Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6007

Search results for: security service

2137 Hydro-Gravimetric Ann Model for Prediction of Groundwater Level

Authors: Jayanta Kumar Ghosh, Swastik Sunil Goriwale, Himangshu Sarkar

Abstract:

Groundwater is one of the most valuable natural resources that society consumes for its domestic, industrial, and agricultural water supply. Its bulk and indiscriminate consumption affects the groundwater resource. Often, it has been found that the groundwater recharge rate is much lower than its demand. Thus, to maintain water and food security, it is necessary to monitor and management of groundwater storage. However, it is challenging to estimate groundwater storage (GWS) by making use of existing hydrological models. To overcome the difficulties, machine learning (ML) models are being introduced for the evaluation of groundwater level (GWL). Thus, the objective of this research work is to develop an ML-based model for the prediction of GWL. This objective has been realized through the development of an artificial neural network (ANN) model based on hydro-gravimetry. The model has been developed using training samples from field observations spread over 8 months. The developed model has been tested for the prediction of GWL in an observation well. The root means square error (RMSE) for the test samples has been found to be 0.390 meters. Thus, it can be concluded that the hydro-gravimetric-based ANN model can be used for the prediction of GWL. However, to improve the accuracy, more hydro-gravimetric parameter/s may be considered and tested in future.

Keywords: machine learning, hydro-gravimetry, ground water level, predictive model

Procedia PDF Downloads 108
2136 Small Businesses as Vehicles for Job Creation in North-West Nigeria

Authors: Mustapha Shitu Suleiman, Francis Neshamba, Nestor Valero-Silva

Abstract:

Small businesses are considered as engine of economic growth, contributing to employment generation, wealth creation, and poverty alleviation and food security in both developed and developing countries. Nigeria is facing many socio-economic problems and it is believed that by supporting small business development, as propellers of new ideas and more effective users of resources, often driven by individual creativity and innovation, Nigeria would be able to address some of its economic and social challenges, such as unemployment and economic diversification. Using secondary literature, this paper examines the role small businesses can play in the creation of jobs in North-West Nigeria to overcome issues of unemployment, which is the most devastating economic challenge facing the region. Most studies in this area have focused on Nigeria as a whole and only a few studies provide a regional focus, hence, this study will contribute to knowledge by filling this gap by concentrating on North-West Nigeria. It is hoped that with the present administration’s determination to improve the economy, small businesses would be used as vehicles for diversification of the economy away from crude oil to create jobs that would lead to a reduction in the country’s high unemployment level.

Keywords: job creation, north-west, Nigeria, small business, unemployment

Procedia PDF Downloads 284
2135 Different Approaches to the Study of Territorial Dispute between China and India

Authors: Albina Muratbekova

Abstract:

One of the main tensions and challenges in the development of Sino-Indian relation is the demarcation of its frontiers. The fact that throughout the history borders had never been demarcated on ground occur a dispute between China and India after receiving sovereignty. Boundaries of India and China are divided into three sectors: Eastern, Middle and Western. The middle sector runs from India’s Uttar Pradesh to the Punjab, 545 km length of the Line of Actual Control, the lines of which was confirmed at the 9th meeting of the Expert Group held in 2001, in New Delhi. Other two sectors are still not determined and cause disputes. A western sector of the frontier is the Aksai Chin plateau, covers areas of Ladakh, Tibet, and Sinkiang. Another disputed area lies in the Eastern sector in the Himalayan region, which after 1986 became the Indian state called Arunachal Pradesh. There are two different approaches in the ways of resolving the border dispute. Chinese side keeps an opinion that the border dispute must be resolved in a timely matter unless it is favorable for China, the resolution can be left to a later generation. While India’s government due to security reasons is eager to demarcate the border. In order to study this conflict was used as a descriptive-comparative-analytical method. Also, it was done a profound analyze of conflict nature.

