Search results for: defense/attack strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6383

Search results for: defense/attack strategies

5993 Supply Chain Resilience Strategies and Their Impact on Supply Chain Sustainability of the Export-oriented Apparel Industry in Sri Lanka

Authors: Anuradha Ranawakage, Nimalashanithi Amarasekara

Abstract:

Supply chain resilience and sustainability have received great attention from both academia and business professionals since last few decades. However, the relationship between supply chain resilience and sustainability has not been empirically tested in the apparel industry, where both concepts play a crucial role. Thus, this study aims to investigate how supply chain resilience strategies (digital connectivity, inventory and reserve capacity, and collaboration) impact the supply chain sustainability of export-oriented apparel manufacturing companies in Sri Lanka. An online questionnaire was used to collect data on the impact of supply chain resilience strategies on the supply chain sustainability of 99 apparel companies operating in Sri Lanka. This research makes a significant contribution to the field of supply chain management by assessing the impact of supply chain resilience strategies on supply chain sustainability in the context of the developing country, Sri Lanka, where economic crises and the pandemic have had a profound impact on the apparel industry. The findings have important theoretical and managerial implications for maintaining congruence between supply chain resilience and supply chain sustainability in the long run.

Keywords: supply chain resilience, supply chain sustainability, apparel, supply chain

Procedia PDF Downloads 25
5992 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 397
5991 Successful Marketing Strategies of Local Companies in Pakistan: A Case Study of Pharmaceutical Industry

Authors: Nasir Ullah

Abstract:

Marketing strategies are important factors in the success of a company. Local pharmaceutical companies in Pakistan face several issues, such as low-level budgets, lack of skilled human resources, and challenges to competing with multinational competitors that have negative impacts on their success. However, still there exist local companies with great levels of success in the pharmaceutical sector. This study aims to evaluate the marketing strategies of successful local companies in the pharmaceutical sector of Khyber Pakhtunkhwa, Pakistan. The study employed a constructivist approach to know about successful strategies of the marketing managers that worked well. For this purpose, in-depth interviews were conducted with marketing managers of four pharmaceutical companies which were deemed as successful on the basis of their annual target achievements. Thematic analysis was conducted using Nvivo to devise major themes from the collected data. Four major themes or successful strategies were identified. These are i) share in the profit to marketing and sales staff, ii) invitation to the doctors for participation in free medical camps and health awareness seminars, iv) incentives for the Doctors and retailers, v) utilization of traditional capital (local social relationships) by the marketing officers. The study concludes that profit share to the employees, valuing doctors through their involvement and utilization of traditional capital are the successful marketing strategies of the successful pharmaceutical companies in the Pakhtun society of Pakistan. The study suggests hiring local staff that can utilize their traditional capital to influence doctors' decisions regarding the prescription of their medicine to the patients. The study also suggests profit share or increased bonuses to the marketing and sales staff as a measure of success.

Keywords: successful marketing strategies, pharmaceutical industry, traditional social capital, local companies

Procedia PDF Downloads 41
5990 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 184
5989 The Impact of Instructing Interpretation Specific Strategies on Interpretation Performance of Undergraduate Translation Students

Authors: Abolfazl Ghelichi, Ghasem Modarresi

Abstract:

The problem with interpretation courses arises from the fact that Interpretation Courses at University levels are presented by most of the instructors based on listening activities and testing listening performance while interpretation strategies have been underrated. The data are gathered from30 students majoring in Translation Studies to fulfill the major aims of the study including. The study aimed at: 1) examining the significant relationship between specific interpretation strategies and interpretation performance of translation students in interpretation courses, 2) investigating the significant difference between males and females in their interpretation performance, and 3) exploring the interpretation strategies which are more effective for the translation students to improve their interpretation performance from students’ opinions. The results of the study revealed that there was a statistically significant difference in the mean scores for the two groups. The experimental group outperformed the control group in their interpretation performance and the effect size was large. However, there was no significant difference between male and female with respect to their cognition [t (28) =.79, p<.05]. As for the results obtained from the interviews with the students, the commonalities emerged from the students’ responses were analyzed and reported by the researchers.

