Search results for: organisational connectivity
227 Social Media Resignation the Only Way to Protect User Data and Restore Cognitive Balance, a Literature Review
Authors: Rajarshi Motilal
Abstract:
The birth of the Internet and the rise of social media marked an important chapter in the history of humankind. Often termed the fourth scientific revolution, the Internet has changed human lives and cognisance. The birth of Web 2.0, followed by the launch of social media and social networking sites, added another milestone to these technological advancements where connectivity and influx of information became dominant. With billions of individuals using the internet and social media sites in the 21st century, “users” became “consumers”, and orthodox marketing reshaped itself to digital marketing. Furthermore, organisations started using sophisticated algorithms to predict consumer purchase behaviour and manipulate it to sustain themselves in such a competitive environment. The rampant storage and analysis of individual data became the new normal, raising many questions about data privacy. The excessive usage of the Internet among individuals brought in other problems of them becoming addicted to it, scavenging for societal approval and instant gratification, subsequently leading to a collective dualism, isolation, and finally, depression. This study aims to determine the relationship between social media usage in the modern age and the rise of psychological and cognitive imbalances in human minds. The literature review is positioned timely as an addition to the existing work at a time when the world is constantly debating on whether social media resignation is the only way to protect user data and restore the decaying cognitive balance.Keywords: social media, digital marketing, consumer behaviour, internet addiction, data privacy
Procedia PDF Downloads 76226 Child Homicide Victimization and Community Context: A Research Note
Authors: Bohsiu Wu
Abstract:
Among serious crimes, child homicide is a rather rare event. However, the killing of children stirs up a special type of emotion in society that pales other criminal acts. This study examines the relevancy of three possible community-level explanations for child homicide: social deprivation, female empowerment, and social isolation. The social deprivation hypothesis posits that child homicide results from lack of resources in communities. The female empowerment hypothesis argues that a higher female status translates into a higher level of capability to prevent child homicide. Finally, the social isolation hypothesis regards child homicide as a result of lack of social connectivity. Child homicide data, aggregated by US postal ZIP codes in California from 1990 to 1999, were analyzed with a negative binomial regression. The results of the negative binomial analysis demonstrate that social deprivation is the most salient and consistent predictor among all other factors in explaining child homicide victimization at the ZIP-code level. Both social isolation and female labor force participation are weak predictors of child homicide victimization across communities. Further, results from the negative binomial regression show that it is the communities with a higher, not lower, degree of female labor force participation that are associated with a higher count of child homicide. It is possible that poor communities with a higher level of female employment have a lesser capacity to provide the necessary care and protection for the children. Policies aiming at reducing social deprivation and strengthening female empowerment possess the potential to reduce child homicide in the community.Keywords: child homicide, deprivation, empowerment, isolation
Procedia PDF Downloads 194225 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics
Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky
Abstract:
With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities
Procedia PDF Downloads 169224 Influence of Sr(BO2)2 Doping on Superconducting Properties of (Bi,Pb)-2223 Phase
Authors: N. G. Margiani, I. G. Kvartskhava, G. A. Mumladze, Z. A. Adamia
Abstract:
Chemical doping with different elements and compounds at various amounts represents the most suitable approach to improve the superconducting properties of bismuth-based superconductors for technological applications. In this paper, the influence of partial substitution of Sr(BO2)2 for SrO on the phase formation kinetics and transport properties of (Bi,Pb)-2223 HTS has been studied for the first time. Samples with nominal composition Bi1.7Pb0.3Sr2-xCa2Cu3Oy[Sr(BO2)2]x, x=0, 0.0375, 0.075, 0.15, 0.25, were prepared by the standard solid state processing. The appropriate mixtures were calcined at 845 oC for 40 h. The resulting materials were pressed into pellets and annealed at 837 oC for 30 h in air. Superconducting properties of undoped (reference) and Sr(BO2)2-doped (Bi,Pb)-2223 compounds were investigated through X-ray diffraction (XRD), resistivity (ρ) and transport critical current density (Jc) measurements. The surface morphology changes in the prepared samples were examined by scanning electron microscope (SEM). XRD and Jc studies have shown that the low level Sr(BO2)2 doping (x=0.0375-0.075) to the Sr-site promotes the formation of high-Tc phase and leads to the enhancement of current carrying capacity in (Bi,Pb)-2223 HTS. The doped sample with x=0.0375 has the best performance compared to other prepared samples. The estimated volume fraction of (Bi,Pb)-2223 phase increases from ~25 % for reference specimen to ~70 % for x=0.0375. Moreover, strong increase in the self-field Jc value was observed for this dopant amount (Jc=340 A/cm2), compared to an undoped sample (Jc=110 A/cm2). Pronounced enhancement of superconducting properties of (Bi,Pb)-2223 superconductor can be attributed to the acceleration of high-Tc phase formation as well as the improvement of inter-grain connectivity by small amounts of Sr(BO2)2 dopant.Keywords: bismuth-based superconductor, critical current density, phase formation, Sr(BO₂)₂ doping
Procedia PDF Downloads 244223 Low Complexity Carrier Frequency Offset Estimation for Cooperative Orthogonal Frequency Division Multiplexing Communication Systems without Cyclic Prefix
Authors: Tsui-Tsai Lin
Abstract:
Cooperative orthogonal frequency division multiplexing (OFDM) transmission, which possesses the advantages of better connectivity, expanded coverage, and resistance to frequency selective fading, has been a more powerful solution for the physical layer in wireless communications. However, such a hybrid scheme suffers from the carrier frequency offset (CFO) effects inherited from the OFDM-based systems, which lead to a significant degradation in performance. In addition, insertion of a cyclic prefix (CP) at each symbol block head for combating inter-symbol interference will lead to a reduction in spectral efficiency. The design on the CFO estimation for the cooperative OFDM system without CP is a suspended problem. This motivates us to develop a low complexity CFO estimator for the cooperative OFDM decode-and-forward (DF) communication system without CP over the multipath fading channel. Especially, using a block-type pilot, the CFO estimation is first derived in accordance with the least square criterion. A reliable performance can be obtained through an exhaustive two-dimensional (2D) search with a penalty of heavy computational complexity. As a remedy, an alternative solution realized with an iteration approach is proposed for the CFO estimation. In contrast to the 2D-search estimator, the iterative method enjoys the advantage of the substantially reduced implementation complexity without sacrificing the estimate performance. Computer simulations have been presented to demonstrate the efficacy of the proposed CFO estimation.Keywords: cooperative transmission, orthogonal frequency division multiplexing (OFDM), carrier frequency offset, iteration
Procedia PDF Downloads 268222 Terrorism: Impact on Nigeria’s Foreign Policy, 1999-2015
Authors: Omolaja Akolade Oluwaseunfunmi
Abstract:
This study seeks to ascertain the origin and history of terrorism in Nigeria, determine the causes of terrorism in Nigeria, examine Nigeria’s foreign policies from 1999 to 2015, evaluate how terrorist groups like Boko Haram and the Indigenous People of Biafra (IPOB) have affected Nigeria’s foreign policies in the international arena; ascertain the measures taken by the government in tackling terrorist acts in Nigeria and give recommendations on how to tackle this menace. The methodology used in this research is the analytical method. The study derives its data from both primary and secondary sources. Findings from fieldwork showed that terrorism has also become one of the most important fundamentals of Nigeria’s foreign policies and relations; respondents from the people interviewed showed that terrorism is a menace and that terrorism must be adequately tackled in other to achieve Nigeria’s foreign policy. Furthermore, results revealed that the fight against the scourge has increasingly gained legitimacy and justification among the international community particularly as many countries consider it to be their international obligation to support the global movement to ameliorate or eliminate the menace. In conclusion, this research made, among other recommendations, that the Nigerian government should ensure the provision of a good life for its citizens, the inter-connectivity of terrorist organizations must be defeated, the government should undergo a foreign policy drive designed at rebuilding its image in the international environment, and also the promotion of peace education among various government, religious institutions, private sector, and civil society groups should be encouraged.Keywords: foreign policy, Boko Haram, movement for the emancipation of Niger delta (MEND), terrorism
Procedia PDF Downloads 30221 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network
Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar
Abstract:
Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.Keywords: Bitcoin network, propagation delay, clustering, scalability
Procedia PDF Downloads 116220 Localization of Frontal and Temporal Speech Areas in Brain Tumor Patients by Their Structural Connections with Probabilistic Tractography
Authors: B.Shukir, H.Woo, P.Barzo, D.Kis
Abstract:
Preoperative brain mapping in tumors involving the speech areas has an important role to reduce surgical risks. Functional magnetic resonance imaging (fMRI) is the gold standard method to localize cortical speech areas preoperatively, but its availability in clinical routine is difficult. Diffusion MRI based probabilistic tractography is available in head MRI. It’s used to segment cortical subregions by their structural connectivity. In our study, we used probabilistic tractography to localize the frontal and temporal cortical speech areas. 15 patients with left frontal tumor were enrolled to our study. Speech fMRI and diffusion MRI acquired preoperatively. The standard automated anatomical labelling atlas 3 (AAL3) cortical atlas used to define 76 left frontal and 118 left temporal potential speech areas. 4 types of tractography were run according to the structural connection of these regions to the left arcuate fascicle (FA) to localize those cortical areas which have speech functions: 1, frontal through FA; 2, frontal with FA; 3, temporal to FA; 4, temporal with FA connections were determined. Thresholds of 1%, 5%, 10% and 15% applied. At each level, the number of affected frontal and temporal regions by fMRI and tractography were defined, the sensitivity and specificity were calculated. At the level of 1% threshold showed the best results. Sensitivity was 61,631,4% and 67,1523,12%, specificity was 87,210,4% and 75,611,37% for frontal and temporal regions, respectively. From our study, we conclude that probabilistic tractography is a reliable preoperative technique to localize cortical speech areas. However, its results are not feasible that the neurosurgeon rely on during the operation.Keywords: brain mapping, brain tumor, fMRI, probabilistic tractography
Procedia PDF Downloads 166219 Synergistic Effect of Zr-Modified Cu-ZnO-Al₂O₃ and Bio-Templated HZSM-5 Catalysts in CO₂ Hydrogenation to Methanol and DME
Authors: Abrar Hussain, Kuen-Song Lin, Sayed Maeen Badshah, Jamshid Hussain
Abstract:
The conversion of CO₂ into versatile, useful compounds such as fuels and other chemicals remains a challenging frontier in research, demanding the innovation of increasingly effective catalysts. In the present work, a catalyst-incorporating zirconium (Zr) modification within CuO–ZnO–Al₂O₃ (CZA) was synthesized via a co-precipitation method to convert CO₂ into methanol. Furthermore, bio-HZSM-5 was used to promote methanol dehydration to produce dimethyl ether (DME). We prepared the porous hierarchy bio-HZSM-5 with remarkable pore connectivity by utilizing an economical loofah sponge and rice husks as biotemplates. The synthesized catalysts were characterized using Field Emission Scanning Electron Microscopy (FE-SEM), X–ray diffraction (XRD), N₂ adsorption (BET), temperature-programmed desorption (NH₃-TPD) and thermogravimetric analysis (TGA). The Zr addition improved the performance of the CZZA catalyst as a structural promoter, leading to increased DME selectivity and total carbon conversion by enhancing active sites, surface area, and the synergistic interfaces between CuO and ZnO. The presence of silicon in the biomass, notably from the loofah sponge (0.016 wt %) and rice husks (8.3 wt %), also performed a pivotal role in the preparation of bio-HZSM-5. Furthermore, contrasted to the CZZA/com-ZSM-5 catalyst, the integration of CZZA with bio-HZSM-5-L bifunctional catalyst achieved the highest DME yield (12.1 %), DME selectivity (58.6%), CO₂ conversion (22.5%) at 280 °C and 30 bar. The payback time for 5 and 10-tons per day (5 and10-TPD) DME formation using the catalytic process of CO₂ from petrochemical refinery plant waste gas emissions was 2.98 and 2.44 years, respectively.Keywords: Cost assessment, Dimethyl ether, low-cost bio-HZSM-5, CZZA catalyst, CO₂ hydrogenation
Procedia PDF Downloads 14218 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity
Procedia PDF Downloads 47217 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture
Authors: Mirad Böhm, Diede De Kok
Abstract:
It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder
Procedia PDF Downloads 332216 Meditation Aided with 40 Hz Binaural Beats Enhances the Cognitive Function and Mood State
Authors: Rubina Shakya, Srijana Dangol, Dil Islam Mansur
Abstract:
The exposure of constant stress stimuli in our daily lives is causing deterioration of neural connectivity in the brain. Interestingly, the improvement in larger-scale neural communication has been argued to rely on brain rhythms, which might be sensitive to binaural beats of particular frequency bands. The theoretical idea behind neural entrainment is that the rhythmic oscillatory activity within and between different brain regions can enhance cognitive function and mood state. So, we aimed to investigate whether the binaural beats of 40 Hz could enhance the cognition and the mood stability of the medical students at Kathmandu University of age 18-25 years old, which possibly, in the long run, might help to enhance their work productivity. The participants were asked to focus on the auditory stimuli of binaural beats with 200 Hz on the right side and 240 Hz on the left side of the headset for 15 minutes, every alternative day of three consecutive weeks. The Stroop’s test and the Brunel Mood Scale (BRUMS) were applied to assess the cognitive function and the mood state, respectively. The binaural beats significantly decreased the reaction time for the incoherent component of Stroop’s test in both male and female participants. For the mood state, scores of all positive emotions except ‘Calmness’ were significantly increased in the case of males. Whereas, scores of all positive emotions except ‘Vigor’ were significantly increased in the case of females. The results suggested that the meditation aided by binaural beats of 40 Hz helps in improving cognition and mood states to some extent.Keywords: binaural beats, cognitive function, gamma neural oscillation, mood states
Procedia PDF Downloads 141215 Protecting the Democracy of Children through Sustainable Risk Management: An Investigation into Risk Assessment and Nature-Based Play
Authors: Molly Gerrish
Abstract:
This work explores the physical, emotional, social, and cognitive risks and benefits related to nature-based teaching and highlights the importance of promoting a sustainable workforce within early childhood programs. Assessing and managing risks can help programs reimagine their approach to teaching, learning, recruitment, family connectivity, and staff motivation. The importance of staff sustainability and motivation/engagement related to social justice and the environment will be discussed. We will explore ways to manage fears and limitations faced by early childhood programs regarding nature experiences and risky play in a variety of locations using a lens of place-based learning. We will also examine the alignment of sustainability and social-emotional development, mental health supports, social awareness, and risk assessment. The work will discuss the varied perceptions of risk in diverse areas and the impact on the early childhood workforce. Motivational theory and compassion resiliency are hallmarks of both recruiting and retaining high-quality early childhood educators; the work will discuss how to balance programmatic constraints and healthy motivation for students and teachers while empowering individuals to advocate for their mental health and well-being. Finally, the work will highlight the positive impact of nature-based teaching practices and the overall benefit to young children and their educators.Keywords: child’s rights, inclusion, nature-based education, risk assessment
Procedia PDF Downloads 61214 Integrated Free Space Optical Communication and Optical Sensor Network System with Artificial Intelligence Techniques
Authors: Yibeltal Chanie Manie, Zebider Asire Munyelet
Abstract:
5G and 6G technology offers enhanced quality of service with high data transmission rates, which necessitates the implementation of the Internet of Things (IoT) in 5G/6G architecture. In this paper, we proposed the integration of free space optical communication (FSO) with fiber sensor networks for IoT applications. Recently, free-space optical communications (FSO) are gaining popularity as an effective alternative technology to the limited availability of radio frequency (RF) spectrum. FSO is gaining popularity due to flexibility, high achievable optical bandwidth, and low power consumption in several applications of communications, such as disaster recovery, last-mile connectivity, drones, surveillance, backhaul, and satellite communications. Hence, high-speed FSO is an optimal choice for wireless networks to satisfy the full potential of 5G/6G technology, offering 100 Gbit/s or more speed in IoT applications. Moreover, machine learning must be integrated into the design, planning, and optimization of future optical wireless communication networks in order to actualize this vision of intelligent processing and operation. In addition, fiber sensors are important to achieve real-time, accurate, and smart monitoring in IoT applications. Moreover, we proposed deep learning techniques to estimate the strain changes and peak wavelength of multiple Fiber Bragg grating (FBG) sensors using only the spectrum of FBGs obtained from the real experiment.Keywords: optical sensor, artificial Intelligence, Internet of Things, free-space optics
