries and then compares with Non-OIC countries. Economic freedom and institutions variables as well as economic growth and money supply are found to reduce informal business sector in both OIC and Non-OIC nations while government expenditure are found to increase informal business sector in both group of nations. Informal Business sector remain the same in both types of countries but still the majority Muslim population in OIC economies create main difference between both groups of nations and justify the potential role of Islamic Finance in informal business sector in OIC nations. The study suggests that institutions quality should be improved and entrepreneurs’ friendly business environment must be provided. This study refines the main features of informal business sector and discuss their implications on policy designing and implementation, particularly in the context of Islamic finance fight against poverty, inequality and improving living standards of informal sector participants in OIC countries.

Keywords: Islamic finance, informal Business Sector, Generalized Method of Movements (GMM) and OIC

Procedia PDF Downloads 141
1630 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 273
1629 The Effect of Artificial Intelligence on Human Rights Regulations

Authors: Karam Aziz Hamdy Fahmy

Abstract:

Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 50
1628 Radio Frequency Identification Device Based Emergency Department Critical Care Billing: A Framework for Actionable Intelligence

Authors: Shivaram P. Arunachalam, Mustafa Y. Sir, Andy Boggust, David M. Nestler, Thomas R. Hellmich, Kalyan S. Pasupathy

Abstract:

Emergency departments (EDs) provide urgent care to patients throughout the day in a complex and chaotic environment. Real-time location systems (RTLS) are increasingly being utilized in healthcare settings, and have shown to improve safety, reduce cost, and increase patient satisfaction. Radio Frequency Identification Device (RFID) data in an ED has been shown to compute variables such as patient-provider contact time, which is associated with patient outcomes such as 30-day hospitalization. These variables can provide avenues for improving ED operational efficiency. A major challenge with ED financial operations is under-coding of critical care services due to physicians’ difficulty reporting accurate times for critical care provided under Current Procedural Terminology (CPT) codes 99291 and 99292. In this work, the authors propose a framework to optimize ED critical care billing using RFID data. RFID estimated physician-patient contact times could accurately quantify direct critical care services which will help model a data-driven approach for ED critical care billing. This paper will describe the framework and provide insights into opportunities to prevent under coding as well as over coding to avoid insurance audits. Future work will focus on data analytics to demonstrate the feasibility of the framework described.

Keywords: critical care billing, CPT codes, emergency department, RFID

Procedia PDF Downloads 120
1627 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 322
1626 People Experiencing Economic Disadvantages and Access to Justice System: The Case of Unemployed People in Australia

Authors: M. Shahadat Hossain

Abstract:

People experiencing economic disadvantages have limited access to justice system. Employment status is a key indicator of economic disadvantage. There is a link between employment status and vulnerability to legal problems. This paper addresses the obstacles unemployed people experience to secure justice in Australia. This paper further explores exiting services for economically disadvantaged people to secure justice where these unemployment people can get access. It reveals that unemployed people are vulnerable to multifaced crime and violence. Due to high cost of legal services, these unemployed people are unable to afford legal services to access justice. They are often found higher levels of nonactions in terms of access to justice also due to lack of their initiatives. This paper further reveals that legal aid commissions are state and territory statutory agencies in Australia which provide free legal information, advice, duty lawyers, and legal representation services. Community legal centres are independent, non-profit government organizations with a focus of early advice, problem solving, and working with other agencies to address connected, financial, and health problems. Moreover, the private profession helps people who cannot afford to pay for a lawyer in several ways. But there are problems of shortage of funding for these legal services and making available to economically disadvantaged people. However, this paper argues that people experiencing long-term unemployment face barriers to secure justice due to their economic disadvantages. It further argues that services available for them to access to justice is inadequate.

