Search results for: Islamic financial services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7098

Search results for: Islamic financial services

3138 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 71
3137 Economic Design of a Quality Control Chart for the Proportion of Defective Items

Authors: Encarnación Álvarez-Verdejo, Raúl Amor-Pulido, Pablo J. Moya-Fernández, Juan F. Muñoz-Rosas, Francisco J. Blanco-Encomienda

Abstract:

Many companies use the statistical tool named as statistical quality control, and which can have a high cost for the companies interested on these statistical tools. The evaluation of the quality of products and services is an important topic, but the reduction of the cost of the implantation of the statistical quality control also has important benefits for the companies. For this reason, it is important to implement a economic design for the various steps included into the statistical quality control. In this paper, we describe some relevant aspects related to the economic design of a quality control chart for the proportion of defective items. They are very important because the suggested issues can reduce the cost of implementing a quality control chart for the proportion of defective items. Note that the main purpose of this chart is to evaluate and control the proportion of defective items of a production process.

Keywords: proportion, type I error, economic plan, distribution function

Procedia PDF Downloads 447
3136 First-Generation College Students and Persistence: A Phenomenological Study of Students’ Experiences in Indonesian Higher Education

Authors: Taufik Mulyadin

Abstract:

The tuition reform for public colleges that the Indonesian government initiated and has implemented since 2013 resulted in the growing number of college students from low-income families, many of whose parents did not attend college. This study sought to examine the experiences of persistence for Indonesian first-generation college students in public universities utilizing social capital as a framework. It is a qualitative study with a phenomenological approach primarily to capture the essence of how Indonesian first-generation college students interpret, process, and experience their persistence during college years. Fifteen Indonesian young college graduates were involved as well as questionnaire and interview were employed for data collection in this study. It revealed certain themes from the experiences that first-generation college students attributed to their persistence: (a) family encouragement, (b) support from friends, (c) guidance from faculty and staff, (d) fund of knowledge they bring with them, (e) financial aid availability, and (f) self-motivation. By examining first-generation college students’ voices, Indonesian public universities can better support, engage, and retain this group of students who were historically struggled to persist in college and complete their degree.

Keywords: first-generation student, Indonesian higher education, persistence, public universities

Procedia PDF Downloads 266
3135 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 146
3134 Malaysian Challenges and Experiences with National Higher Education Fund Corporation’s Educational Loan Default

Authors: Anjali Dewi Krishnan

Abstract:

This paper attempts to explore the factors causing student loan defaults among NHEFC borrower besides measuring the enforcement actions that have been took by NHEFC to improve repayment rate. It starts by reviewing the causes of student loan default from the perspective of the loan borrowers besides finding out about the effectiveness of approaches taken by NHEFC (National Higher Education Fund Corporation) until now in order to increase the repayment rate and recover student loan default. The results gathered from the research used to investigate or identify the relationship between job statuses, gender, and ethnicity of the borrowers with repayment status, enforcement from the NHEFC side in the sense of student loan repayment; and respondent's opinion about enforcement in encouraging repayment of student loan and recover loan default. A combination of unemployment, financial constraint, inefficient repayment method and some other reasons of student loan defaults were discovered through this research. It finishes by presenting the reality whereby a student loan default is a result of inability to pay back and not about willingness to pay back.

Keywords: loan default, loan recovery, loan repayment, national higher education fund corporation

Procedia PDF Downloads 340
3133 Project Paulina: A Human-Machine Interface for Individuals with Limited Mobility and Conclusions from Research and Development

Authors: Radoslaw Nagay

Abstract:

The Paulina Project aims to address the challenges faced by immobilized individuals, such as those with multiple sclerosis, muscle dystrophy, or spinal cord injuries, by developing a flexible hardware and software solution. This paper presents the research and development efforts of our team, which commenced in 2019 and is now in its final stage. Recognizing the diverse needs and limitations of individuals with limited mobility, we conducted in-depth testing with a group of 30 participants. The insights gained from these tests led to the complete redesign of the system. Our presentation covers the initial project ideas, observations from in-situ tests, and the newly developed system that is currently under construction. Moreover, in response to the financial constraints faced by many disabled individuals, we propose an affordable business model for the future commercialization of our invention. Through the Paulina Project, we strive to empower immobilized individuals, providing them with greater independence and improved quality of life.