Procedia PDF Downloads 64213 The Teaching and Learning Process and Information and Communication Technologies from the Remote Perspective
Authors: Rosiris Maturo Domingues, Patricia Luissa Masmo, Cibele Cavalheiro Neves, Juliana Dalla Martha Rodriguez
Abstract:
This article reports the experience of the pedagogical consultants responsible for the curriculum development of Senac São Paulo courses when facing the emergency need to maintain the pedagogical process in their schools in the face of the Covid-19 pandemic. The urgent adjustment to distance education resulted in the improvement of the process and the adoption of new teaching and learning strategies mediated by technologies. The processes for preparing and providing guidelines for professional education courses were also readjusted. Thus, a bank of teaching-learning strategies linked to digital resources was developed, categorized, and identified by their didactic-pedagogical potential, having as an intersection didactic planning based on learning objectives based on Bloom's taxonomy (revised), given its convergence with the competency approach adopted by Senac. Methodologically, a relationship was established between connectivity and digital networks and digital evolution in school environments, culminating in new paradigms and processes of educational communication and new trends in teaching and learning. As a result, teachers adhered to the use of digital tools in their practices, transposing face-to-face classroom methodologies and practices to online media, whose criticism was the use of ICTs in an instrumental way, reducing methodologies and practices to teaching only transmissive. There was recognition of the insertion of technology as a facilitator of the educational process in a non-palliative way and the development of a web curriculum, now and fully, carried out in contexts of ubiquity.Keywords: technologies, education, teaching-learning strategies, Bloom taxonomy
Procedia PDF Downloads 91212 Social Distancing as a Population Game in Networked Social Environments
Authors: Zhijun Wu
Abstract:
While social living is considered to be an indispensable part of human life in today's ever-connected world, social distancing has recently received much public attention on its importance since the outbreak of the coronavirus pandemic. In fact, social distancing has long been practiced in nature among solitary species and has been taken by humans as an effective way of stopping or slowing down the spread of infectious diseases. A social distancing problem is considered for how a population, when in the world with a network of social sites, decides to visit or stay at some sites while avoiding or closing down some others so that the social contacts across the network can be minimized. The problem is modeled as a population game, where every individual tries to find some network sites to visit or stay so that he/she can minimize all his/her social contacts. In the end, an optimal strategy can be found for everyone when the game reaches an equilibrium. The paper shows that a large class of equilibrium strategies can be obtained by selecting a set of social sites that forms a so-called maximal r-regular subnetwork. The latter includes many well-studied network types, which are easy to identify or construct and can be completely disconnected (with r = 0) for the most-strict isolation or allow certain degrees of connectivity (with r > 0) for more flexible distancing. The equilibrium conditions of these strategies are derived. Their rigidity and flexibility are analyzed on different types of r-regular subnetworks. It is proved that the strategies supported by maximal 0-regular subnetworks are strictly rigid, while those by general maximal r-regular subnetworks with r > 0 are flexible, though some can be weakly rigid. The proposed model can also be extended to weighted networks when different contact values are assigned to different network sites.Keywords: social distancing, mitigation of spread of epidemics, populations games, networked social environments
Procedia PDF Downloads 135211 Evolving Maritime Geopolitics of the Indo-Pacific
Authors: Pragya Pandey
Abstract:
A major discussion in the 21st -century international affairs has been around the shifting economic and political center of gravity to Asia. In the maritime realm, it translates into a shift in focus from the Atlantic to the Pacific-Indian Ocean region or what is now popularly called the Indo-Pacific region. The Indo-Pacific is rapidly eclipsing once dominant Asia-Pacific as center of trade, investment, competition and cooperation. The growing inter-connectivity between the Indian Ocean and the Pacific Ocean is bringing forth the ‘confluence of the two seas’. Therefore, the Indo-Pacific strategic arc is acquiring greater salience in consonance with the changing realities of the time. The region is undergoing unprecedented transformation in its security outlook. At present, the region is at an interesting historic epoch- witnessing the simultaneous rise India and China, their economic growth, naval modernization and power projection capabilities, alongside the continued presence of the United States, particularly with its rebalancing strategy. Besides the interplay among the three major stakeholders, other regional players like Japan, Australia, and Indonesia, would play a crucial role in the geopolitical re-arrangement of the Indo-Pacific region. The region will be the future theater of activities to determine the shifts and distribution of sea power, by the virtue of its strategic location, intrinsic value of the energy resources and significant maritime trade routes of the region. Therefore, the central theme of the paper would be to scrutinize the maritime security environment of the region against the backdrop of the tricky geopolitical landscape, contributing to the change in the regional and global balance of power.Keywords: China, geopolitics, India, United States
Procedia PDF Downloads 260210 Developing a Framework for Open Source Software Adoption in a Higher Education Institution in Uganda. A case of Kyambogo University
Authors: Kafeero Frank
Abstract:
This study aimed at developing a frame work for open source software adoption in an institution of higher learning in Uganda, with the case of KIU as a study area. There were mainly four research questions based on; individual staff interaction with open source software forum, perceived FOSS characteristics, organizational characteristics and external characteristics as factors that affect open source software adoption. The researcher used causal-correlation research design to study effects of these variables on open source software adoption. A quantitative approach was used in this study with self-administered questionnaire on a purposively and randomly sampled sample of university ICT staff. Resultant data was analyzed using means, correlation coefficients and multivariate multiple regression analysis as statistical tools. The study reveals that individual staff interaction with open source software forum and perceived FOSS characteristics were the primary factors that significantly affect FOSS adoption while organizational and external factors were secondary with no significant effect but significant correlation to open source software adoption. It was concluded that for effective open source software adoption to occur there must be more effort on primary factors with subsequent reinforcement of secondary factors to fulfill the primary factors and adoption of open source software. Lastly recommendations were made in line with conclusions for coming up with Kyambogo University frame work for open source software adoption in institutions of higher learning. Areas of further research recommended include; Stakeholders’ analysis of open source software adoption in Uganda; Challenges and way forward. Evaluation of Kyambogo University frame work for open source software adoption in institutions of higher learning. Framework development for cloud computing adoption in Ugandan universities. Framework for FOSS development in Uganda IT industryKeywords: open source software., organisational characteristics, external characteristics, cloud computing adoption
Procedia PDF Downloads 72209 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 42208 Urban Design as a Tool to Address Safety in a Crime Ridden Area: A Case Study of Malviya Nagar, New Delhi
Authors: Shramana Mondal
Abstract:
As a city is growing in population, sprawl, and complexity, use of public spaces increases variably and thus ensuring safety for the people becomes an utmost priority. While active monitoring measures may be necessary in some places, urban design can play a major role in devising self-policing and encourage active public life. This paper aims to explore the various spatial and psychological reasons for the occurrence of crime and the role of ‘urban design’ to address this issue. In this research, the principles of urban design are examined, as well as projected on actual site by addressing the issue with urban design principles. In this review the sociological, psychological, typological and morphological factors are addressed which affect the safety of a space and the possible framing guidelines, controls and urban design strategies are explored to address a safe neighborhood. On the basis of statistical survey, the residential and street network of Malviya Nagar in Delhi is chosen as the area of demonstration. The programs inhibit a safe neighborhood and a movement network that are addressed based on the four principles of natural surveillance, territoriality, community building, and connectivity. The paper concludes with a discussion of the urban design as an effective tool by creating an intense active zone with mixed use feature to ensure throughout activity and also ensuring safe pedestrian zone by introducing sense of community feeling and territoriality thus achieving active, useful and public friendly space.Keywords: crime, public life, safety, urban design
Procedia PDF Downloads 401207 E-Government Development in Nigeria, 'Bank Verification No': An Anti-Corruption Tool
Authors: Ernest C. Nwadinobi, Amanda Peart, Carl Adams
Abstract:
The leading countries like the USA, UK and some of the European countries have moved their focus away from just developing the e-government platform towards just the electronic services which aim at providing access to information to its citizens or customers, but they have gone to make significant backroom changes that can accommodate this electronic service being provided to its customers or citizens. E-government has moved from just providing electronic information to citizens and customers alike to serving their needs. In developing countries like Nigeria, the enablement of e-government is being used as an anti-corruption tool. The introduction of the Bank verification number (BVN) scheme by the Central Bank of Nigeria, has helped the government in not just saving money but also protecting customer’s transaction and enhancing confidence in the banking sector. This has helped curtail the high rate of cyber and financial crime that has been part of the system. The use of BVN as an anti-corruption tool in Nigeria came at a time there was need for openness, accountability, and discipline, after years of robbing the treasury and recklessness in handling finances. As there has not been a defined method for measuring the strength or success of e-government development, in this case BVN, in Nigeria, progress will remain at the same level. The implementation strategy of the BVN in Nigeria has mostly been a quick fix, quick win solution. In fact, there is little or no indication to show evidence of a framework for e-government. Like other leading countries, there is the need for proper implementation of strategy and framework especially towards a customer orientated process, which will accommodate every administrative body of the government institution including private business rather than focusing on a non-flexible organisational structure. The development of e-government must have a strategy and framework for it to work, and this strategy must enclose every public administration and will not be limited to any individual bodies or organization. A defined framework or monitoring method must be put in place to help evaluate and benchmark government development in e-government. This framework must follow the same concept or principles. In censorious analyses of the existing methods, this paper will denote areas that must be included in the existing approach to be able to channel e-government development towards its defined strategic objectives.Keywords: Bank Verification No (BVN), quick-fix, anti-corruption, quick-win