Keywords: anticipation, interpretation performance, interpretation strategy, shadowing

Procedia PDF Downloads 292
5988 From Ondoy to Habagat: Comparison of the Community Coping Strategies between Barangay Tumana and Provident Village, Marikina City

Authors: Dinnah Feye H. Andal, Ann Laurice V. Salonga

Abstract:

The paper investigates the flooding event that was experienced by Marikina City residents during the onslaught of Tropical Storm Ondoy on September 26, 2009 and during the heavy downpour caused by the southwest monsoon (Habagat) on August 1-8, 2012. Typhoon Ketsana, locally known as Tropical Storm Ondoy, devastated the whole of Marikina City, displacing a lot of people from their homes and damages properties as well, as flood rose at a very short period of time. Meanwhile, the massive amount of rain water brought by the southwest monsoon lasted for a week that also caused flooding to different parts of Metro Manila including Marikina City. This paper examines how the respondents’ experiences of the flooding caused by Tropical Storm Ondoy informed the coping strategies that the households in Barangay Tumana and Provident Village employed during the flooding brought by the southwest monsoon rains. Specifically, the research compares the coping strategies to flood hazards between residents of Barangay Tumana and Provident Village before, during and after the flooding caused by the southwest monsoon rains. Both study sites have relatively low elevation and are located along rivers and creeks which make them highly susceptible to flood. Interviews with affected residents were undertaken to understand how a household's coping strategies contribute to the development of community coping strategies at the respective neighborhood level. Based from the findings, income levels, local politics, religion and social relations between and among neighbors affect the way household and community coping strategies differ in the two case study sites.

Keywords: community coping strategies, Habagat, Marikina, Ondoy

Procedia PDF Downloads 315
5987 The Marketing Strategies of Five-Star Rated Herbal Businesses of One Tambon One Product (OTOP) Entrepreneurs in Songkhla Province, Thailand

Authors: S. Lungtae, C. Noknoi

Abstract:

The main purpose of this research is to analyze the marketing strategies of the various five-star rated herbal businesses of One Tambon One Product (OTOP) entrepreneurs in Songkhla province, Thailand. This includes the targeting, positioning and marketing mix in order to develop marketing strategies for OTOP entrepreneurs. The data were collected from the presidents of herbal-product enterprises in Songkhla province. The products of all these enterprises were selected as five-star herbal products for the OTOP project in 2012. In-depth interviews were conducted, and content analysis was used to analyze the data. The research found that the community enterprises should 1) increase the range of product sizes offered, 2) increase their distribution channels, 3) publicize more to inform consumers about their identities and products, 4) undertake promotional activities during the festival, and 5) choose salespeople who are knowledgeable about the features of their products.

Keywords: marketing mix, market positioning, marketing strategies, target market.

Procedia PDF Downloads 295
5986 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 102
5985 Demonstration of Logical Inconsistency in the Discussion of the Problem of Evil

Authors: Mohammad Soltani Renani

Abstract:

The problem of evil is one of the heated battlegrounds of the idea of theism and its critics. Since time immemorial and in various philosophical schools and religions, the belief in an Omniscient, Omnipotent, and Absolutely Good God has been considered inconsistent with the existence of the evil in the universe. The theist thinkers have generally adopted one of the following four ways for answering this problem: denial of the existence of evil or considering it to be relative, privation theory of evil, attribution of evil to something other than God, and depiction of an alternative picture of God. Defense or criticism of these alternative answers have given rise to an extensive and unending dispute. However, evaluation of the presupposition and context upon/in which a question is raised precedes offering an answer to it. This point in the discussion of the problem of evil is of paramount importance for both parties, i.e., questioners and answerers, that the attributes of knowledge, power, love, good-will, among others, can be supposed to be infinite only in the essence of the attributed and the domain of potentiality but what can be realized in the domain of actuality is always finite. Therefore, infinite nature of Divine Attributes and realization of evil belong to two spheres. Divine Attributes are infinite (absolute) in Divine Essence, but when they are created, each one becomes bounded by the other. This boundedness is a result of the state of being surrounded of the attributes by each other in finite world of possibility. Evil also appears in this limited world. This inconsistency leads to the collapse of the problem of evil from within: the place of infinity of the Divine Attributes, in the words of Muslim mystics, lies in the Holiest Manifestation [Feyze Aqdas] while evil emerges in the Holy Manifestation where the Divine Attributes become bounded by each other. This idea is neither a new answer to the problem of evil nor a defense of theism; rather it reveals a logical inconsistency in the discussion of the problem of evil.