Keywords: border dispute, China, India, territorial claim

Procedia PDF Downloads 287
2134 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 74
2133 Technology, Organizational and Environmental Determinants of Business Intelligence Systems Adoption in Croatian SME: A Case Study of Medium-Sized Enterprise

Authors: Ana-Marija Stjepić, Luka Sušac, Dalia Suša Vugec

Abstract:

In the last few years, examples from scientific literature and business practices show that the adoption of technological innovations increases enterprises' performance. Recently, when it comes to the field of information technology innovation, business intelligence systems (BISs) have drawn a significant amount of attention of the scientific circles. BISs can be understood as a form of technological innovation which can bring certain benefits to the organizations that are adopting it. Therefore, the aim of this paper is twofold: (1) to define determinants of successful BISs adoption in small and medium enterprises and thus contribute to this neglected research area and (2) to present the current state of BISs adoption in small and medium-sized companies. In order to do so, determinants are defined and classified into three dimensions, according to the Technology – Organization – Environment (TOE) theoretical framework that describes the impact of each dimension on technological innovations adoption. Moreover, paper brings a case study presenting the adoption of BISs in practice within an organization from tertiary (service) industry sector. Based on the results of the study, guidelines for more efficient, faster and easier BISs adoption are presented.

Keywords: adoption, business intelligence, business intelligence systems, case study, TOE framework

Procedia PDF Downloads 126
2132 Study on the Renewal Strategy of Mountain City Trail Based on Place Attachment Theory

Authors: Long Xumeng

Abstract:

Place attachment focuses on the emotions and practices between people and their environment, and the influencing factors of place attachment vary depending on the nature of the place. As an important carrier of public slow-moving activities and urban culture, the feelings, cognition, and behaviors of the subjects involved in the use of mountain city trails have become the focus of research in this field. This paper will take Daijiaxiang Cliff Walkway in Yuzhong District, Chongqing City, as an example and analyze the evaluation results and correlation of each factor through questionnaire survey and field observation, using the three scales of Recreational Experience Scale, Satisfaction Scale, and Place Attachment Scale, as well as the intensity of activity, by using SPSS software. The study shows that there is a significant difference between the demographic variables of users' identity and age and the formation of place attachment; the degree of place attachment is significantly positively correlated with the emotion, industry, and service quality of recreational experience; and the recreational experience of the Mountain City Trail is significantly positively correlated with the overall satisfaction. By analyzing the influencing factors of recreational experience, satisfaction and place attachment, the corresponding conclusions and enhancement strategies were drawn to provide references for the renewal and construction of mountain city trails.

Keywords: mountain city trail, place attachment, recreational experience, satisfaction, urban renewal

Procedia PDF Downloads 63
2131 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS

Authors: Sumaya Ismail, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 84
2130 Jordan Water District Interactive Billing and Accounting Information System

Authors: Adrian J. Forca, Simeon J. Cainday III

Abstract:

The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.

Keywords: accounting, bill, information system, interactive

Procedia PDF Downloads 234
2129 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination

Authors: Nusret Mesut Sahin

Abstract:

Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.

Keywords: Hrant Dink, Armenian, journalist, assassination

Procedia PDF Downloads 137
2128 Design and Implementation of a Counting and Differentiation System for Vehicles through Video Processing

Authors: Derlis Gregor, Kevin Cikel, Mario Arzamendia, Raúl Gregor

Abstract:

This paper presents a self-sustaining mobile system for counting and classification of vehicles through processing video. It proposes a counting and classification algorithm divided in four steps that can be executed multiple times in parallel in a SBC (Single Board Computer), like the Raspberry Pi 2, in such a way that it can be implemented in real time. The first step of the proposed algorithm limits the zone of the image that it will be processed. The second step performs the detection of the mobile objects using a BGS (Background Subtraction) algorithm based on the GMM (Gaussian Mixture Model), as well as a shadow removal algorithm using physical-based features, followed by morphological operations. In the first step the vehicle detection will be performed by using edge detection algorithms and the vehicle following through Kalman filters. The last step of the proposed algorithm registers the vehicle passing and performs their classification according to their areas. An auto-sustainable system is proposed, powered by batteries and photovoltaic solar panels, and the data transmission is done through GPRS (General Packet Radio Service)eliminating the need of using external cable, which will facilitate it deployment and translation to any location where it could operate. The self-sustaining trailer will allow the counting and classification of vehicles in specific zones with difficult access.