Procedia PDF Downloads 163206 Perception of Faculties Towards Online Teaching-Learning Activities during COVID-19 Pandemic: A Cross-Sectional Study at a Tertiary Care Center in Eastern Nepal
Authors: Deependra Prasad Sarraf, Gajendra Prasad Rauniar, Robin Maskey, Rajiv Maharjan, Ashish Shrestha, Ramayan Prasad Kushwaha
Abstract:
Objectives: To assess the perception of faculties towards online teaching-learning activities conducted during the COVID-19 pandemic and to identify barriers and facilitators to conducting online teaching-learning activities in our context. Methods: A cross-sectional study was conducted among faculties at B. P. Koirala Institute of Health Sciences using a 26-item semi-structured questionnaire. A Google Form was prepared, and its link was sent to the faculties via email. Descriptive statistics were calculated, and findings were presented as tables and graphs. Results: Out of 158 faculties, the majority were male (66.46%), medical faculties (85.44%), and assistant professors (46.84%). Only 16 (10.13%) faculties had received formal training regarding preparing and/or delivering online teaching learning activities. Out of 158, 133 (84.18%) faculties faced technical and internet issues. The most common advantage and disadvantage of online teaching learning activities perceived by the faculties were ‘not limited to time or place’ (94.30%) and ‘lack of interaction with the students’ (82.28%), respectively. Majority (94.3%) of them had a positive perception towards online teaching-learning activities conducted during COVID-19 pandemic. Slow internet connection (91.77%) and frequent electricity interruption (82.91%) were the most common perceived barriers to online teaching-learning. Conclusions: Most of the faculties had a positive perception towards online teaching-learning activities. Academic leaders and stakeholders should provide uninterrupted internet and electricity connectivity, training on online teaching-learning platform, and timely technical support.Keywords: COVID-19 pandemic, faculties, medical education, perception
Procedia PDF Downloads 175205 A Review on Building Information Modelling in Nigeria and Its Potentials
Authors: Mansur Hamma-Adama, Tahar Kouider
Abstract:
Construction Industry has been evolving since the development of Building Information Modelling (BIM). This technological process is unstoppable; it is out to the market with remarkable case studies of solving the long industry’s history of fragmentation. This industry has been changing over time; United States has recorded the most significant development in construction digitalization, Australia, United Kingdom and some other developed nations are also amongst promoters of BIM process and its development. Recently, a developing country like China and Malaysia are keying into the industry’s digital shift, while very little move is seen in South Africa whose development is considered higher and perhaps leader in the digital transition amongst the African countries. To authors’ best knowledge, Nigerian construction industry has never engaged in BIM discussions hence has no attention at national level. Consequently, Nigeria has no “Noteworthy BIM publications.” Decision makers and key stakeholders need to be informed on the current trend of the industry’s development (BIM in specific) and the opportunities of adopting this digitalization trend in relation to the identified challenges. BIM concept can be traced mostly in Architectural practices than engineering practices in Nigeria. A superficial BIM practice is found to be at organisational level only and operating a model based - “BIM stage 1.” Research to adopting this innovation has received very little attention. This piece of work is literature review based, aimed at exploring BIM in Nigeria and its prospects. The exploration reveals limitations in the literature availability as to extensive research in the development of BIM in the country. Numerous challenges were noticed including building collapse, inefficiencies, cost overrun and late project delivery. BIM has potentials to overcome the above challenges and even beyond. Low level of BIM adoption with reasonable level of awareness is noticed. However, lack of policy and guideline as well as serious lack of experts in the field are amongst the major barriers to BIM adoption. The industry needs to embrace BIM to possibly compete with its global counterpart.Keywords: adoption, BIM, CAD, construction industry, Nigeria, opportunities
Procedia PDF Downloads 154204 Improving Fault Tolerance and Load Balancing in Heterogeneous Grid Computing Using Fractal Transform
Authors: Saad M. Darwish, Adel A. El-Zoghabi, Moustafa F. Ashry
Abstract:
The popularity of the Internet and the availability of powerful computers and high-speed networks as low-cost commodity components are changing the way we use computers today. These technical opportunities have led to the possibility of using geographically distributed and multi-owner resources to solve large-scale problems in science, engineering, and commerce. Recent research on these topics has led to the emergence of a new paradigm known as Grid computing. To achieve the promising potentials of tremendous distributed resources, effective and efficient load balancing algorithms are fundamentally important. Unfortunately, load balancing algorithms in traditional parallel and distributed systems, which usually run on homogeneous and dedicated resources, cannot work well in the new circumstances. In this paper, the concept of a fast fractal transform in heterogeneous grid computing based on R-tree and the domain-range entropy is proposed to improve fault tolerance and load balancing algorithm by improve connectivity, communication delay, network bandwidth, resource availability, and resource unpredictability. A novel two-dimension figure of merit is suggested to describe the network effects on load balance and fault tolerance estimation. Fault tolerance is enhanced by adaptively decrease replication time and message cost while load balance is enhanced by adaptively decrease mean job response time. Experimental results show that the proposed method yields superior performance over other methods.Keywords: Grid computing, load balancing, fault tolerance, R-tree, heterogeneous systems
Procedia PDF Downloads 492203 Perception of Neighbourhood-Level Built Environment in Relation to Youth Physical Activity in Malaysia