Keywords: problem of evil, infinity of divine attributes, boundedness of divine attributes, holiest manifestation, holy manifestation

Procedia PDF Downloads 146
5984 Examining Coping Resources and Ways of Strategic Coping for Individuals with Spinal Cord Injury During the COVID-19 Crisis

Authors: Se-Hyuk Park, Hee-Jung Seo

Abstract:

Previous studies have investigated effective coping strategies for excessive stress, positive adaptation, resilience, mental health, and personal growth. However, to the best of the authors' knowledge, little research has been conducted to investigate how Koreans with physical disabilities deal with the COVID-19 pandemic. The purpose of this study was to identify coping strategies and coping resources that Koreans with physical disabilities utilized during the COVID-19 crisis. This study used semi-structured, in-depth interviews with 15 participants. Data were qualitatively analyzed using the constant comparative method with content mapping and content mining questions. We identified three salient themes that were used by participants as coping strategies to deal with various COVID-related challenges: (a) engagement in meaningful activities, (b) improvement of social and emotional support, and (c) experience of resilience. The findings of the present study highlighted that Korean adults with SCI actively engaged in various leisure activities, maintained and developed closer social relationships, and experienced resilience to face COVID-19-related stressors. These coping strategies were noted as a catalyst for physical health as well as psychological well-being of individuals with SCI.

Keywords: spinal cord injury, covid-19 pandemic, coping strategies, coping resources, leisure

Procedia PDF Downloads 43
5983 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 177
5982 Strategies to Enhance Export Performance of Thai Furniture Industry

Authors: Khomsan Laosillapacharoen

Abstract:

This research paper was aimed to analyze the current situation of the furniture industry and embark a plan to enhance the export volume of Thai furniture. This is a qualitative research which utilized meta-analysis and focus group. A total of 24 experts in both government and private sectors were interviewed. The findings revealed that Thai furniture had some advantages of access to raw material, high quality of labors, and have a unique skill. However, the threat included a tendency to have more foreign competitors in domestic market. In addition, the strategies to enhance the level of export included increase the standard quality of Thai furniture, offer new and modern designs, use marketing on the internet, use modern technology, and gain tax incentive from the government.

Keywords: export, furniture, strategies, marketing

Procedia PDF Downloads 399
5981 A Comparative Study of Mechanisms across Different Online Social Learning Types

Authors: Xinyu Wang

Abstract:

In the context of the rapid development of Internet technology and the increasing prevalence of online social media, this study investigates the impact of digital communication on social learning. Through three behavioral experiments, we explore both affective and cognitive social learning in online environments. Experiment 1 manipulates the content of experimental materials and two forms of feedback, emotional valence, sociability, and repetition, to verify whether individuals can achieve online emotional social learning through reinforcement using two social learning strategies. Results reveal that both social learning strategies can assist individuals in affective, social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 2 similarly manipulates the content of experimental materials and two forms of feedback to verify whether individuals can achieve online knowledge social learning through reinforcement using two social learning strategies. Results show that similar to online affective social learning, individuals adopt both social learning strategies to achieve cognitive social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 3 simultaneously observes online affective and cognitive social learning by manipulating the content of experimental materials and feedback at different levels of social pressure. Results indicate that online affective social learning exhibits different learning effects under different levels of social pressure, whereas online cognitive social learning remains unaffected by social pressure, demonstrating more stable learning effects. Additionally, to explore the sustained effects of online social learning and differences in duration among different types of online social learning, all three experiments incorporate two test time points. Results reveal significant differences in pre-post-test scores for online social learning in Experiments 2 and 3, whereas differences are less apparent in Experiment 1. To accurately measure the sustained effects of online social learning, the researchers conducted a mini-meta-analysis of all effect sizes of online social learning duration. Results indicate that although the overall effect size is small, the effect of online social learning weakens over time.