Keywords: UI, human-machine interface, social inclusion, multiple sclerosis, muscular dystrophy, spinal cord injury, quadriplegic

Procedia PDF Downloads 75
3132 Robust Numerical Scheme for Pricing American Options under Jump Diffusion Models

Authors: Salah Alrabeei, Mohammad Yousuf

Abstract:

The goal of option pricing theory is to help the investors to manage their money, enhance returns and control their financial future by theoretically valuing their options. However, most of the option pricing models have no analytical solution. Furthermore, not all the numerical methods are efficient to solve these models because they have nonsmoothing payoffs or discontinuous derivatives at the exercise price. In this paper, we solve the American option under jump diffusion models by using efficient time-dependent numerical methods. several techniques are integrated to reduced the overcome the computational complexity. Fast Fourier Transform (FFT) algorithm is used as a matrix-vector multiplication solver, which reduces the complexity from O(M2) into O(M logM). Partial fraction decomposition technique is applied to rational approximation schemes to overcome the complexity of inverting polynomial of matrices. The proposed method is easy to implement on serial or parallel versions. Numerical results are presented to prove the accuracy and efficiency of the proposed method.

Keywords: integral differential equations, jump–diffusion model, American options, rational approximation

Procedia PDF Downloads 126
3131 Subway Ridership Estimation at a Station-Level: Focus on the Impact of Bus Demand, Commercial Business Characteristics and Network Topology

Authors: Jungyeol Hong, Dongjoo Park

Abstract:

The primary purpose of this study is to develop a methodological framework to predict daily subway ridership at a station-level and to examine the association between subway ridership and bus demand incorporating commercial business facility in the vicinity of each subway station. The socio-economic characteristics, land-use, and built environment as factors may have an impact on subway ridership. However, it should be considered not only the endogenous relationship between bus and subway demand but also the characteristics of commercial business within a subway station’s sphere of influence, and integrated transit network topology. Regarding a statistical approach to estimate subway ridership at a station level, therefore it should be considered endogeneity and heteroscedastic issues which might have in the subway ridership prediction model. This study focused on both discovering the impacts of bus demand, commercial business characteristics, and network topology on subway ridership and developing more precise subway ridership estimation accounting for its statistical bias. The spatial scope of the study covers entire Seoul city in South Korea and includes 243 stations with the temporal scope set at twenty-four hours with one-hour interval time panels each. The data for subway and bus ridership was collected Seoul Smart Card data from 2015 and 2016. Three-Stage Least Square(3SLS) approach was applied to develop daily subway ridership model as capturing the endogeneity and heteroscedasticity between bus and subway demand. Independent variables incorporating in the modeling process were commercial business characteristics, social-economic characteristics, safety index, transit facility attributes, and dummies for seasons and time zone. As a result, it was found that bus ridership and subway ridership were endogenous each other and they had a significantly positive sign of coefficients which means one transit mode could increase another transportation mode’s ridership. In other words, two transit modes of subway and bus have a mutual relationship instead of the competitive relationship. The commercial business characteristics are the most critical dimension among the independent variables. The variables of commercial business facility rate in the paper containing six types; medical, educational, recreational, financial, food service, and shopping. From the model result, a higher rate in medical, financial buildings, shopping, and food service facility lead to increment of subway ridership at a station, while recreational and educational facility shows lower subway ridership. The complex network theory was applied for estimating integrated network topology measures that cover the entire Seoul transit network system, and a framework for seeking an impact on subway ridership. The centrality measures were found to be significant and showed a positive sign indicating higher centrality led to more subway ridership at a station level. The results of model accuracy tests by out of samples provided that 3SLS model has less mean square error rather than OLS and showed the methodological approach for the 3SLS model was plausible to estimate more accurate subway ridership. Acknowledgement: This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science and ICT (2017R1C1B2010175).

Keywords: subway ridership, bus ridership, commercial business characteristic, endogeneity, network topology

Procedia PDF Downloads 148
3130 Violence-Health Nexus: Examining the Impact of Ethnic Violence on Mental Health Disorders, A Global Perspective

Authors: Saqib Amina, Waqas Mehmoodb, Iftikhar Yasinc

Abstract:

This study analyzes the robust association between ethnic violence and mental health from a global perspective (201-countries across the world) by using the panel data for the period 1970 to 2020. Mental health has been determined through various dimensions such as mental disorders, anxiety disorder, depressive disorder, schizophrenia, and bipolar disorder. The empirical findings show that ethnic violence has a significant positive association with all types of mental health indicators, including mental disorders, anxiety disorder, depressive disorder, schizophrenia, and bipolar disorder. The study also reveals that institutional quality may reduce the effect of mental health disorders in a better way than promoting democracy. This study suggests the non-stigmatizing social form of community-based support services instead of a stigmatizing the concept of mental illnesses that promotes hospitalization and drug treatment.

