Search results for: payment schemes
466 Nano Liquid Thin Film Flow over an Unsteady Stretching Sheet
Authors: Prashant G. Metri
Abstract:
A numerical model is developed to study nano liquid film flow over an unsteady stretching sheet in the presence of hydromagnetic have been investigated. Similarity transformations are used to convert unsteady boundary layer equations to a system of non-linear ordinary differential equations. The resulting non-linear ordinary differential equations are solved numerically using Runge-Kutta-Fehlberg and Newton-Raphson schemes. A relationship between film thickness β and the unsteadiness parameter S is found, the effect of unsteadiness parameter S, and the hydromagnetic parameter S, on the velocity and temperature distributions are presented. The present analysis shows that the combined effect of magnetic field and viscous dissipation has a significant influence in controlling the dynamics of the considered problem. Comparison with known results for certain particular cases is in excellent agreement.Keywords: boundary layer flow, nanoliquid, thin film, unsteady stretching sheet
Procedia PDF Downloads 257465 Management Strategies for Risk Events in Construction Industries during Economic Situation and COVID-19 Pandemic in Nigeria
Authors: Ezeabasili Chibuike Patrick
Abstract:
The complex situation of construction industries in Nigeria and the risk of failures involved includes cost overrun, time overrun, Corruption, Government influence, Subcontractor challenges, Political influence and Instability, Cultural differences, Human resources deficiencies, cash flow Challenges, foreign exchange issues, inadequate design, Safety, low productivity, late payment, Quality control issues, project management issues, Environmental issues, Force majeure Competition amongst others has made the industry prone to risk and failures. Good project management remains effective in improving decision-making, which minimizes these risk events. This study was done to address these project risks and good decision-making to avert them. A mixed-method approach to research was used to do this study. Data collected by questionnaires and interviews on thirty-two (32) construction professionals was used in analyses to aid the knowledge and management of risks that were identified. The study revealed that there is no good risk management expertise in Nigeria. Also, that the economic/political situation and the recent COVID-19 pandemic has added to the risk and poor management strategies. The contingency theory and cost has therefore surfaced to be the most strategic management method used to reduce these risk issues and they seem to be very effective.Keywords: strategies, risk management, contingency theory, Nigeria
Procedia PDF Downloads 130464 Numerical Investigation of Incompressible Turbulent Flows by Method of Characteristics
Authors: Ali Atashbar Orang, Carlo Massimo Casciola
Abstract:
A novel numerical approach for the steady incompressible turbulent flows is presented in this paper. The artificial compressibility method (ACM) is applied to the Reynolds Averaged Navier-Stokes (RANS) equations. A new Characteristic-Based Turbulent (CBT) scheme is developed for the convective fluxes. The well-known Spalart–Allmaras turbulence model is employed to check the effectiveness of this new scheme. Comparing the proposed scheme with previous studies, it is found that the present CBT scheme demonstrates accurate results, high stability and faster convergence. In addition, the local time stepping and implicit residual smoothing are applied as the convergence acceleration techniques. The turbulent flows past a backward facing step, circular cylinder, and NACA0012 hydrofoil are studied as benchmarks. Results compare favorably with those of other available schemes.Keywords: incompressible turbulent flow, method of characteristics, finite volume, Spalart–Allmaras turbulence model
Procedia PDF Downloads 412463 Performance Improvement of Cooperative Scheme in Wireless OFDM Systems
Authors: Ki-Ro Kim, Seung-Jun Yu, Hyoung-Kyu Song
Abstract:
Recently, the wireless communication systems are required to have high quality and provide high bit rate data services. Researchers have studied various multiple antenna scheme to meet the demand. In practical application, it is difficult to deploy multiple antennas for limited size and cost. Cooperative diversity techniques are proposed to overcome the limitations. Cooperative communications have been widely investigated to improve performance of wireless communication. Among diversity schemes, space-time block code has been widely studied for cooperative communication systems. In this paper, we propose a new cooperative scheme using pre-coding and space-time block code. The proposed cooperative scheme provides improved error performance than a conventional cooperative scheme using space-time block coding scheme.Keywords: cooperative communication, space-time block coding, pre-coding
Procedia PDF Downloads 359462 Building on Local People Capacities as Key Resources in Making Livable Environments
Authors: Ouassim Chemrouk, Naima Chabbi-Chemrouk
Abstract:
Contemporary settlements and urban places are becoming increasingly complex involving technologically advanced building materials, and mechanical systems for controlling environmental quality such as thermal comfort, lighting, acoustics and other building performances. These systems, which rely exclusively on the utilization of nonrenewable energy are often expensive and environment pollutants. The proposed paper illustrates the important role of traditional knowledge and practice and what is sometimes called intangible cultural heritage assume in the design of the built environment. It shows that some traditional “ways of doing” that are transmitted at local scales from generation to generation could be built upon to become key resources for more livable urban places. Based on evidence from documentary sources and field surveys, it also shows how different attempts were made to translate some traditional practices and local know-how in the proposal of new urban schemes.Keywords: key resource, know-how, local people, capacity building, liveable built environments
Procedia PDF Downloads 209461 Hybridization of Mathematical Transforms for Robust Video Watermarking Technique
Authors: Harpal Singh, Sakshi Batra
Abstract:
The widespread and easy accesses to multimedia contents and possibility to make numerous copies without loss of significant fidelity have roused the requirement of digital rights management. Thus this problem can be effectively solved by Digital watermarking technology. This is a concept of embedding some sort of data or special pattern (watermark) in the multimedia content; this information will later prove ownership in case of a dispute, trace the marked document’s dissemination, identify a misappropriating person or simply inform user about the rights-holder. The primary motive of digital watermarking is to embed the data imperceptibly and robustly in the host information. Extensive counts of watermarking techniques have been developed to embed copyright marks or data in digital images, video, audio and other multimedia objects. With the development of digital video-based innovations, copyright dilemma for the multimedia industry increases. Video watermarking had been proposed in recent years to serve the issue of illicit copying and allocation of videos. It is the process of embedding copyright information in video bit streams. Practically video watermarking schemes have to address some serious challenges as compared to image watermarking schemes like real-time requirements in the video broadcasting, large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions etc. and they are particularly vulnerable to attacks, for example, frame swapping, statistical analysis, rotation, noise, median and crop attacks. In this paper, an effective, robust and imperceptible video watermarking algorithm is proposed based on hybridization of powerful mathematical transforms; Fractional Fourier Transform (FrFT), Discrete Wavelet transforms (DWT) and Singular Value Decomposition (SVD) using redundant wavelet. This scheme utilizes various transforms for embedding watermarks on different layers by using Hybrid systems. For this purpose, the video frames are portioned into layers (RGB) and the watermark is being embedded in two forms in the video frames using SVD portioning of the watermark, and DWT sub-band decomposition of host video, to facilitate copyright safeguard as well as reliability. The FrFT orders are used as the encryption key that allows the watermarking method to be more robust against various attacks. The fidelity of the scheme is enhanced by introducing key generation and wavelet based key embedding watermarking scheme. Thus, for watermark embedding and extraction, same key is required. Therefore the key must be shared between the owner and the verifier via some safe network. This paper demonstrates the performance by considering different qualitative metrics namely Peak Signal to Noise ratio, Structure similarity index and correlation values and also apply some attacks to prove the robustness. The Experimental results are presented to demonstrate that the proposed scheme can withstand a variety of video processing attacks as well as imperceptibility.Keywords: discrete wavelet transform, robustness, video watermarking, watermark
Procedia PDF Downloads 224460 On Flow Consolidation Modelling in Urban Congested Areas
Authors: Serban Stere, Stefan Burciu
Abstract:
The challenging and continuously growing competition in the urban freight transport market emphasizes the need for optimal planning of transportation processes in terms of identifying the solution of consolidating traffic flows in congested urban areas. The aim of the present paper is to present the mathematical framework and propose a methodology of combining urban traffic flows between the distribution centers located at the boundary of a congested urban area. The three scenarios regarding traffic flow between consolidation centers that are taken into consideration in the paper are based on the same characteristics of traffic flows. The scenarios differ in terms of the accessibility of the four consolidation centers given by the infrastructure, the connections between them, and the possibility of consolidating traffic flows for one or multiple destinations. Also, synthetical indicators will allow us to compare the scenarios considered and chose the indicated for our distribution system.Keywords: distribution system, single and multiple destinations, urban consolidation centers, traffic flow consolidation schemes