Keywords: online social learning, affective social learning, cognitive social learning, social learning strategies, social reinforcement, social pressure, duration

Procedia PDF Downloads 46
5980 Assessment of the Performance of Fly Ash Based Geo-Polymer Concrete under Sulphate and Acid Attack

Authors: Talakokula Visalakshi

Abstract:

Concrete is the most commonly used construction material across the globe, its usage is second only to water. It is prepared using ordinary Portland cement whose production contributes to 5-8% of total carbon emission in the world. On the other hand the fly ash by product from the power plants is produced in huge quantities is termed as waste and disposed in landfills. In order to address the above issues mentioned, it is essential that other forms of binding material must be developed in place of cement to make concrete. The geo polymer concrete is one such alternative developed by Davidovits in 1980’s. Geopolymer do not form calcium-silicate hydrates for matrix formation and strength but undergo polycondensation of silica and alumina precursors to attain structural strength. Its setting mechanism depends upon polymerization rather than hydration. As a result it is able to achieve its strength in 3-5 days whereas concrete requires about a month to do the same. The objective of this research is to assess the performance of geopolymer concrete under sulphate and acid attack. The assessment is done based on the experiments conducted on geopolymer concrete. The expected outcomes include that if geopolymer concrete is more durable than normal concrete, then it could be a competitive replacement option of concrete and can lead to significant reduction of carbon foot print and have a positive impact on the environment. Fly ash based geopolymer concrete offers an opportunity to completely remove the cement content from concrete thereby making the concrete a greener and future construction material.

Keywords: fly ash, geo polymer, geopolymer concrete, construction material

Procedia PDF Downloads 488
5979 Strategies Considered Effective for Funding Public Tertiary Institutions in Nigeria

Authors: Jacinta Ifeoma Obidile

Abstract:

The study sought to ascertain from the opinions of the business educators, effective strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Funding of tertiary institutions has become so important following the dilapidated state of most of the public tertiary institutions in Nigeria. Tertiary institutions are known for the production of competitive and competent workforce in the nation. Considering the state of public tertiary institutions currently, one wonders if their objectives are achieved. Many scholars have identified funding as one of the major barriers to effective functioning of tertiary institutions. Although federal and state governments have been supporting the tertiary institutions, but their support seems not to be adequate. This study therefore ascertained from the perspective of business educators, other strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Survey research design was adopted for the study. A total of 104 business educators from the public tertiary institutions in the State constituted the population. There was no sampling, hence the whole population was used. Structured questionnaire validated by three experts with a reliability coefficient of 0.82 was the instrument for data collection. Data collected were analyzed using mean and standard deviation. Findings from the study revealed that public-private partnership and external aids were among the strategies considered effective for funding public tertiary institutions. It was therefore recommended among others that associations like alumni should be strongly instituted in each of the public tertiary institutions so as to assist in the funding of tertiary institutions for effective functioning and delivery.

Keywords: strategies, funding, tertiary institutions, business educators

Procedia PDF Downloads 155
5978 Histopathological and Biochemical Investigations of Protective Role of Honey in Rats with Experimental Aflatoxicosis

Authors: Turan Yaman, Zabit Yener, Ismail Celik

Abstract:

The aim of this study was to investigate the antioxidant properties and protective role of honey, considered a part of traditional medicine, against carcinogen chemical aflatoxin (AF) exposure in rats, which were evaluated by histopathological changes in liver and kidney, measuring level of serum marker enzymes [aspartate aminotransferase (AST), alanin aminotransferase (ALT), gamma glutamil transpeptidase (GGT)], antioxidant defense systems [Reduced glutathione (GSH), glutathione reductase (GR), superoxide dismutase (SOD), glutathione-S-transferase (GST) and catalase (CAT)], and lipid peroxidation content in liver, erythrocyte, brain, kidney, heart and lungs. For this purpose, a total of eighteen healthy Sprague-Dawley rats were randomly allocated into three experimental groups: A (Control), B (AF-treated) and C (AF+honey-treated). While rats in group A were fed with a diet without AF, B, and C groups received 25 µg of AF/rat/day, where C group additionally received 1 mL/kg of honey by gavage for 90 days. At the end of the 90-day experimental period, we found that the honey supplementation decreased the lipid peroxidation and the levels of enzyme associated with liver damage, increased enzymatic and non-enzymatic antioxidants in the AF+honey-treated rats. Hepatoprotective and nephroprotective effects of honey is further substantiated by showing almost normal histological architecture in AF+honey-treated group, compared to degenerative changes in the liver and kidney of AF-treated rats. Additionally, honey supplementation ameliorated antioxidant defense systems and lipid peroxidation content in other tissues of AF+honey-treated rats. In conclusion, the present study indicates that honey has a hepatoprotective and nephroprotective effect in rats with experimental aflatoxicosis due to its antioxidant activity.

Keywords: aflatoxicosis, honey, histopathology, malondialdehyde, antioxidant, rat

Procedia PDF Downloads 334
5977 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 64
5976 Socio-Economic Factors Influencing the Use of Coping Strategies among Conflict Actors (Farmers and Herders) in Giron Masa Village, Kebbi State, Nigeria

Authors: S. Umar, B. F. Umar

Abstract:

This study was conducted at Giron Masa village, located 30 km from Yauri town. The study determines the socio-economic factors influencing the use of coping strategies among farmers and herders during post-conflict situation. Simple random sampling was employed to select one hundred respondents (50 farmers and 50 herders) from the study area. Logistic regression analysis (LR) was used to ascertain the socioeconomic variables that influenced the use of the coping strategies. The results of the study shows that age, income, family size and farming experience were individually significant and thus influenced the use of POCS by farmers. Annual income and production system influenced the use of POCS by herders. Age, farm size and farming experience were found to be individually significant in influencing the use of EOCS among farmers. Specifically, years of occupation experience among the herders increased the use of emotion oriented coping strategies among herders. The use of SSCS among farmers was influenced by educational level; farm size and farming experience, while the variables are not collectively significant in influencing the use of SSCS among the herders. The research recommends a need to adopt the strategy of community coping to cope with stress.

Keywords: farmers, herders, conflict, coping strategies

Procedia PDF Downloads 374
5975 Towards the Use of Innovative Teaching Methodologies in Nursing Education : A South African Study

Authors: R. Bhagwan, M. Subbhan

Abstract:

Nursing is a very challenging field in South Africa and due to the burden of disease it is critical that nursing students are prepared with the adequate knowledge and skills to deliver effective patient care. Despite this very little research has been done on the teaching strategies used by nurse educators to teach nursing students. It is in this context that a survey of all nurse educators at Nursing Colleges and Universities in Kwa-Zulu Natal was undertaken (n=300) to explore what current pedagogical strategies were being used and which more creative methodologies should be implemented in relation to specific nursing content. Findings revealed that most nurse educators still utlize the lecture approach, but although believe other methodologies such as e-learning are important have not done so because of inadequate training. The recommendations made are that more creative pedagogical strategies such as simultation, portfoloios and case studies be adopted.

Keywords: creative, teaching methodologies, dydactic, nursing

Procedia PDF Downloads 603
5974 Ten Patterns of Organizational Misconduct and a Descriptive Model of Interactions

Authors: Ali Abbas

Abstract:

This paper presents a descriptive model of organizational misconduct based on observed patterns that occur before and after an ethical collapse. The patterns were classified by categorizing media articles in both "for-profit" and "not-for-profit" organizations. Based on the model parameters, the paper provides a descriptive model of various organizational deflection strategies under numerous scenarios, including situations where ethical complaints build-up, situations under which whistleblowers become more prevalent, situations where large scandals that relate to leadership occur, and strategies by which organizations deflect blame when pressure builds up or when media finds out. The model parameters start with the premise of a tolerance to double standards in unethical acts when conducted by leadership or by members of corporate governance. Following this premise, the model explains how organizations engage in discursive strategies to cover up the potential conflicts that arise, including secret agreements and weakening stakeholders who may oppose the organizational acts. Deflection strategies include "preemptive" and "post-complaint" secret agreements, absence of (or vague) documented procedures, engaging in blame and scapegoating, remaining silent on complaints until the media finds out, as well as being slow (if at all) to acknowledge misconduct and fast to cover it up. The results of this paper may be used to guide organizational leaders into the implications of such shortsighted strategies toward unethical acts, even if they are deemed legal. Validation of the model assumptions through numerous media articles is provided.