Keywords: intelligent transportation system, object detection, vehicle couting, vehicle classification, video processing

Procedia PDF Downloads 304
2127 To Improve or Not to Improve Reflections from Jerash Urban Improvement Project, Jordan

Authors: Dina Dahood Dabash

Abstract:

Palestine Refugee Camps have never been settings that can be overlooked; they even became (as physical settings) a cornerstone topic of negotiations whenever Palestinian matters are on the table (specifically in Jordan). Consequently, maintaining the familiar face of the camp with its dilapidated shelters and narrow streets that rarely allowed its residents to extinguish a fire or evacuate a building safely has become a fundamental method to protect the “right of the return” from the perspective of various stakeholders. When the Infrastructure and Camp Improvement Programme (ICIP) was established in 2007 as an additional UNRWA program, some concerns were raised around the newly established section, mainly due to its direct impact on the “image” of the camp through a provision of a relatively nonconventional service that differs from what the Agency used to provide in the past seventy years. By presenting the Urban Improvement Project in Jerash camp (UIP) -Jordan, this paper aims to contribute to the ongoing discussion around enduring the improvement of Palestine refugee camps “programmatically” in UNRWA or not. The UIP as a co-product by UNRWA and the camp’s community within one of the most vulnerable refugee camps in Jordan offers a remarkable opportunity to excerpt lessons that can contribute to the strategic shaping of the ICIP. The paper concludes with five mine uptakes mainly related to community engagement, power structures and UNRWA's role in camps.

Keywords: camp improvement program, Jerash camp, Palestine refugee camps, UNRWA.

Procedia PDF Downloads 189
2126 Important of Innovation for Entrepreneurs

Authors: Eetedal Alanjem, Majedah Alnajem

Abstract:

The importance of innovation in entrepreneurship can be seen in the invention of new ways to produce products or improved solutions. A service industry can expand with new or improved types of services to fulfill the ever changing needs of their clients. Manufacturers can come up with new products from raw materials and by-products. Innovation is vital for the durability of any business. Innovation usually begins with a need. Small businesses are generally directly involved in their communities and they know exactly what the communities need and strive to come up with solutions to fulfill those needs. They seize the opportunity to innovate to ease communal problems and make lives more comfortable. And then, these solutions keep getting better, easier and more useful as entrepreneurs and their small businesses come up with improved formulas and solutions. Keeping abreast with current trends and demands is an important factor for entrepreneurs to fuel their creativity and innovation. Manufacturers are constantly innovating to produce more without sacrificing quality. Small businesses should make innovation as a fundamental part of their organisational development since innovation creates business success. Entrepreneurs must not see just one solution to a need. They should come up with ideas for multiple solutions. It is imperative for small businesses to encourage growth of innovation among their employees. Competition is another factor that elevates the importance of innovation in entrepreneurship. It motivates entrepreneurs to come up with better, improved products and services than their competitors for a higher share of the market. In this paper will go in-depth for each factor and will discuss some of cases studies to know how innovation it’s important for entrepreneurs by facts & lessons?

Keywords: innovation, entrepreneurship, creativity, organisational development

Procedia PDF Downloads 397
2125 Budget and the Performance of Public Enterprises: A Study of Selected Public Enterprises in Nasarawa State Nigeria (2009-2013)

Authors: Dalhatu, Musa Yusha’u, Shuaibu Sidi Safiyanu, Haliru Musa Hussaini

Abstract:

This study examined budget and performance of public enterprises in Nasarawa State, Nigeria in a period of 2009-2013. The study utilized secondary sources of data obtained from four selected parastatals’ budget allocation and revenue generation for the period under review. The simple correlation coefficient was used to analyze the extent of the relationship between budget allocation and revenue generation of the parastatals. Findings revealed varying results. There was positive (0.21) and weak correlation between expenditure and revenue of Nasarawa Investment and Property Development Company (NIPDC). However, the study further revealed that there was strong and weak negative relationship in the revenue and expenditure of the following parastatals over the period under review. Viz: Nasarawa State Water Board, -0.27 (weak), Nasarawa State Broadcasting Service, -0.52 (Strong) and Nasarawa State College of Agriculture, -0.36 (weak). The study therefore, recommends that government should increase its investments in NIPDC to enhance efficiency and profitability. It also recommends that government should strengthen its fiscal responsibility, accountability and transparency in public parastatals.