Keywords: ethnic violence, unemployment, mental health, violence

Procedia PDF Downloads 175
3129 Forests, the Sanctuaries to Specialist and Rare Wild Native Bees at the Foothills of Western Himalayas

Authors: Preeti Virkar, V. P. Uniyal, Vinod Kumar Bhatt

Abstract:

With 50% decline in managed honey bee hives in the continents of Europe and America, farmers and landscape managers are turning to native wild bees for their essential ecosystem services of pollination. Wild bees population are too under danger due to the rapid land use changes from anthropogenic activities. With an escalating population reaching 9.0 billion by 2050, human-induced land use changes are predicted to further deteriorate the habitats of numerous species by the turn of this century. The status of bees are uncertain, especially in the tropical regions of the world, which also questions the crisis of global pollinator decline and their essential services to wild and managed flora. Our investigation collectively compares wild native bee diversity and their status in forests and agroecosystems in Doon Valley landscape, situated at the foothills of Himalayan ranges, Uttarakhand, India. We seek to ask whether (1) natural habitat are refuge to richer and rarer bees communities than the agroecosystems, (2) Are agroecosystems closer to natural habitats similar to them than agroecosystems farther away; hence support richer bee communities and hence, (3) Do polyculture farms support richer bee communities than monoculture. The data was collected using observation and pantrap sampling form February to May, 2012 to 2014. We recorded 43 species of bees in Doon Valley. They belonged to 5 families; Megachilidae, Apidae, Andrenidae, Halictidae and Collitidae. A multinomial model approach was used to classify the bees into 2 habitats, in which forests demonstrated to support greater number of specialist (26%, n= 11) species than agroecosystems (7%, n= 3). The valley had many species categorized as the rare (58%, n= 25) and very few generalists (9%, n=4). A linear regression model run on our data demonstrated higher bee diversity in agro-ecosystems in close proximity to forests (H’ for < 200 m = 1.60) compared to those further away (H’ for > 600 m = 0.56) (R2=0.782, SE=0.148, p value=0.004). Organic agriculture supported significantly greater species richness in comparison to conventional farms (Mann-Whitney U test, n1 = 33, n2 = 35; P = 0.001). Forests ecosystems are refuge to rare specialist groups and support bee communities in nearby agroecosystems. The findings of our investigation demonstrate the importance of natural habitats as a potential refuge for rare native wild bee pollinators. Polyculture in the valley behaves similar to natural habitats and supports diverse bee communities in comparison to conventional monocultures. Our study suggests that the farming communities adopt diverse organic agriculture systems to attract wild pollinators beneficial for better crop production. Forests are sanctuaries for bees to nest, forage, and breed. Therefore, our outcome also suggests landscape managers not only preserve protected areas but also enhance the floral diversity in semi-natural and urban areas.

Keywords: native bees, pollinators, polyculture, agroecosystem, natural habitat, diversity, monoculture, specialists, generalists

Procedia PDF Downloads 219
3128 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds

Authors: Sahar Sohrabi

Abstract:

The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.

Keywords: cloud computing, scheduling, real-time private cloud, bayesian

Procedia PDF Downloads 361
3127 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 206
3126 Use of Proton Pump Inhibitors Medications during the First Years of Life and Late Complications

Authors: Kamelia Hamza

Abstract:

Background: Proton pump inhibitors (PPIs) are the most prescribed drug classes for pediatric gastroesophageal reflux disease (GERD).Many patients are treated with these drugs for atypical manifestations attributed to gastroesophageal reflux (GER), even in the absence of proved causal relationship. There is an impression of increase use of PPI's treatment for reflux in "clalit health services," the largest health organization in Israel. In the recent years, the medicine is given without restriction, it's not limited to pediatric gastroenterologists only, but pediatricians and family doctors. The objective of this study is to evaluate the hypothesis that exposure to PPIs during the first year of life is associated with an increased risk of developing late adverse diseases: pneumonia, asthma, AGE, IBD, celiac disease, allergic disorders, obesity, attention deficit hyperactivity disorders (ADHD), autism spectrum disorders (ASD). Methods: The study is a retrospective case-control cohort study based on a computerized database of Clalit Health Services (CHS). It includes 9844 children born between 2002-2018 and reported to complain of at least one of the symptoms (reflux/ spitting up, irritability, feeding difficulties, colics). The study population included the study group (n=4922) of children exposed to PPIs at any time prior to the first year of life and a control group (n=4922) child not exposed to PPIs who were matched to each case of the study group on age, race, socioeconomic status, and year of birth. The prevalence of late complications/diseases in the study group was compared with the prevalence of late complications/diseases diagnosis between 2002-2020 in the control group. Odds ratios and 95% confidence intervals were calculated by using logistic regression models. Results: We found that compared to the control group, children exposed to PPIs in the first year of life had an increased risk of developing several late complications/ disorders: pneumonia, asthma, various allergies (urticaria, allergic rhinitis, or allergic conjunctivitis) OR, inhalant allergies, and food allergies. In addition, they showed an increased risk of being diagnosed with ADHD or ASD, but children exposed to PPIs in the first year of life had decrease the risk of obesity by 17% (OR 0.825, 95%CI 0.697-0.976). Conclusions: We found significant associations between the use of PPIs during the first year of life and subsequent development of late complications/diseases such as respiratory diseases, allergy diseases, ADHD, and ASD. More studies are needed to prove causality and determine the mechanism behind the effect of PPIs and the development of late complications.

Keywords: acid suppressing medications, proton pump inhibitors, histamine 2 blocker, late complications, gastroesophageal reflux, gastroesophageal reflux disease, acute gastroenteritis, community acquired pneumonia, asthma, allergic diseases, obesity, inflammatory bowel diseases, ulcerative colitis, crohn disease, attention deficit hyperactivity disorders, autism spectrum disorders

Procedia PDF Downloads 96
3125 Analysis of the Fair Distribution of Urban Facilities in Kabul City by Population Modeling

Authors: Ansari Mohammad Reza, Hiroko Ono

Abstract:

In this study, we investigated how much of the urban facilities are fairly distributing in the city of Kabul based on the factor of population. To find the answer to this question we simulated a fair model for the distribution of investigated facilities in the city which is proposed based on the consideration of two factors; the number of users for each facility and the average distance of reach of each facility. Then the model was evaluated to make sure about its efficiency. And finally, the two—the existing pattern and the simulation model—were compared to find the degree of bias in the existing pattern of distribution of facilities in the city. The result of the study clearly clarified that the facilities are not fairly distributed in Kabul city based on the factor of population. Our analysis also revealed that the education services and the parks are the most and the worst fair distributed facilities in this regard.

Keywords: Afghanistan, ArcGIS Software, Kabul City, fair distribution, urban facilities

Procedia PDF Downloads 184
3124 Predictors, Barriers, and Facilitators to Refugee Women’s Employment and Economic Inclusion: A Mixed Methods Systematic Review

Authors: Areej Al-Hamad, Yasin Yasin, Kateryna Metersky

Abstract:

This mixed-method systematic review and meta-analysis provide an encompassing understanding of the barriers, facilitators, and predictors of refugee women's employment and economic inclusion. The study sheds light on the complex interplay of sociocultural, personal, political, and environmental factors influencing these outcomes, underlining the urgent need for a multifaceted, tailored approach to devising strategies, policies, and interventions aimed at boosting refugee women's economic empowerment. Our findings suggest that sociocultural factors, including gender norms, societal attitudes, language proficiency, and social networks, profoundly shape refugee women's access to and participation in the labor market. Personal factors such as age, educational attainment, health status, skills, and previous work experience also play significant roles. Political factors like immigration policies, regulations, and rights to work, alongside environmental factors like labor market conditions, availability of employment opportunities, and access to resources and support services, further contribute to the complex dynamics influencing refugee women's economic inclusion. The significant variability observed in the impacts of these factors across different contexts underscores the necessity of adopting population and region-specific strategies. A one-size-fits-all approach may prove to be ineffective due to the diversity and unique circumstances of refugee women across different geographical, cultural, and political contexts. The study's findings have profound implications for policy-making, practice, education, and research. The insights garnered a call for coordinated efforts across these domains to bolster refugee women's economic participation. In policy-making, the findings necessitate a reassessment of current immigration and labor market policies to ensure they adequately support refugee women's employment and economic integration. In practice, they highlight the need for comprehensive, tailored employment services and interventions that address the specific barriers and leverage the facilitators identified. In education, they underline the importance of language and skills training programs that cater to the unique needs and circumstances of refugee women. Lastly, in research, they emphasize the need for ongoing investigations into the multifaceted factors influencing refugee women's employment experiences, allowing for continuous refinement of our understanding and interventions. Through this comprehensive exploration, the study contributes to ongoing efforts aimed at creating more inclusive, equitable societies. By continually refining our understanding of the complex factors influencing refugee women's employment experiences, we can pave the way toward enhanced economic empowerment for this vulnerable population.