Authors: A. Abdullah, N. Faghih Mirzaei, S. Hany Haron
Abstract:
Neighbourhood environment walkability on reported physical activity (PA) levels of students of Universiti Sains Malaysia (USM) in Malaysia. Compared with previous generations, today’s young people spend less time playing outdoors and have lower participation rates in PA. Research suggests that negative perceptions of neighbourhood walkability may be a potential barrier to adolescents’ PA. The sample consisted of 200 USM students (to 24 years old) who live outside of the main campus and engage in PA in sport halls and sport fields of USM. The data were analysed using the t-test, binary logistic regression, and discriminant analysis techniques. The present study found that youth PA was affected by neighbourhood environment walkability factors, including neighbourhood infrastructures, neighbourhood safety (crime), and recreation facilities, as well as street characteristics and neighbourhood design variables such as facades of sidewalks, roadside trees, green spaces, and aesthetics. The finding also illustrated that active students were influenced by street connectivity, neighbourhood infrastructures, recreation facilities, facades of sidewalks, and aesthetics, whereas students in the less active group were affected by access to destinations, neighbourhood safety (crime), and roadside trees and green spaces for their PAs. These results report which factors of built environments have more effect on youth PA and they message to the public to create more awareness about the benefits of PA on youth health.Keywords: fear of crime, neighbourhood built environment, physical activities, street characteristics design
Procedia PDF Downloads 354202 Nano-Filled Matrix Reinforced by Woven Carbon Fibers Used as a Sensor
Authors: K. Hamdi, Z. Aboura, W. Harizi, K. Khellil
Abstract:
Improving the electrical properties of organic matrix composites has been investigated in several studies. Thus, to extend the use of composites in more varied application, one of the actual barrier is their poor electrical conductivities. In the case of carbon fiber composites, organic matrix are in charge of the insulating properties of the resulting composite. However, studying the properties of continuous carbon fiber nano-filled composites is less investigated. This work tends to characterize the effect of carbon black nano-fillers on the properties of the woven carbon fiber composites. First of all, SEM observations were performed to localize the nano-particles. It showed that particles penetrated on the fiber zone (figure1). In fact, by reaching the fiber zone, the carbon black nano-fillers created network connectivity between fibers which means an easy pathway for the current. It explains the noticed improvement of the electrical conductivity of the composites by adding carbon black. This test was performed with the four points electrical circuit. It shows that electrical conductivity of 'neat' matrix composite passed from 80S/cm to 150S/cm by adding 9wt% of carbon black and to 250S/cm by adding 17wt% of the same nano-filler. Thanks to these results, the use of this composite as a strain gauge might be possible. By the way, the study of the influence of a mechanical excitation (flexion, tensile) on the electrical properties of the composite by recording the variance of an electrical current passing through the material during the mechanical testing is possible. Three different configuration were performed depending on the rate of carbon black used as nano-filler. These investigation could lead to develop an auto-instrumented material.Keywords: carbon fibers composites, nano-fillers, strain-sensors, auto-instrumented
Procedia PDF Downloads 411201 A Phenomenographic Examination of Work Motivation to Perform at the Municipal Corporation of Bangladesh
Authors: Md. Rifad Chowdhury
Abstract:
This research study investigates employees' conception of work motivation to perform at the municipal corporation in Bangladesh. The municipal corporation is one of the key administrative bodies of Bangladesh’s local government. Municipal corporation employees provide essential public services in the country’s semi-urban areas. Work motivation has been defined as a result of interaction between the individual and the environment. Local government studies indicate the work environment of the municipal corporation is unique because of its key colonial and political history, several reform attempts, non-western social perspectives, job functions, and traditional governance. The explorative purpose of this study is to find and analyse the conceptions of employees’ work motivation within this environment to expand a better understanding of work motivation. According to the purpose of this study, a qualitative method has been adopted, which has remained a very unpopular method among work motivational researchers in Bangladesh. Twenty-two semi-structured online interviews were conducted in this study. Phenomenographic research methodology has been adopted to describe the limited number of qualitatively different ways of experiencing work motivation. During the analysis of the semi-structured interview transcripts, the focus was on the employees' perspectives as employees experience work motivation or the second-order perspective to explore and analyse the conceptions. Based on the participants' collective experiences and dimensions of variation across the different ways of experiencing, six conceptions of employee work motivation to perform at the municipal corporation were identified in this study. The relationships between conceptions were further elaborated in terms of critical variations across the conceptions. Six dimensions of critical variations have emerged within and between the conceptions. In the outcome space, the relationships between conceptions and dimensions of critical variations are presented in a logical structure. The findings of this research study show significance to expand the understanding of work motivation and the research context of phenomenography. The findings of this research will contribute to the ongoing attention of contextual work motivational understanding from a Bangladeshi perspective and phenomenographic research conceptions in organisational behaviour studies.Keywords: work motivation, qualitative, phenomenography, local government
Procedia PDF Downloads 93200 Cross-Cultural Experiences of South Asian Students in Chinese Universities: Predictors of the Students' Social-Media Engagements