Keywords: budget, public enterprises, revenue, enterprise

Procedia PDF Downloads 232
2124 Effect of Magnesium Inoculation on the Microstructure and Mechanical Properties of a Spheroidal Cast Iron Knuckle: A Focus on the Steering Arm

Authors: Steven Mavhungu, Didier Nyembwe, Daniel Sekotlong

Abstract:

The steering knuckle is an integral component of the suspension and stability control system of modern vehicles. Good mechanical properties with an emphasis on the fatigue properties are essential for this component as it is subjected to cyclical load of significant magnitude during service. These properties are a function of the microstructure achieved in the component during the various manufacturing processes including forging and casting. The strut mount of the knuckle is required to meet specified microstructure and mechanical properties. However, in line with the recent trend of stringent quality requirements of cast components, Original Equipment Manufacturers (OEMs) have had to extend the specifications to other sections of the knuckle. This paper evaluates the effect of cored wire inoculation on the microstructure and mechanical properties of the steering arm of a typical spheroidal cast iron component. The investigation shows that the use of a cored wire having higher rare earth content formulation could possibly lead to a homogeneous matrix containing consistent graphite nodule morphology. However, this was found not to be the condition for better mechanical properties along the knuckle arm in line with required specifications. The findings in this paper contribute to a better understanding of steering knuckle properties to allow its production for safer automobile applications.

Keywords: inoculation, magnesium cored wire, spheroidal graphie, steering knuckle

Procedia PDF Downloads 205
2123 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 385
2122 Displacement Situation in Federally Administered Tribal Areas of Pakistan: Issues and Challenges

Authors: Sohail Ahmad, Inayat Kaleem

Abstract:

Federally Administered Tribal Area(FATA) of Pakistan is one of the most neglected regions in the world as far as development is concerned. It has been the hub of all sorts of illegal activities including militancy and export of terrorism. Therefore, it became inevitable for the government of Pakistan to take action against militants through military operations. Small and large scale military operations are being taken against the non-state actors in FATA with continuity. Over the years, hundreds of thousands have been displaced from the tribal areas of the country. Moreover, military operation Zarb-e-Azb has been launched in North Waziristan Agency in June 2014 to counter militancy across the Af-Pak border region. Though successful in curbing militancy, the operation has displaced around 0.5 million people from the area. Most of them opt to take shelter in the government installed shelter camps, some of them take refuge outside tent villages in the country while some of them prefer to cross into Afghanistan rather their own country Pakistan. This paper will evaluate how the influx of these internally displaced persons in the country is influencing the socio-economic situation of not only the displaced but of the hosting areas as well. Secondly, attention would be given to gauge the impact of such a huge number of displaced population on the law and order and security situation in the host areas.

Keywords: Af-Pak, federally administered tribal area, IDPs, internal displacement, Pakistan

Procedia PDF Downloads 296
2121 The Effect of Job Insecurity on Attitude towards Change and Organizational Citizenship Behavior: Moderating Role of Islamic Work Ethics

Authors: Khurram Shahzad, Muhammad Usman

Abstract:

The main aim of this study is to examine the direct and interactive effects of job insecurity and Islamic work ethics on employee’s attitude towards change and organizational citizenship behavior. Design/methodology/approach: The data was collected from 171 male and female university teachers of Pakistan. Self administered, close ended questionnaires were used to collect the data. Data was analyzed through correlation and regression analysis. Findings: Through the analysis of data, it was found that job insecurity has a strong negative effect on the attitude towards change of university teachers. On the contrary, job insecurity has no significant effect on organizational citizenship behavior of university teachers. Our results also show that Islamic work ethics does not moderate the relationship of job insecurity and attitude towards change, while a strong moderation effect of Islamic wok ethics is found on the relationship of job insecurity and organizational citizenship behavior. Originality/value: This study for the first time examines the relationship of job insecurity with employee’s attitude towards change and organizational citizenship behavior with the moderating effect of Islamic work ethics.

Keywords: job security, islamic work ethics, attitude towards change, organizational citizenship behavior

Procedia PDF Downloads 453
2120 Comparative Study on Manet Using Soft Computing Techniques

Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri

Abstract:

Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.

Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network

Procedia PDF Downloads 331
2119 An Empirical Analysis of the Freight Forwarders’ Buying Behaviour: Implications for the Ocean Container Carriers

Authors: Peter Dzakah Fanam, Hong O. Nguyen, Stephen Cahoon

Abstract:

The objective of this study is to explore the buying behavior of the freight forwarders and to evaluate how their buying decision affects the ocean container carriers’ market share. This study analysed the buying decisions of the freight forwarders and validated the process of stages that the freight forwarders’ pass through before choosing an ocean container carrier. Factor analysis was applied to data collected from 105 freight forwarding companies to unveil the influential factors the freight forwarders’ consider important when selecting an ocean container carrier. This study did not only analysed the buying behaviour of the freight forwarders but also unveiled the influential factors affecting the competitiveness of the ocean container carriers in their market share maximisation. Furthermore, the study have made a methodological contribution that helps in better understanding of the critical factors influencing the selection of the ocean container carriers from the freight forwarders’ perspective. The implications of the freight forwarders’ buying behaviour is important to the ocean container carriers because it have severe effect on the market share of the ocean container carriers and the percentage of customers they control within the liner shipping sector. The findings of this study will help the ocean container carriers to formulate relevant marketing strategies in attracting the freight forwarders in purchasing the liner shipping service.

Keywords: ocean carrier, freight forwarder, buying behaviour, influential factors

Procedia PDF Downloads 232
2118 Tokenization of Blue Bonds to Scale Blue Carbon Projects

Authors: Rodrigo Buaiz Boabaid

Abstract:

Tokenization of Blue Bonds is an emerging Green Finance tool that has the potential to scale Blue Carbon Projects to fight climate change. This innovative solution has a huge potential to democratize the green finance market and catalyze innovations in the climate change finance sector. Switzerland has emerged as a leader in the Green Finance space and is well-positioned to drive the adoption of Tokenization of Blue & Green Bonds. This unique approach has the potential to unlock new sources of capital and enable global investors to participate in the financing of sustainable blue carbon projects. By leveraging the power of blockchain technology, Tokenization of Blue Bonds can provide greater transparency, efficiency, and security in the investment process while also reducing transaction costs. Investments are in line with the highest regulations and designed according to the stringent legal framework and compliance standards set by Switzerland. The potential benefits of Tokenization of Blue Bonds are significant and could transform the way that sustainable projects are financed. By unlocking new sources of capital, this approach has the potential to accelerate the deployment of Blue Carbon projects and create new opportunities for investors to participate in the fight against climate change.

Keywords: blue bonds, blue carbon, tokenization, green finance

Procedia PDF Downloads 63
2117 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems

Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar

Abstract:

The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.

Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate

Procedia PDF Downloads 289
2116 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 400
2115 An Interrogation of Lecturer’s Skills in Assisting Visually Impaired Students during the COVID-19 Lockdown Era in Selected Universities in Zimbabwe

Authors: Esther Mafunda

Abstract:

The present study interrogated the lecturer’s skills in supporting visually impaired students during the Covid-19 era at the University of Zimbabwe. It particularly assesses how the Covid-19 pandemic affected the learning experience of visually impaired students and which skills the lecturers possessed in order to assist the visually impaired students during online learning. Data was collected from lecturers and visually impaired students at the University of Zimbabwe Disability Resource Centre. Data was collected through the use of interviews and questionnaires. Using content analysis, it was established that visually impaired students faced challenges of lack of familiarity with the Moodle learning platform, marginalization, lack of professional training, and lack of training for parents and guardians. Lecturers faced challenges of lack of training, the curriculum, access, and technical know-how deficit. It was established that lecturers had to resort to social media platforms in order to assist visually impaired students. Visually impaired students also received assistance from their friends and family members. On the basis of the results of the research, it can be concluded that lecturers needed in-service training to be provided with the necessary skills and knowledge to teach students with visual impairments and provide quality education to students with visual impairments.

Keywords: visual impairment, disability, covid-19, inclusive learning

Procedia PDF Downloads 66
2114 The Hotel Logging Behavior and Factors of Tourists in Bankontee District, Samut Songkhram Province, Thailand

Authors: Aticha Kwaengsopha

Abstract:

The purpose of this research was to study the behaviour and related factors that tourists utilized for making decisions to choose their accommodations at a tourist destination, Bangkontee district, Samut Songkhran Province, Thailand. The independent variables included gender, age, income, occupation, and region, while the three important dependent variables included selection behaviour, factors related selection process, and satisfaction of the accommodation service. A total of 400 Thai and international tourists were interviewed at tourist destination of Bangkontee. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and standard deviation. The findings revealed that the majority of respondents were single, female, and with the age between 23-30 years old. Most of the international tourists were from Asia and planned to stay in Thailand about 1-6 days. In addition, the majority of tourists preferred to travel in small groups of 3 persons. The majority of respondents used internet and word of mouth as the main tool to search for information. The majority of respondents spent most of their budget on food & drink, accommodation, and travelling. Even though the majority of tourists were satisfied with the quality of accommodation, the price range of accommodation, and the image of accommodation and the facilities of the accommodation, they indicated that they were not likely to re-visit Thailand in the near future.