Keywords: ethical decision making, prediction, scandals, organizational strategies

Procedia PDF Downloads 125
5973 Estimation of Pressure Profile and Boundary Layer Characteristics over NACA 4412 Airfoil

Authors: Anwar Ul Haque, Waqar Asrar, Erwin Sulaeman, Jaffar S. M. Ali

Abstract:

Pressure distribution data of the standard airfoils is usually used for the calibration purposes in subsonic wind tunnels. Results of such experiments are quite old and obtained by using the model in the spanwise direction. In this manuscript, pressure distribution over NACA 4412 airfoil model was presented by placing the 3D model in the lateral direction. The model is made of metal with pressure ports distributed longitudinally as well as in the lateral direction. The pressure model was attached to the floor of the tunnel with the help of the base plate to give the specified angle of attack to the model. Before the start of the experiments, the pressure tubes of the respective ports of the 128 ports pressure scanner are checked for leakage, and the losses due to the length of the pipes were also incorporated in the results for the specified pressure range. Growth rate maps of the boundary layer thickness were also plotted. It was found that with the increase in the velocity, the dynamic pressure distribution was also increased for the alpha seep. Plots of pressure distribution so obtained were overlapped with those obtained by using XFLR software, a low fidelity tool. It was found that at moderate and high angles of attack, the distribution of the pressure coefficients obtained from the experiments is high when compared with the XFLR ® results obtained along with the span of the wing. This under-prediction by XFLR ® is more obvious on the windward than on the leeward side.

Keywords: subsonic flow, boundary layer, wind tunnel, pressure testing

Procedia PDF Downloads 320
5972 Supplier Relationship Management and Selection Strategies: A Literature Review

Authors: Priyesh Kumar Singh, S. K. Sharma, Sanjay Verma, C. Samuel

Abstract:

Supplier Relationship Management (SRM), is strategic planning and managing of all interactions with suppliers to maximize its value. Its application varies from construction industries to healthcare system and investment banks to aviation industries. Several buyer-supplier relationship models, as well as supplier selection and evaluation strategies, have been documented by many academicians and researchers. In this paper, through a comprehensive literature review of over 30 published papers, different theoretical models, empirical data and conclusions were analysed relating to SRM to find its role in establishing better supplier relationships. These journal articles were searched by using the keyword “supplier relationship management,” in databases of Mendeley Library, ProQuest, EBSCO and Google Scholar. This paper reviews the academic literature on different relationship models, supplier evaluation, and selection strategies to discuss its implications in different situations. It also describes the dominant factors responsible for buyer-supplier relationships such trust and power. Finally, conclusions have been drawn which can be validated by various researchers and can help practitioners in industries.

Keywords: supplier relationship management, supplier performance, supplier evaluation, supplier selection strategies

Procedia PDF Downloads 277
5971 Strategies for the Development of Cultural Intelligence in the Foreign Language Classroom

Authors: Azucena Yearby

Abstract:

This study examined if cultural intelligence can be developed through the study of a foreign language. Specifically, the study sought to determine if strategies such as the Arts/History, Vocabulary and Real or Simulated Experiences have an effect on the development of cultural intelligence in the foreign language classroom. Students enrolled in Spanish 1114 or level 1 Spanish courses at the University of Central Oklahoma (UCO) completed Linn Van Dyne’s 20-item questionnaire that measures Cultural Intelligence (CQ). Results from the study indicated a slight cultural intelligence increase in those students who received an intervention. Therefore, the study recommended that foreign language educators implement the considered strategies in the classroom in order to increase their students’ cultural intelligence.