Procedia PDF Downloads 156459 Modern Machine Learning Conniptions for Automatic Speech Recognition
Authors: S. Jagadeesh Kumar
Abstract:
This expose presents a luculent of recent machine learning practices as employed in the modern and as pertinent to prospective automatic speech recognition schemes. The aspiration is to promote additional traverse ablution among the machine learning and automatic speech recognition factions that have transpired in the precedent. The manuscript is structured according to the chief machine learning archetypes that are furthermore trendy by now or have latency for building momentous hand-outs to automatic speech recognition expertise. The standards offered and convoluted in this article embraces adaptive and multi-task learning, active learning, Bayesian learning, discriminative learning, generative learning, supervised and unsupervised learning. These learning archetypes are aggravated and conferred in the perspective of automatic speech recognition tools and functions. This manuscript bequeaths and surveys topical advances of deep learning and learning with sparse depictions; further limelight is on their incessant significance in the evolution of automatic speech recognition.Keywords: automatic speech recognition, deep learning methods, machine learning archetypes, Bayesian learning, supervised and unsupervised learning
Procedia PDF Downloads 447458 The Promotion Effects for a Supply Chain System with a Dominant Retailer
Authors: Tai-Yue Wang, Yi-Ho Chen
Abstract:
In this study, we investigate a two-echelon supply chain with two suppliers and three retailers among which one retailer dominates other retailers. A price competition demand function is used to model this dominant retailer, which is leading market. The promotion strategies and negotiation schemes are integrated to form decision-making models under different scenarios. These models are then formulated into different mathematical programming models. The decision variables such as promotional costs, retailer prices, wholesale price, and order quantity are included in these models. At last, the distributions of promotion costs under different cost allocation strategies are discussed. Finally, an empirical example used to validate our models. The results from this empirical example show that the profit model will create the largest profit for the supply chain but with different profit-sharing results. At the same time, the more risk a member can take, the more profits are distributed to that member in the utility model.Keywords: supply chain, price promotion, mathematical models, dominant retailer
Procedia PDF Downloads 400457 A Practical Protection Method for Parallel Transmission-Lines Based on the Fault Travelling-Waves
Authors: Mohammad Reza Ebrahimi
Abstract:
In new restructured power systems, swift fault detection is very important. The parallel transmission-lines are vastly used in this kind of power systems because of high amount of energy transferring. In this paper, a method based on the comparison of two schemes, i.e., i) maximum magnitude of travelling-wave (TW) energy ii) the instants of maximum energy occurrence at the circuits of parallel transmission-line is proposed. Using the travelling-wave of fault in order to faulted line identification this method has noticeable operation time. Moreover, the algorithm can cover for identification of faults as external or internal faults. For an internal fault, the exact location of the fault can be estimated confidently. A lot of simulations have been done with PSCAD/EMTDC to verify the performance of the proposed algorithm.Keywords: travelling-wave, maximum energy, parallel transmission-line, fault location
Procedia PDF Downloads 185456 'I'm in a Very Safe Place': Webcam Sex Workers in Aotearoa, New Zealand and Their Perceptions of Danger and Risk
Authors: Madeline V. Henry
Abstract:
Sex work is a contested subject in academia. Many authors now argue that the practice should be recognized as a legitimate and rationally chosen form of labor, and that decriminalization is necessary to ensure the safety of sex workers and reduce their stigmatization. However, a prevailing argument remains that the work is inherently violent and oppressive and that all sex workers are directly or indirectly coerced into participating in the industry. This argument has been complicated by the recent proliferation of computer-mediated technologies that allow people to conduct sex work without the need to be physically co-present with customers or pimps. One example of this is the practice of ‘camming’, wherein ‘webcam models’ stream themselves stripping and/or performing autoerotic stimulation in an online chat-room for payment. In this presentation, interviews with eight ‘camgirls’ (aged 22-34) will be discussed. Their talk has been analyzed using Foucauldian discourse analysis, focusing on common discursive threads in relation to the work and their subjectivities. It was found that the participants demonstrated appreciation for the lack of physical danger they were in, but emphasized the unique and significant dangers of online-based sex work (their images and videos being recorded and shared without their consent, for example). Participants also argued that their largest concerns were based around stigma, which they claimed remained prevalent despite the decriminalized legal model in Aotearoa/New Zealand (which has been in place for over 14 years). Overall, this project seeks to challenge commonplace academic approaches to sex work, adding further research to support sex workers’ rights and highlighting new issues to consider in a digital environment.Keywords: camming, sex work, stigma, risk