Keywords: behaviour, decision factors, tourists, media engineering

Procedia PDF Downloads 261
2113 Assignment of Airlines Technical Members under Disruption

Authors: Walid Moudani

Abstract:

The Crew Reserve Assignment Problem (CRAP) considers the assignment of the crew members to a set of reserve activities covering all the scheduled flights in order to ensure a continuous plan so that operations costs are minimized while its solution must meet hard constraints resulting from the safety regulations of Civil Aviation as well as from the airlines internal agreements. The problem considered in this study is of highest interest for airlines and may have important consequences on the service quality and on the economic return of the operations. In this communication, a new mathematical formulation for the CRAP is proposed which takes into account the regulations and the internal agreements. While current solutions make use of Artificial Intelligence techniques run on main frame computers, a low cost approach is proposed to provide on-line efficient solutions to face perturbed operating conditions. The proposed solution method uses a dynamic programming approach for the duties scheduling problem and when applied to the case of a medium airline while providing efficient solutions, shows good potential acceptability by the operations staff. This optimization scheme can then be considered as the core of an on-line Decision Support System for crew reserve assignment operations management.

Keywords: airlines operations management, combinatorial optimization, dynamic programming, crew scheduling

Procedia PDF Downloads 346
2112 The Effects of European Union’s Bordering Process

Authors: Ebru Dalgakiran

Abstract:

Border and bordering studies have come to the forefront in recent years especially with parallel to increase in international migratory movements. Although conceptualizations of the border and bordering are quite contested within academia, the general point of view is that borders are politically and socially constructed. It means that borders have always their own ‘us vs. them’, and bordering process produce separate identities as well. In that case, Turkey and Greece are notable examples since these two nation-states constructed their borders upon each other’s for years although the Turkish-Greek border was drawn with the Lausanne Treaty of 1923. Nevertheless, on the other hand, The European Union (EU) has been externalized of border management policies to build a stronger area of freedom, security, and justice within the borders. Thus, Turkish-Greek border has become one of the significant external borders of the EU. In this context, this study aims to understand whether the EU’s bordering process through externalizing border management policies can affect Turkey’s and Greece’s bordering processes. By examining official documents of the EU and conducting in-depth interviews with local actors of the border management policies of the EU in Edirne, where is the border city of Turkey with Greece, this study’s main finding is that the EU’s bordering process to control migration at the external borders affects Turkey’s and Greece’s bordering processes. It seems that Turkey and Greece construct their borders upon a common Other, ‘irregular migrants’ now.

Keywords: border, bordering, the European Union, externalization

Procedia PDF Downloads 224
2111 Global City Typologies: 300 Cities and Over 100 Datasets

Authors: M. Novak, E. Munoz, A. Jana, M. Nelemans

Abstract:

Cities and local governments the world over are interested to employ circular strategies as a means to bring about food security, create employment and increase resilience. The selection and implementation of circular strategies is facilitated by modeling the effects of strategies locally and understanding the impacts such strategies have had in other (comparable) cities and how that would translate locally. Urban areas are heterogeneous because of their geographic, economic, social characteristics, governance, and culture. In order to better understand the effect of circular strategies on urban systems, we create a dataset for over 300 cities around the world designed to facilitate circular strategy scenario modeling. This new dataset integrates data from over 20 prominent global national and urban data sources, such as the Global Human Settlements layer and International Labour Organisation, as well as incorporating employment data from over 150 cities collected bottom up from local departments and data providers. The dataset is made to be reproducible. Various clustering techniques are explored in the paper. The result is sets of clusters of cities, which can be used for further research, analysis, and support comparative, regional, and national policy making on circular cities.