Keywords: refugee women, employment barriers, systematic review, employment facilitators

Procedia PDF Downloads 85
3123 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 361
3122 Managing the Cloud Procurement Process: Findings from a Case Study

Authors: Andreas Jede, Frank Teuteberg

Abstract:

Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.

Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study

Procedia PDF Downloads 397
3121 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers

Authors: Sally Selden, Jyoti Aggarwal

Abstract:

The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.

Keywords: multigenerational workforce, leadership, generational differences, federal workforce

Procedia PDF Downloads 231
3120 Risk Assessment and Management Using Machine Learning Models

Authors: Lagnajeet Mohanty, Mohnish Mishra, Pratham Tapdiya, Himanshu Sekhar Nayak, Swetapadma Singh

Abstract:

In the era of global interconnectedness, effective risk assessment and management are critical for organizational resilience. This review explores the integration of machine learning (ML) into risk processes, examining its transformative potential and the challenges it presents. The literature reveals ML's success in sectors like consumer credit, demonstrating enhanced predictive accuracy, adaptability, and potential cost savings. However, ethical considerations, interpretability issues, and the demand for skilled practitioners pose limitations. Looking forward, the study identifies future research scopes, including refining ethical frameworks, advancing interpretability techniques, and fostering interdisciplinary collaborations. The synthesis of limitations and future directions highlights the dynamic landscape of ML in risk management, urging stakeholders to navigate challenges innovatively. This abstract encapsulates the evolving discourse on ML's role in shaping proactive and effective risk management strategies in our interconnected and unpredictable global landscape.

Keywords: machine learning, risk assessment, ethical considerations, financial inclusion

Procedia PDF Downloads 78
3119 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 260
3118 An Exploratory Study Regarding the Effects of Auditor Switch, Auditee’s Industry, and Auditee’s Location on Audit Fees in Australia

Authors: Ashkan Mirzay Fashami

Abstract:

This study examines the effects of auditor switch, auditee’s industry, and auditee’s location on audit fees in Australia. It uses fee data of Australian Securities Exchange 500 companies, considering all industry classifications throughout the country from 2006 until 2016. Main findings show that auditor switch does not affect audit fees. However, auditee’s industry affects audit fees. This effect occurs in information technology, financials, energy, and materials sectors among the top 500 companies. Financials, energy, and materials sectors face a fee rise, whereas information technology has a fee cut. The extent of fee changes is different among various industries, wherein the financial sector has the highest increase. Further, auditee’s location affects audit fees. Top 500 companies in Hobart, Perth, and Brisbane face a fee reduction, wherein the highest cut is in Hobart. Further analysis suggests that the Australian audit market is being increasingly concentrated in the hands of the Big Four audit firms.

Keywords: audit, auditor switch, Australia, fee, low-balling

Procedia PDF Downloads 142
3117 Translation Training in the AI Era

Authors: Min Gao

Abstract:

In the past year, the advent of large language models (LLMs) has brought about a revolution in the language service industry, making it possible to efficiently produce more satisfactory and higher-quality translations. This is groundbreaking news for commercial companies involved in language services since much of a translator's work can now be completed by machines. However, it may be bad news for universities that provide translation training programs. They need to confront the challenges posed by AI in education by reconsidering issues such as the reform of traditional teaching methods, the translation ethics of students, and the new demands of the job market for their graduates. This article is an exploratory study of these issues based on the author's experiences in translation teaching. The research combines methods in the form of questionnaires and interviews. The findings include: (1) students may lose their motivation to learn in the AI era, but this can be compensated for by encouragement from the lecturer; (2) Translation ethics are not a serious problem in schools, considering the strict policies and regulations in place; (3) The role of translators has evolved in the new era, necessitating a reform of the traditional teaching methods.

Keywords: job market of translation, large language model, translation ethics, translation training

Procedia PDF Downloads 72
3116 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 360
3115 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant

Authors: Kishen Prathivadi

Abstract:

The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.