Procedia PDF Downloads 155455 Household Water Source Substitution and Demand for Water Connections
Authors: Elizabeth Spink
Abstract:
The United Nations' Sustainable Development Goal 6 sets a target for safe and affordable drinking water for all. Developing country governments aiming to achieve this goal often face significant challenges when trying to service last mile customers, particularly those in peri-urban and rural areas. Expansion of water networks often requires high connection fees from households, and demand for connections may be low if there are cheaper substitute sources of water available. This research studies the effect of the availability of substitute sources of water on demand for individual water connections in Livingstone, Zambia, using an event study analysis of metering campaigns. Metering campaigns reduce the share of a household's neighbors that can provide free water to the household if their water connection becomes disconnected due to nonpayment. The results show that household payments in newly metered regions increase by 10 percentage points in the months following metering events, with a decrease in disconnections of 6 percentage points for low-income households. To isolate the effect of changes in a household's substitution possibilities, a similar analysis is conducted among households that neighbor the metered region. These results show mixed evidence of the impact of substitutes on payment behavior and disconnections. The results suggest that metering may be effective in increasing household demand for individual water connections primarily through a lower monthly cost burden for newly metered households.Keywords: piped-water access, water demand, water utilities, water sharing
Procedia PDF Downloads 197454 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms
Authors: Neha Ahirwar
Abstract:
In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree
Procedia PDF Downloads 66453 Molecular Communication Noise Effect Analysis of Diffusion-Based Channel for Considering Minimum-Shift Keying and Molecular Shift Keying Modulations
Authors: A. Azari, S. S. K. Seyyedi
Abstract:
One of the unaddressed and open challenges in the nano-networking is the characteristics of noise. The previous analysis, however, has concentrated on end-to-end communication model with no separate modelings for propagation channel and noise. By considering a separate signal propagation and noise model, the design and implementation of an optimum receiver will be much easier. In this paper, we justify consideration of a separate additive Gaussian noise model of a nano-communication system based on the molecular communication channel for which are applicable for MSK and MOSK modulation schemes. The presented noise analysis is based on the Brownian motion process, and advection molecular statistics, where the received random signal has a probability density function whose mean is equal to the mean number of the received molecules. Finally, the justification of received signal magnitude being uncorrelated with additive non-stationary white noise is provided.Keywords: molecular, noise, diffusion, channel
Procedia PDF Downloads 279452 Far-Field Noise Prediction of Tandem Cylinders Using Incompressible Large Eddy Simulation
Authors: Jesus Ruano, Francesc Xavier Trias, Asensi Oliva
Abstract:
A three-dimensional incompressible Large Eddy Simulation (LES) is performed to compute the hydrodynamic field around a pair of tandem cylinders. Symmetry-preserving schemes will be used during this simulation in conjunction with Finite Volume Method (FVM) to obtain the hydrodynamic field around the selected geometry. A set of results consisting of pressure and velocity and the combination of them will be stored at different surfaces near the cylinders as the initial input for the second part of the study. A post-processing of the obtained results based on Ffowcs-Williams and Hawkings (FWH) equation with a Fourier Transform of the acoustic sources will be used to compute noise at several probes located far away from the region where the hydrodynamics are computed. Directivities as well as spectral profile of the obtained acoustic field will be analyzed.Keywords: far-field noise, Ffowcs-Williams and Hawkings, finite volume method, large eddy simulation, long-span bodies
Procedia PDF Downloads 376451 Motivation Needs in Working of the Employees in Rayong Province: A Case Study of Panakom Co., Ltd.