Keywords: data integration, urban innovation, cluster analysis, circular economy, city profiles, scenario modelling

Procedia PDF Downloads 166
2110 A Social Life Cycle Assessment Framework to Achieve Sustainable Cultural Tourism Destinations

Authors: Mojtaba Javdan, Kamran Jafarpour Ghalehteimouri, Moslem Ghasemi, Arezu Riazi

Abstract:

Tourism has a huge multiplier effect on other socioeconomic sectors, resulting in better infrastructure and public services. However, its environmental impact is still a source of concern. As a result, a greater emphasis has been placed on improving the sustainability of tourist destinations. Despite the global significance of sustainability assessment, only a few widely accepted methods for measuring sustainability exist. As a result, the life cycle concept is used to evaluate environmental, economic, and social consequences. The Social Life Cycle Assessment (S-LCA) is a crucial life cycle tool. Due to the tourism-specific service specifications, tourism-related activities are well-suited for the elaboration of data related to social sustainability. Therefore, the possibility of how the S-LCA is involved in ensuring cultural tourism destinations' long-term viability can be the main question. To answer this question, this article examines the theoretical evolution of both the S-LCA and cultural tourism. Potential application gaps are investigated, and an S-LCA framework for sustainable cultural tourism destinations is proposed and discussed. Thus, by bringing all stakeholders' interests together, the proposed S-LCA conceptual framework can play an effective role in achieving the principles and objectives of sustainable tourism destination management.

Keywords: social life cycle assessment, sustainable cultural tourism destinations, sustainable tourism destination management, S-LCA framework

Procedia PDF Downloads 55
2109 Analysis of Detection Concealed Objects Based on Multispectral and Hyperspectral Signatures

Authors: M. Kastek, M. Kowalski, M. Szustakowski, H. Polakowski, T. Sosnowski

Abstract:

Development of highly efficient security systems is one of the most urgent topics for science and engineering. There are many kinds of threats and many methods of prevention. It is very important to detect a threat as early as possible in order to neutralize it. One of the very challenging problems is detection of dangerous objects hidden under human’s clothing. This problem is particularly important for safety of airport passengers. In order to develop methods and algorithms to detect hidden objects it is necessary to determine the thermal signatures of such objects of interest. The laboratory measurements were conducted to determine the thermal signatures of dangerous tools hidden under various clothes in different ambient conditions. Cameras used for measurements were working in spectral range 0.6-12.5 μm An infrared imaging Fourier transform spectroradiometer was also used, working in spectral range 7.7-11.7 μm. Analysis of registered thermograms and hyperspectral datacubes has yielded the thermal signatures for two types of guns, two types of knives and home-made explosive bombs. The determined thermal signatures will be used in the development of method and algorithms of image analysis implemented in proposed monitoring systems.

Keywords: hyperspectral detection, nultispectral detection, image processing, monitoring systems

Procedia PDF Downloads 335
2108 Development of High Quality Refractory Bricks from Fireclays for Industrial Applications

Authors: David E. Esezobor, Friday I. Apeh, Harrison O. Onovo, Ademola A. Agbeleye

Abstract:

Available indigenous refractory bricks in Nigeria can only be used in the lining of furnaces for melting of cast iron operating at less than 1,400°C or in preheating furnaces due to their low refractoriness less than 1,500°C. The bricks crack and shatter on heating at 1350 to 1450°C. In this paper, a simple and adaptable technology of manufacturing high-quality refractory bricks from selected Nigerian clays for furnace linings was developed. Fireclays from Onibode, Owode-Ketu in Ogun State and Kwoi in Kaduna State were crushed, ground, and sieved into various grain sizes using standard techniques. The pulverized clays were blended with alumina in various mix ratios and indurated in the furnace at 900 – 16000C. Their chemical, microstructure and mineralogical properties were characterized using atomic absorption spectrophotometry, scanning electron microscopy and x-ray diffraction spectrometry respectively. The mineralogical and spectrochemical analyses suggested that the clays are of siliceous alumino-silicate and acidic in nature. The appropriate blending of fireclays with alumina provided the tremendous improvement in the refractoriness of the bricks and other acceptable service properties comparable with imported refractory bricks. The change in microstructure from pseudo-hexagonal grains to equiaxed grains of well – ordered sequence of structural layers could be responsible for the improved properties.

Keywords: alumina, furnace, industry, manufacturing, refractoriness

Procedia PDF Downloads 237