Keywords: cultural competency, cultural intelligence, foreign language, language

Procedia PDF Downloads 466
5970 Numerical Investigation of the Flow Around Multi-Element Airfoils

Authors: Taylan Ozturk, Osama Maklad

Abstract:

This study examines the aerodynamic and flow properties of a multi-element airfoil using computational fluid dynamics (CFD) research. This computational analysis aims to optimize slat design concerning lift-drag coefficients and to determine the ideal gap size between the main airfoil and the front flap. It examines the influence of varying angles of attack and the effects of varied Reynolds numbers. A NACA 2412 airfoil, equipped with custom-designed front and rear flaps, was modeled in SolidWorks and simulated in ANSYS Fluent utilizing the k-ω SST turbulence model. This study quantifies lift and drag coefficients, turbulent kinetic energy, and vorticity magnitude across various configurations. The results clearly indicate that the slat-optimized design geometry featuring a 4 mm gap provides the best performance regarding both lift and drag, with maximum efficiency achieved at a 4-degree angle of attack. Furthermore, the results indicate the initiation of stall conditions beyond 20 degrees and demonstrate how an increase in Reynolds numbers influences flow separation and turbulence patterns. In addition, the maximum L/D ratio which is 36.18 achieved. These findings enhance the comprehension of multi-element airfoil behavior, directly impacting aircraft design and operation, particularly in high-lift situations.

Keywords: multi-element airfoil, CFD simulation, aerodynamic characteristics, Reynolds number analysis

Procedia PDF Downloads 21
5969 Strategies for E-Waste Management: A Literature Review

Authors: Linh Thi Truc Doan, Yousef Amer, Sang-Heon Lee, Phan Nguyen Ky Phuc

Abstract:

During the last few decades, with the high-speed upgrade of electronic products, electronic waste (e-waste) has become one of the fastest growing wastes of the waste stream. In this context, more efforts and concerns have already been placed on the treatment and management of this waste. To mitigate their negative influences on the environment and society, it is necessary to establish appropriate strategies for e-waste management. Hence, this paper aims to review and analysis some useful strategies which have been applied in several countries to handle e-waste. Future perspectives on e-waste management are also suggested. The key findings found that, to manage e-waste successfully, it is necessary to establish effective reverse supply chains for e-waste, and raise public awareness towards the detrimental impacts of e-waste. The result of the research provides valuable insights to governments, policymakers in establishing e-waste management in a safe and sustainable manner.

Keywords: e-waste, e-waste management, life cycle assessment, recycling regulations

Procedia PDF Downloads 275
5968 Computer Assisted Strategies Help to Pharmacist

Authors: Komal Fizza

Abstract:

All around the world in every field professionals are taking great support from their computers. Computer assisted strategies not only increase the efficiency of the professionals but also in case of healthcare they help in life-saving interventions. The background of this current research is aimed towards two things; first to find out if computer assisted strategies are useful for Pharmacist for not and secondly how much these assist a Pharmacist to do quality interventions. Shifa International Hospital is a 500 bedded hospital, and it is running Antimicrobial Stewardship, during their stewardship rounds pharmacists observed that a lot of wrong doses of antibiotics were coming at times those were being overlooked by the other pharmacist even. So, with the help of MIS team the patients were categorized into adult and peads depending upon their age. Minimum and maximum dose of every single antibiotic present in the pharmacy that could be dispensed to the patient was developed. These were linked to the order entry window. So whenever pharmacist would type any order and the dose would be below or above the therapeutic limit this would give an alert to the pharmacist. Whenever this message pop-up this was recorded at the back end along with the antibiotic name, pharmacist ID, date, and time. From 14th of January 2015 and till 14th of March 2015 the software stopped different users 350 times. Out of this 300 were found to be major errors which if reached to the patient could have harmed them to the greater extent. While 50 were due to typing errors and minor deviations. The pilot study showed that computer assisted strategies can be of great help to the pharmacist. They can improve the efficacy and quality of interventions.