Keywords: economic disadvantages, unemployment, access to justice, Australia

Procedia PDF Downloads 119
1625 Breakfast Eating Pattern Associated with Nutritional Status of Urban Primary Schoolchildren in Iran and India

Authors: Sahar Hooshmand, Mohammad Reza Bagherzadeh Anasari

Abstract:

The aim of this study was to examine the effect of breakfast eating pattern (between frequencies of breakfast consumers and non-consumers) on nutritional status (weight for age, height for age and weight for height). A total 4570 primary school children aged 6-9 years old constituted the sample. From these, 2234 Iranian school children (1218 girls and 1016 boys) and 2336 Indian school children (1096 girls and 1240 boys) were included in a cross sectional study. Breakfast frequency consumption was recorded through an interview with mothers of children. Height and wight of children were taken and body mass index were calculated. The World Health Organization’s (WHO) AnthroPlus software used to assess the nutritional status of the children. Weight for age z-scores were slightly associated with frequency of consuming breakfast in both India (χ2 = 60.083, p=0.000) and Iran (χ2 = 18.267, p=0.032). A significant association was seen between frequency of child‘s breakfast intake and the height z-scores in both India (χ2 = 31.334, p=0.000) and Iran (χ2 = 19.443, p=0.022). Most of children with normal height had breakfast daily in both countries. A significant association was seen with children‘s BMI z-scores of Indian children (χ2 = 31.247, p=0.000) but it was not significant in Iran (χ2 = 10.791, p=0.095). The present study confirms the observations of other studies that showed more frequency in having breakfast is associated with better nutritional status.

Keywords: breakfast, schoolchildren, nutritional status, global food security

Procedia PDF Downloads 499
1624 Determination of Measurement Uncertainty of the Diagnostic Meteorological Model CALMET

Authors: Nina Miklavčič, Urška Kugovnik, Natalia Galkina, Primož Ribarič, Rudi Vončina

Abstract:

Today, the need for weather predictions is deeply rooted in the everyday life of people as well as it is in industry. The forecasts influence final decision-making processes in multiple areas, from agriculture and prevention of natural disasters to air traffic regulations and solutions on a national level for health, security, and economic problems. Namely, in Slovenia, alongside other existing forms of application, weather forecasts are adopted for the prognosis of electrical current transmission through powerlines. Meteorological parameters are one of the key factors which need to be considered in estimations of the reliable supply of electrical energy to consumers. And like for any other measured value, the knowledge about measurement uncertainty is also critical for the secure and reliable supply of energy. The estimation of measurement uncertainty grants us a more accurate interpretation of data, a better quality of the end results, and even a possibility of improvement of weather forecast models. In the article, we focused on the estimation of measurement uncertainty of the diagnostic microscale meteorological model CALMET. For the purposes of our research, we used a network of meteorological stations spread in the area of our interest, which enables a side-by-side comparison of measured meteorological values with the values calculated with the help of CALMET and the measurement uncertainty estimation as a final result.

Keywords: uncertancy, meteorological model, meteorological measurment, CALMET

Procedia PDF Downloads 65
1623 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 58
1622 The Perceptions of Students in Tourism and Hospitality in Relation to the Pursuit of Higher Degrees: A Case of Walter Sisulu University

Authors: Adelaide Rethabile Motshabi Pitso-Mbili

Abstract:

Higher education institutions (HEIs) are under pressure in producing PhD graduates so that they can position themselves higher in terms of rankings. However, hospitality and tourism higher degree enrolment numbers are very low within South African universities. Furthermore, hospitality and tourism students choose these fields of study because they want to travel, be social, and have fun. Students in higher education are anxious about their future after studies as they are particularly worried about the job conditions in the hospitality and tourism sector, the remuneration, and the status perceptions of many jobs in the sector. Hence, there is a need for a continuous increase in the level of education with the formation of professional aptitudes and personnel quality. In order to understand the reasons for low enrolments, this study aims to explore the perceptions of the final year in tourism and hospitality diploma students towards enrolling for higher degree qualifications after their graduation. This paper utilised a quantitative research method, and data was gathered through questionnaires. In addition, the Linkert scale design was used for questionnaires. The questionnaires were distributed to 137 hospitality and tourism students who are on their exit level at Walter Sisulu University. SPSS was used to analyse data. The findings revealed that students do not wish to continue studying for higher degrees as they believe higher degrees are not important for the industry. Furthermore, families already have financial expectations as they think one qualification is enough. In addition, some students mentioned that they would love to study further, but lack of funding is a problem since NSFAS only funds the first qualification. Thus, it is recommended that students are made aware of the benefits and opportunities available after obtaining higher degrees.

Keywords: hospitality and tourism education, higher degrees, higher education, student’s perceptions, hospitality and tourism sector

Procedia PDF Downloads 100