Keywords: energy savings, LED, lighting, electrical

Procedia PDF Downloads 143
3114 The Role of Social Media in Activating Youth Participation in the Community

Authors: Raya Hamed Hilal Al Maamari

Abstract:

The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.

Keywords: community, participation, social media, youth

Procedia PDF Downloads 377
3113 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution

Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic

Abstract:

Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.

Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network

Procedia PDF Downloads 266
3112 Analysis of Economics and Value Addition of Optimized Blend with Petrodiesel of Nanocomposite Oil Methyl Esters

Authors: Chandrashekara Krishnappa, Yogish Huchaiah

Abstract:

The present work considers the importance of economic feasibility and financial viability of biodiesel production, and its use in the present context of prevailing Indian scenario. For this, costs involved in production of one litre of biodiesel from non-edible Jatropha and Pongamia oils Nano mix are considered. Biodiesel derived from the mix is blended with petrodiesel in various proportions and used in Compression Ignition (CI) Direct Injection (DI) engine. Performance and Emission characteristics were investigated. Optimization of the blends considering experimental results was carried out. To validate the experimental results and optimization, Multi-Functional Criteria Technique (MFCT) is used. Further, value additions in terms of INR due to increase in performance and reduction in emissions are investigated. Cost component of subsidy on petrodiesel is taken into consideration in the calculation of cost of one litre of it. Comparison of costs is with respect to the unit of power generated per litre of COME and petrodiesel. By the analysis it has been concluded that the amount saved with subsidy is INR 1.45 Lakh Crores per year and it is INR1.60 Lakh Crores per year without subsidy for petrodiesel.

Keywords: cap value addition, economic analysis, MFCT, NACOME, subsidy

Procedia PDF Downloads 248
3111 The Ability of Forecasting the Term Structure of Interest Rates Based on Nelson-Siegel and Svensson Model

Authors: Tea Poklepović, Zdravka Aljinović, Branka Marasović

Abstract:

Due to the importance of yield curve and its estimation it is inevitable to have valid methods for yield curve forecasting in cases when there are scarce issues of securities and/or week trade on a secondary market. Therefore in this paper, after the estimation of weekly yield curves on Croatian financial market from October 2011 to August 2012 using Nelson-Siegel and Svensson models, yield curves are forecasted using Vector auto-regressive model and Neural networks. In general, it can be concluded that both forecasting methods have good prediction abilities where forecasting of yield curves based on Nelson Siegel estimation model give better results in sense of lower Mean Squared Error than forecasting based on Svensson model Also, in this case Neural networks provide slightly better results. Finally, it can be concluded that most appropriate way of yield curve prediction is neural networks using Nelson-Siegel estimation of yield curves.

Keywords: Nelson-Siegel Model, neural networks, Svensson Model, vector autoregressive model, yield curve

Procedia PDF Downloads 340
3110 Urban Security through Urban Transformation: Case of Saraycik District

Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis

Abstract:

Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.

Keywords: urban security, urban crimes, urban transformation, Saraycik district

Procedia PDF Downloads 308
3109 Assessment of Drainage Water Quality in South Africa: Case Study of Vaal-Harts Irrigation Scheme

Authors: Josiah A. Adeyemo, Fred A. O. Otieno, Olumuyiwa I. Ojo

Abstract:

South Africa is water-stressed being a semi-arid country with limited annual rainfall supply and a lack of perennial streams. The future implications of population growth combined with the uncertainty of climate change are likely to have significant financial, human and ecological impacts on already scarce water resources. The waste water from the drainage canals of the Vaal-Harts irrigation scheme (VHS) located in Jan Kempdorp, a farming community in South Africa, were investigated for possible irrigation re-use and their effects on the immediate environment. Three major drains within the scheme were identified and sampled. Drainage water samples were analysed to determine its characteristics. The water samples analyzed had pH values in the range of 5.5 and 6.4 which is below the normal range for irrigation water and very low to moderate salinity (electrical conductivity 0.09-0.82 dS/m). The adjusted sodium adsorption ratio values in all the samples were also very low (<0.2), indicating very low sodicity hazards. The nitrate concentration in most of the samples was high, ranging from 4.8 to 53 mg/l. The reuse of the drainage water for irrigation is possible, but with further treatment. Some suggestions were offered in the safe management of drainage water in VHS.

Keywords: drainage canal, water quality, irrigation, pollutants, environment

Procedia PDF Downloads 340