Authors: Nadeem Akhtar, An Ran, Cornelius B. Pratt
Abstract:
China’s President Xi' vision of Belt and Road Initiative, an infrastructural project of development and connectivity, is attracting international students to Chinese universities, with Pakistan and India among the top-10 countries of origin of those students (Ministry of Education China, 2018). An additional factor in international students’ interest in Chinese universities is their improving global rankings of Chinese universities. Against that backdrop, this study addresses two overarching questions: (a) What factors explain South Asian students’ study-away experiences, particularly in their multicultural environments? and (b) What role do new media play in their adaptation to that environment? This study is guided by Stephen’s (2011) theoretical model, which suggests that social networks influence immigrants’ interactions with host and home culture. The present study used a structured questionnaire distributed through both WeChat and other online platforms to international students studying in Chinese universities. Preliminary results are threefold: (a) that the frequency of use of social media is a predictor of the level of adjustment of the students to their multicultural environment; (b) that social engagement with their international-student peers is a moderating factor in their experiential outcomes; and (c) length of stay in Chinese universities, surprisingly, was not a predictor of adaptation. A major implication of these findings is that, even though social media tend to be criticized for contributing to anomie and to diminishing social capital among youths and millennials, they can be poignant tools for cultural adaptation, particularly among international students in China. It remains to be seen if such outcomes occur among international students in other countries or world regions.Keywords: adaptation, China's Belt and Road Initiative, international students, social media
Procedia PDF Downloads 127199 Earthquake Resistant Sustainable Steel Green Building
Authors: Arup Saha Chaudhuri
Abstract:
Structural steel is a very ductile material with high strength carrying capacity, thus it is very useful to make earthquake resistant buildings. It is a homogeneous material also. The member section and the structural system can be made very efficient for economical design. As the steel is recyclable and reused, it is a green material. The embodied energy for the efficiently designed steel structure is less than the RC structure. For sustainable green building steel is the best material nowadays. Moreover, pre-engineered and pre-fabricated faster construction methodologies help the development work to complete within the stipulated time. In this paper, the usefulness of Eccentric Bracing Frame (EBF) in steel structure over Moment Resisting Frame (MRF) and Concentric Bracing Frame (CBF) is shown. Stability of the steel structures against horizontal forces especially in seismic condition is efficiently possible by Eccentric bracing systems with economic connection details. The EBF is pin–ended, but the beam-column joints are designed for pin ended or for full connectivity. The EBF has several desirable features for seismic resistance. In comparison with CBF system, EBF system can be designed for appropriate stiffness and drift control. The link beam is supposed to yield in shear or flexure before initiation of yielding or buckling of the bracing member in tension or compression. The behavior of a 2-D steel frame is observed under seismic loading condition in the present paper. Ductility and brittleness of the frames are compared with respect to time period of vibration and dynamic base shear. It is observed that the EBF system is better than MRF system comparing the time period of vibration and base shear participation.Keywords: steel building, green and sustainable, earthquake resistant, EBF system
Procedia PDF Downloads 350198 Framework for Explicit Social Justice Nursing Education and Practice: A Constructivist Grounded Theory Research
Authors: Victor Abu
Abstract:
Background: Social justice ideals are considered as the foundation of nursing practice. These ideals are not always clearly integrated into nursing professional standards or curricula. This hinders concerted global nursing agendas for becoming aware of social injustice or engaging in action for social justice to improve the health of individuals and groups. Aim and objectives: The aim was to create an educational framework for empowering nursing students for social justice awareness and action. This purpose was attained by understanding the meaning of social justice, the effect of social injustice, the visibility of social justice learning, and ways of integrating social justice in nursing education and practice. Methods: Critical interpretive methodologies and constructivist grounded theory research designs guided the processes of recruiting nursing students (n = 11) and nurse educators (n = 11) at a London nursing university to participate in interviews and focus groups, which were analysed by coding systems. Findings: Firstly, social justice was described as ethical practices that enable individuals and groups to have good access to health resources. Secondly, social injustice was understood as unfair practices that caused minimal access to resources, social deprivation, and poor health. Thirdly, social justice learning was considered to be invisible in nursing education due to a lack of explicit modules, educator knowledge, and organisational support. Lastly, explicit modules, educating educators, and attracting leaders’ support were suggested as approaches for the visible integration of social justice in nursing education and practice. Discussion: This research proposes approaches for nursing awareness and action for the development of critical active nurse-learner, critical conscious nurse-educator, and servant nurse leader. The framework on Awareness for Social Justice Action (ASJA) created in this research is an approach for empowering nursing students for social justice practices. Conclusion: This research contributes to and advocates for greater nursing scholarship to raise the spotlight on social justice in the profession.Keywords: social justice, nursing practice, nursing education, nursing curriculum, social justice awareness, social justice action, constructivist grounded theory
Procedia PDF Downloads 58