Authors: Ganratchakan Ninlawan, Witthaya Mekhum
Abstract:
The objective of this research was to investigate motivation needs in working of the employees in Rayong Province at Panakom Co., Ltd. The sample group included 59 operational employees of Panakom Co., Ltd divided into 2 main parts to complete the questionnaires. Part 1 dealt with personal information of the staff in the form of checklist questions. Part 2 was about the motivation needs in working in the form of 5 rating scales. The data were analyzed to find frequency, percentage, arithmetic mean, and SD with the results as follows. They reported their working conditions in the moderate level while the first aspect was on the regulation of the Working Support Department. The second rated aspect was on the modern facilities and office stationeries followed by the working environment such as lighting, temperature, sound system, and atmosphere. The last aspect was on the provision of enough working equipment. On the part of work stability and work progress, they rated this aspect at the moderate level with the details below. The first aspect was their satisfaction in work rotation followed by the encouragement in joining training and seminar to increase working knowledge. The third aspect was their perception on the progress of their careers. The last aspect was on the chance to get promoted in special cases. On the payment and fringe benefit, they rated this part in the moderate level with the highest aspect being on the provided fringe benefit such as health care. The second aspect was on the suitable salary compared to their knowledge and proficiency. The third aspect was on the satisfaction on the activities and seminars provided by the company. Finally, the last aspect was on the sufficient salary when compared with the current cost of living.Keywords: motivation needs, working, employees, Rayong Province
Procedia PDF Downloads 254450 A Hybrid Recommendation System Based on Association Rules
Authors: Ahmed Mohammed Alsalama
Abstract:
Recommendation systems are widely used in e-commerce applications. The engine of a current recommendation system recommends items to a particular user based on user preferences and previous high ratings. Various recommendation schemes such as collaborative filtering and content-based approaches are used to build a recommendation system. Most of the current recommendation systems were developed to fit a certain domain such as books, articles, and movies. We propose a hybrid framework recommendation system to be applied on two-dimensional spaces (User x Item) with a large number of Users and a small number of Items. Moreover, our proposed framework makes use of both favorite and non-favorite items of a particular user. The proposed framework is built upon the integration of association rules mining and the content-based approach. The results of experiments show that our proposed framework can provide accurate recommendations to users.Keywords: data mining, association rules, recommendation systems, hybrid systems
Procedia PDF Downloads 453449 A Review Paper on Data Security in Precision Agriculture Using Internet of Things
Authors: Tonderai Muchenje, Xolani Mkhwanazi
Abstract:
Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.Keywords: precision agriculture, security, IoT, EIDE
Procedia PDF Downloads 90448 Determinants of Extra Charges for Container Shipments: A Case Study of Nexus Zone Logistics
Authors: Zety Shakila Binti Mohd Yusof, Muhammad Adib Bin Ishak, Hajah Fatimah Binti Hussein
Abstract:
The international shipping business is related to numerous controls or regulations of export and import shipments. It is costly and time consuming, and when something goes wrong or when the buyer or seller fails to comply with the regulations, it can result in penalties, delays, and unexpected costs etc. For the focus of this study, the researchers have selected a local forwarder that provides forwarding and clearance services, Nexus Zone Logistics. It was identified that this company currently has many extra costs to be paid including local and detention charges, which negatively impacts the flow of income and reduces overall stability. Two variables have been identified as factors of extra charges; loaded containers entering the port by exceeded closing time and late delivery of empty containers to the container yard. This study is a qualitative in nature and the secondary data collected was analyzed using self-administered observation. The findings of this study were covered by one selected case for each export and import shipment between July and December 2014. The data were analyzed using frequency analysis based on tables and graphs. The researcher recommends Nexus Zone Logistics impose a 1% deposit payment per container for each shipment (export and import) to its customers.Keywords: international shipping, export and import, detention charges, container shipment
Procedia PDF Downloads 383447 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use
Authors: Mayank Mundhra, Chester Rebeiro
Abstract:
Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.Keywords: Ripple, Kelips, unique node list, consensus, information propagation
Procedia PDF Downloads 145446 Contracting Strategies to Foster Industrial Symbiosis Implementation
Authors: Robin Molinier
Abstract:
Industrial symbiosis (I.S) deals with the exchange of waste materials, fatal energy and utilities as resources for production. While it brings environmental benefits from resource conservation its economic profitability is one of the main barriers to its implementation. I.S involves several actors with their own objectives and resources so that each actor must be satisfied by ex-ante arrangements to commit toward investments and transactions. Regarding I.S Transaction cost economics helps to identify hybrid forms of governance for transactions governance due to I.S projects specificities induced by the need for customization (asset specificity, non-homogeneity). Thus we propose a framework to analyze the best contractual practices tailored to address I.S specific risks that we identified as threefold (load profiles and quality mismatch, value fluctuations). Schemes from cooperative game theory and contracting management are integrated to analyze value flows between actors. Contractual guidelines are then proposed to address the identified risks and to split the value for a set of I.S archetypes drawn from actual experiences.Keywords: contracts, economics, industrial symbiosis, risks
Procedia PDF Downloads 209445 Islamic Banking and Finance in Theory and Practice: The Experience of Malaysia and Algeria
Authors: Zidane Abderrezaq
Abstract:
This paper’s primary objective is to identify the relative importance of various Islamic financial products, in theory and in practice, by examining the financing records of the Bank Islam Malaysia (Berhad) and the Algeria Islamic Bank. Currently, seven available Islamic financing products are considered viable alternatives to interest-based conventional contracts: mudarabah (trust financing), musharakah (equity financing), ijarah (lease financing), murabahah (trade financing), qard al-hassan (welfare loan), bay` bi al-thaman al-ajil (deferred payment financing), and istisna` (progressive payments). Among these financial products, mudarabah and musharakah are the most distinct. Their unique characteristics (at least in theory) make Islamic banks and Islamic financing viable alternatives to the conventional interest-based financial system. The question before us is to determine the extent of mudarabah and musharakah in Islamic financing in practice. The data are as follows: the average mudarabah is 5% of total financing, and the average musharakah is less than 3%. The combined average of mudarabah and musharakah for the two Islamic banks is less than 4% of the total finance and advances. The average qard al-hassan is about 4%, while istisna` does not yet exist in practice. Murabahah is the most popular and dominates all other modes of Islamic financing. The average use of murabahah is over 54%. When the bay` bi al-thaman al-ajil is added to the murabahah, the percentage of total financing is shown to be 82.68%. This paper also explores some possible reasons why these two Islamic banks appear to prefer murabahah to mudarabah and musharakah.Keywords: Islamic banking, Islamic finance, Islamic banking rofitability, investment banking
Procedia PDF Downloads 482444 A Simulation Model to Analyze the Impact of Virtual Responsiveness in an E-Commerce Supply Chain
Authors: T. Godwin
Abstract:
The design of a supply chain always entails the trade-off between responsiveness and efficiency. The launch of e-commerce has not only changed the way of shopping but also altered the supply chain design while trading off efficiency with responsiveness. A concept called ‘virtual responsiveness’ is introduced in the context of e-commerce supply chain. A simulation model is developed to compare actual responsiveness and virtual responsiveness to the customer in an e-commerce supply chain. The simulation is restricted to the movement of goods from the e-tailer to the customer. Customer demand follows a statistical distribution and is generated using inverse transformation technique. The two responsiveness schemes of the supply chain are compared in terms of the minimum number of inventory required at the e-tailer to fulfill the orders. Computational results show the savings achieved through virtual responsiveness. The insights gained from this study could be used to redesign e-commerce supply chain by incorporating virtual responsiveness. A part of the achieved cost savings could be passed back to the customer, thereby making the supply chain both effective and competitive.Keywords: e-commerce, simulation modeling, supply chain, virtual responsiveness
Procedia PDF Downloads 343443 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 684442 Gender Inequality in the Workplace: A Literature Review on the Discrimination of Women by Human Resources Instruments
Authors: Katja Wiedemann, Melinda Gainschnigg
Abstract:
This paper deals with gender inequality in companies. In the context of this paper, it is analyzed how women are discriminated by means of Human Resources instruments. The existing gender inequality is made apparent by the ‘Equal Pay Day. Women in Austria work without payment from 20 October onwards, which represents inequality of 21.7 percent points. This gender pay gap is due to the unequal distribution of paid and unpaid work between men and women. Since the majority of activities related to the family and care are carried out by women, there are human capital deficits on women’s side. In addition to the discrimination of women in compensation, there are also discrimination cases caused by other Human Resources instruments. The aim of this paper is to analyze the use of Human Resources instruments with regard to the discrimination of women and to identify measures to counteract this discrimination. Within the scope of this paper, possible instructions for companies on how to design and implement Human Resources instruments will be elaborated. Therefore personnel planning, recruiting, workforce management, compensation, and leadership are used as the basis for that analysis. The data were collected by a literature review and evaluated by means of a summary content analysis. The literature analysis includes papers of scientific journals from various business fields. On the basis of the results of the literature review, it is clear that women are discriminated by all analyzed Human Resources instruments. As a result, existing potentials are not optimally used. In order to limit or even prevent this loss of potential, companies must take specific measures to counteract the discrimination of women.Keywords: employment issues, gender inequality , women's studies, workplace
Procedia PDF Downloads 249441 An Assessment of Factors Affecting the Cost and Time Performance of Subcontractors
Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola,
Abstract:
This paper is an assessment of factors influencing the cost and time performance of subcontractors and the need for effective performance of subcontractors at the project sites. The factors influencing the performance of subcontractors are grouped, similar to those identified with the project or an organization and on another hand, there are significant factors influencing the performance of the subcontractors. These factors incorporate management level leadership, time required to complete the project, profit, staff capability/expertise, reputation, installment method, organization history, and project procurement method strategy, security, bidding technique, insurance, bond and relationship with the major contractors. The factors influencing the management of subcontractors in building development projects includes performance of significant past projects, standard of workmanship, consistence with guidelines, regular payment to labourers, adherence to program, regularity and viability of communication with main contractor, adherence to subcontract necessities. Other factors comprise adherence to statutory environmental regulations, number of experienced sites administrative staff, inspection and maintenance of good workplace, number of artisans and workers, quality of as-built and shop drawings and ability to carry out the quantity of work and so on. This study also aimed to suggest a way forward to improve the performance of subcontractors which is the reason for exceeding budget at the project sites. To carry out this study, a questionnaire was drafted to derive information on the causes of low performance of subcontractors and the implication to cost.Keywords: performance, contractor, subcontractors, construction
Procedia PDF Downloads 76440 Performance Comparison of Space-Time Block and Trellis Codes under Rayleigh Channels
Authors: Jing Qingfeng, Wu Jiajia
Abstract:
Due to the crowded orbits and shortage of frequency resources, utilizing of MIMO technology to improve spectrum efficiency and increase the capacity has become a necessary trend of broadband satellite communication. We analyze the main influenced factors and compare the BER performance of space-time block code (STBC) scheme and space-time trellis code (STTC) scheme. This paper emphatically studies the bit error rate (BER) performance of STTC and STBC under Rayleigh channel. The main emphasis is placed on the effects of the factors, such as terminal environment and elevation angles, on the BER performance of STBC and STTC schemes. Simulation results indicate that performance of STTC under Rayleigh channel is obviously improved with the increasing of transmitting and receiving antennas numbers, but the encoder state has little impact on the performance. Under Rayleigh channel, performance of Alamouti code is better than that of STTC.Keywords: MIMO, space time block code (STBC), space time trellis code (STTC), Rayleigh channel
Procedia PDF Downloads 348439 Impact of Transportation on Access to Reproductive and Maternal Health Services in Northeast Cambodia: A Policy Brief
Authors: Zaman Jawahar, Anne Rouve-Khiev, Elizabeth Hoban, Joanne Williams
Abstract:
Ensuring access to timely obstetric care is essential to prevent maternal deaths. Geographical barriers pose significant challenges for women accessing quality reproductive and maternal health services in rural Cambodia. This policy brief affirms the need to address the issue of transportation and cost (direct and indirect) as critical barriers to accessing reproductive and maternal health (RMH) services in four provinces in Northeast Cambodia (Kratie, Ratanak Kiri, Mondul Kiri, Stung Treng). A systemic search of the literature identified 1,116 articles, and only ten articles from low-and-middle-income countries met the inclusion criteria. The ten articles reported on transportation and cost related to accessing RMH services. In addition, research findings from Partnering to Save Lives (PSL) studies in the four provinces were included in the analysis. Thematic data analysis using the information in the ten articles and PSL research findings was conducted, and the findings are presented in this paper. The key findings are the critical barriers to accessing RMH services in the four provinces because women experience: 1) difficulties finding affordable transportation; 2) lack of available and accessible transportation; 3) greater distance and traveling time to services; 4) poor geographical terrain and; 5) higher opportunity costs. Distance and poverty pose a double burden for the women accessing RMH services making a facility-based delivery less feasible compared to home delivery. Furthermore, indirect and hidden costs associated with institutional delivery may have an impact on women’s decision to seek RMH care. Existing health financing schemes in Cambodia such as the Health Equity Fund (HEF) and the Voucher Scheme contributed to the solution but have also shown some limitations. These schemes contribute to improving access to RMH services for the poorest group, but the barrier of transportation costs remains. In conclusion, initiatives that are proven to be effective in the Cambodian context should continue or be expanded in conjunction with the HEF, and special consideration should be given to communities living in geographically remote regions and difficult to access areas. The following strategies are recommended: 1) maintain and further strengthen transportation support in the HEF scheme; 2) expand community-based initiatives such as Community Managed Health Equity Funds and Village Saving Loans Associations; 3) establish maternity waiting homes; and 4) include antenatal and postnatal care in the provision of integrated outreach services. This policy brief can be used to inform key policymakers and provide evidence that can assist them to develop strategies to increase poor women’s access to RMH services in low-income settings, taking into consideration the geographic distance and other indirect costs associated with a facility-based delivery.Keywords: access, barriers, northeast Cambodia, reproductive and maternal health service, transportation and cost
Procedia PDF Downloads 141438 Use of In-line Data Analytics and Empirical Model for Early Fault Detection
Authors: Hyun-Woo Cho
Abstract:
Automatic process monitoring schemes are designed to give early warnings for unusual process events or abnormalities as soon as possible. For this end, various techniques have been developed and utilized in various industrial processes. It includes multivariate statistical methods, representation skills in reduced spaces, kernel-based nonlinear techniques, etc. This work presents a nonlinear empirical monitoring scheme for batch type production processes with incomplete process measurement data. While normal operation data are easy to get, unusual fault data occurs infrequently and thus are difficult to collect. In this work, noise filtering steps are added in order to enhance monitoring performance by eliminating irrelevant information of the data. The performance of the monitoring scheme was demonstrated using batch process data. The results showed that the monitoring performance was improved significantly in terms of detection success rate of process fault.Keywords: batch process, monitoring, measurement, kernel method
Procedia PDF Downloads 323437 New Efficient Method for Coding Color Images
Authors: Walaa M.Abd-Elhafiez, Wajeb Gharibi
Abstract:
In this paper a novel color image compression technique for efficient storage and delivery of data is proposed. The proposed compression technique started by RGB to YCbCr color transformation process. Secondly, the canny edge detection method is used to classify the blocks into edge and non-edge blocks. Each color component Y, Cb, and Cr compressed by discrete cosine transform (DCT) process, quantizing and coding step by step using adaptive arithmetic coding. Our technique is concerned with the compression ratio, bits per pixel and peak signal to noise ratio, and produce better results than JPEG and more recent published schemes (like, CBDCT-CABS and MHC). The provided experimental results illustrate the proposed technique which is efficient and feasible in terms of compression ratio, bits per pixel and peak signal to noise ratio.Keywords: image compression, color image, q-coder, quantization, edge-detection
Procedia PDF Downloads 329