Keywords: antibiotics, computer assisted strategies, pharmacist, stewardship

Procedia PDF Downloads 490
5967 Marketing Strategy Adjustment of Multinational Companines in China in the New Period

Authors: Xue Junwei

Abstract:

The rapid economic development of China has made it a critical global market. Multinational companies operating in China face evolving challenges, necessitating adjustments in their marketing strategies. This study uses SWOT analysis and qualitative research methods to explore the trends and countermeasures for adjusting the marketing strategies of multinational companies in China. The research employs the SWOT analysis, quantitative as well as qualitative research techniques to investigate the marketing strategy adjustments of multinational companies in China. The study reveals emerging trends and proposes strategic countermeasures for multinational companies to adapt their marketing strategies in the Chinese market. This research contributes to the existing literature by providing insights into the dynamic environment of multinational companies in China and offering practical recommendations for strategy adjustments. Data were collected using qualitative research methods, including interviews and case studies, and quantitative research methods, such as questionnaires to study multinational companies in China. The collected data were analyzed using SWOT analysis to identify the strengths, weaknesses, opportunities, and threats faced by multinational companies in China, guiding the formulation of effective marketing strategies. This study addresses the challenges faced by multinational companies in China, the need for strategic adjustments, and the potential approaches to enhancing marketing effectiveness in this market. The study emphasizes the significance of adapting marketing strategies to align with the changing landscape of the Chinese market. It provides actionable recommendations for multinational companies to thrive in this environment.

Keywords: multinational company, marketing strategies, Chinese market, SWOT

Procedia PDF Downloads 5
5966 Modeling and Optimal Control of Pneumonia Disease with Cost Effective Strategies

Authors: Getachew Tilahun, Oluwole Makinde, David Malonza

Abstract:

We propose and analyze a non-linear mathematical model for the transmission dynamics of pneumonia disease in a population of varying size. The deterministic compartmental model is studied using stability theory of differential equations. The effective reproduction number is obtained and also the local and global asymptotically stability conditions for the disease free and as well as for the endemic equilibria are established. The model exhibit a backward bifurcation and the sensitivity indices of the basic reproduction number to the key parameters are determined. Using Pontryagin’s maximum principle, the optimal control problem is formulated with three control strategies; namely disease prevention through education, treatment and screening. The cost effectiveness analysis of the adopted control strategies revealed that the combination of prevention and treatment is the most cost effective intervention strategies to combat the pneumonia pandemic. Numerical simulation is performed and pertinent results are displayed graphically.

Keywords: cost effectiveness analysis, optimal control, pneumonia dynamics, stability analysis, numerical simulation

Procedia PDF Downloads 327
5965 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 145
5964 Stress and Coping Strategies: A Correlational Analysis to Profiling Maladaptive Behaviors at Work

Authors: Silvia Riva, Ezekiel Chinyio

Abstract:

Introduction: Workers in different sectors are prone to stress at varying levels. They also respond to stress in different ways. An inspiration was to study stress development amongst workers in a work dangerous setting (Construction Industry) as well as how they cope with specific stress incidences. Objective: The overarching objective of the study was to study and correlate between stress and coping strategies. The research was conducted in an organizational industrial setting, and its findings on the coping actions of construction workers are reported in this article. Methods: An online cross-sectional survey was conducted with 80 participants aged 18-62. These were working for three different construction organizations in the West Midland region of the UK. Their coping actions were assessed using the COPE Inventory (Carver, 2013) instrument while the level of stress was assessed by the Perceived Stress Scale (Cohen, 1994). Results: Out of 80 workers (20 female, 25%, mean age 40.66), positive reinterpretation (M=4.15, SD=2.60) and active coping (M=4.18, SD=2.55) were the two most adaptive strategies reported by the workers while the most frequent maladaptive behavior was mental disengagement (M=3.62, SD=2.25). Among the maladaptive tactics, alcohol and drug abuse was a significant moderator in stress reactions (t=6.12, p=.000). Conclusion: Some maladaptive strategies are adopted by construction workers to cope with stress. So, it could be argued that programs of stress prevention and control in the construction industry have a basis to develop solutions that can improve and strengthen effective interventions when workers are stressed or getting stressed.

Keywords: coping, organization, strategies, stress

Procedia PDF Downloads 217