Search results for: shamir secret sharing
786 Perfectly Keyless Commercial Vehicle
Authors: Shubha T., Latha H. K. E., Yogananth Karuppiah
Abstract:
Accessing and sharing automobiles will become much simpler thanks to the wide range of automotive use cases made possible by digital keys. This study aims to provide digital keys to car owners and drivers so they can lock or unlock their automobiles and start the engine using a smartphone or other Bluetooth low energy-enabled mobile device. Private automobile owners can digitally lend their car keys to family members or friends without having to physically meet them, possibly for a certain period of time. Owners of company automobile fleets can electronically distribute car keys to staff members, possibly granting access for a given day or length of time. Customers no longer need to physically pick up car keys at a rental desk because automobile owners can digitally transfer keys with them.Keywords: NFC, BLE, CCC, digital key, OEM
Procedia PDF Downloads 145785 Integration of “FAIR” Data Principles in Longitudinal Mental Health Research in Africa: Lessons from a Landscape Analysis
Authors: Bylhah Mugotitsa, Jim Todd, Agnes Kiragga, Jay Greenfield, Evans Omondi, Lukoye Atwoli, Reinpeter Momanyi
Abstract:
The INSPIRE network aims to build an open, ethical, sustainable, and FAIR (Findable, Accessible, Interoperable, Reusable) data science platform, particularly for longitudinal mental health (MH) data. While studies have been done at the clinical and population level, there still exists limitations in data and research in LMICs, which pose a risk of underrepresentation of mental disorders. It is vital to examine the existing longitudinal MH data, focusing on how FAIR datasets are. This landscape analysis aimed to provide both overall level of evidence of availability of longitudinal datasets and degree of consistency in longitudinal studies conducted. Utilizing prompters proved instrumental in streamlining the analysis process, facilitating access, crafting code snippets, categorization, and analysis of extensive data repositories related to depression, anxiety, and psychosis in Africa. While leveraging artificial intelligence (AI), we filtered through over 18,000 scientific papers spanning from 1970 to 2023. This AI-driven approach enabled the identification of 228 longitudinal research papers meeting inclusion criteria. Quality assurance revealed 10% incorrectly identified articles and 2 duplicates, underscoring the prevalence of longitudinal MH research in South Africa, focusing on depression. From the analysis, evaluating data and metadata adherence to FAIR principles remains crucial for enhancing accessibility and quality of MH research in Africa. While AI has the potential to enhance research processes, challenges such as privacy concerns and data security risks must be addressed. Ethical and equity considerations in data sharing and reuse are also vital. There’s need for collaborative efforts across disciplinary and national boundaries to improve the Findability and Accessibility of data. Current efforts should also focus on creating integrated data resources and tools to improve Interoperability and Reusability of MH data. Practical steps for researchers include careful study planning, data preservation, machine-actionable metadata, and promoting data reuse to advance science and improve equity. Metrics and recognition should be established to incentivize adherence to FAIR principles in MH researchKeywords: longitudinal mental health research, data sharing, fair data principles, Africa, landscape analysis
Procedia PDF Downloads 89784 General Framework for Price Regulation of Container Terminals
Authors: Murat Yildiz, Burcu Yildiz
Abstract:
Price Cap Regulation is a form of economic regulation designed in the 1980s in the United Kingdom. Price cap regulation sets a cap on the price that the utility provider can charge. The cap is set according to several economic factors, such as the price cap index, expected efficiency savings and inflation. It has been used by several countries as a regulatory regime in several sectors. Container port privatization is still in early stages in some countries. Lack of a general framework can be an impediment to privatization. This paper aims a general framework to comprising decisions to be made for variables which are able to accommodate the variety of container terminals. Several approaches that may be needed as well as a passage between approaches.Keywords: Price Cap Regulation, ports privatization, container terminal price regime, earning sharing
Procedia PDF Downloads 359783 Unleashing the Potential of Green Finance in Architecture: A Promising Path for Balkan Countries
Authors: Luan Vardari, Dena Arapi Vardari
Abstract:
The Balkan countries, known for their diverse landscapes and cultural heritage, face the dual challenge of promoting economic growth while addressing pressing environmental concerns. In recent years, the concept of green finance has emerged as a powerful tool to achieve sustainable development and mitigate the environmental impact of various sectors, including architecture. This extended abstract explores the untapped potential of green finance in architecture within the Balkan region and highlights its role in driving sustainable construction practices and fostering a greener future. The abstract begins by defining green finance and emphasizing its relevance in the context of the architectural sector in Balkan countries. It underlines the benefits of green finance, such as economic growth, environmental conservation, and social well-being. Integrating green finance into architectural projects is important as a means to achieve sustainable development goals while promoting financial viability. Also, delves into the current state of green building practices in the Balkan countries and identifies the need for financial support to further drive adoption. It explores the existing regulatory frameworks and policies that promote sustainable architecture and discusses how green finance can complement these initiatives. Unique challenges faced by Balkan countries are highlighted, along with the potential opportunities that green finance presents in overcoming these challenges. We highlight successful sustainable architectural projects in the region to showcase the practical application of green finance in the Balkans. These projects exemplify the effective utilization of green finance mechanisms, resulting in tangible economic and environmental impacts, including job creation, energy efficiency, and reduced carbon emissions. The abstract concludes by identifying replicable models and lessons learned from these projects that can serve as a blueprint for future sustainable architecture initiatives in the Balkans. The importance of collaboration and knowledge sharing among stakeholders is emphasized. Engaging architects, financial institutions, governments, and local communities is crucial to promoting green finance in architecture. The abstract suggests the establishment of knowledge exchange platforms and regional/international networks to foster collaboration and facilitate the sharing of expertise among Balkan countries.Keywords: sustainable finance, renewable energy, Balkan region, investment opportunities, green infrastructure, ESG criteria, architecture
Procedia PDF Downloads 68782 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 145781 Programmed Cell Death in Datura and Defensive Plant Response toward Tomato Mosaic Virus
Authors: Asma Alhuqail, Nagwa Aref
Abstract:
Programmed cell death resembles a real nature active defense in Datura metel against TMV after three days of virus infection. Physiological plant response was assessed for asymptomatic healthy and symptomatic infected detached leaves. The results indicated H2O2 and Chlorophyll-a as the most potential parameters. Chlorophyll-a was considered the only significant predictor variant for the H2O2 dependent variant with a P value of 0.001 and R-square of 0.900. The plant immune response was measured within three days of virus infection using the cutoff value of H2O2 (61.095 lmol/100 mg) and (63.201 units) for the tail moment in the Comet Assay. Their percentage changes were 255.12% and 522.40% respectively which reflects the stress of virus infection in the plant. Moreover, H2O2 showed 100% specificity and sensitivity in the symptomatic infected group using the receiver-operating characteristic (ROC). All tested parameters in the symptomatic infected group had significant correlations with twenty-five positive and thirty-one negative correlations where the P value was <0.05 and 0.01. Chlorophyll-a parameter had a crucial role of highly significant correlation between total protein and salicylic acid. Contrarily, this correlation with tail moment unit was (r = _0.930, P <0.01) where the P value was < 0.01. The strongest significant negative correlation was between Chlorophyll-a and H2O2 at P < 0.01, while moderate negative significant correlation was seen for Chlorophyll-b where the P value < 0.05. The present study discloses the secret of the three days of rapid transient production of activated oxygen species (AOS) that was enough for having potential quantitative physiological parameters for defensive plant response toward the virus.Keywords: programmed cell death, plant–adaptive immune response, hydrogen peroxide (H2O2), physiological parameters
Procedia PDF Downloads 247780 Settlement Network Supplying Energy
Authors: Balázs Kulcsár
Abstract:
Few people now doubt the future of the global energy transition. The only question is whether the pace of renewables' penetration will be sufficient to compete with the rate of warming. Dynamic changes are also taking place in the Hungarian electricity system. In addition to nuclear power, which provides the basic electricity supply, the most dynamic is solar power, which is largely small-scale and residential. The emergence of solar power is outlining the emergence of energy production and supply fabric of municipalities. This creates the potential for over-producing municipalities to supply the electricity needs of neighboring settlements with lower production beyond renewables. By taking advantage of this energy sharing, electricity supply based on pure renewables can be achieved more quickly.Keywords: renewable energy, energy geography, self-sufficiency, energy transition
Procedia PDF Downloads 181779 Countering the Bullwhip Effect by Absorbing It Downstream in the Supply Chain
Authors: Geng Cui, Naoto Imura, Katsuhiro Nishinari, Takahiro Ezaki
Abstract:
The bullwhip effect, which refers to the amplification of demand variance as one moves up the supply chain, has been observed in various industries and extensively studied through analytic approaches. Existing methods to mitigate the bullwhip effect, such as decentralized demand information, vendor-managed inventory, and the Collaborative Planning, Forecasting, and Replenishment System, rely on the willingness and ability of supply chain participants to share their information. However, in practice, information sharing is often difficult to realize due to privacy concerns. The purpose of this study is to explore new ways to mitigate the bullwhip effect without the need for information sharing. This paper proposes a 'bullwhip absorption strategy' (BAS) to alleviate the bullwhip effect by absorbing it downstream in the supply chain. To achieve this, a two-stage supply chain system was employed, consisting of a single retailer and a single manufacturer. In each time period, the retailer receives an order generated according to an autoregressive process. Upon receiving the order, the retailer depletes the ordered amount, forecasts future demand based on past records, and places an order with the manufacturer using the order-up-to replenishment policy. The manufacturer follows a similar process. In essence, the mechanism of the model is similar to that of the beer game. The BAS is implemented at the retailer's level to counteract the bullwhip effect. This strategy requires the retailer to reduce the uncertainty in its orders, thereby absorbing the bullwhip effect downstream in the supply chain. The advantage of the BAS is that upstream participants can benefit from a reduced bullwhip effect. Although the retailer may incur additional costs, if the gain in the upstream segment can compensate for the retailer's loss, the entire supply chain will be better off. Two indicators, order variance and inventory variance, were used to quantify the bullwhip effect in relation to the strength of absorption. It was found that implementing the BAS at the retailer's level results in a reduction in both the retailer's and the manufacturer's order variances. However, when examining the impact on inventory variances, a trade-off relationship was observed. The manufacturer's inventory variance monotonically decreases with an increase in absorption strength, while the retailer's inventory variance does not always decrease as the absorption strength grows. This is especially true when the autoregression coefficient has a high value, causing the retailer's inventory variance to become a monotonically increasing function of the absorption strength. Finally, numerical simulations were conducted for verification, and the results were consistent with our theoretical analysis.Keywords: bullwhip effect, supply chain management, inventory management, demand forecasting, order-to-up policy
Procedia PDF Downloads 74778 Development of an Interagency Crime Management System for Nigeria’s Law Enforcement Agencies
Authors: Muhammad Abba Jallo, Fred Fudah Moveh
Abstract:
This study addresses the challenges faced by Nigerian law enforcement agencies due to the lack of an integrated crime management system. While various agencies use ICT-based systems, the absence of interoperability creates barriers to effective collaboration and information sharing. The research proposes the development of an Interagency Crime Management System (ICMS), which integrates the Crime Management Systems (CMS) of different agencies through an Application Program Interface (API). The system is designed to allow all law enforcement agencies to input data using a standardized format, improving crime tracking, reporting, and management across Nigeria. This paper details the design and implementation process, highlighting the benefits of enhanced collaboration for crime management.Keywords: crime management, Nigeria, law enforcement, ICT
Procedia PDF Downloads 19777 Promoting 'One Health' Surveillance and Response Approach Implementation Capabilities against Emerging Threats and Epidemics Crisis Impact in African Countries
Authors: Ernest Tambo, Ghislaine Madjou, Jeanne Y. Ngogang, Shenglan Tang, Zhou XiaoNong
Abstract:
Implementing national to community-based 'One Health' surveillance approach for human, animal and environmental consequences mitigation offers great opportunities and value-added in sustainable development and wellbeing. 'One Health' surveillance approach global partnerships, policy commitment and financial investment are much needed in addressing the evolving threats and epidemics crises mitigation in African countries. The paper provides insights onto how China-Africa health development cooperation in promoting “One Health” surveillance approach in response advocacy and mitigation. China-Africa health development initiatives provide new prospects in guiding and moving forward appropriate and evidence-based advocacy and mitigation management approaches and strategies in attaining Universal Health Coverage (UHC) and Sustainable Development Goals (SDGs). Early and continuous quality and timely surveillance data collection and coordinated information sharing practices in malaria and other diseases are demonstrated in Comoros, Zanzibar, Ghana and Cameroon. Improvements of variety of access to contextual sources and network of data sharing platforms are needed in guiding evidence-based and tailored detection and response to unusual hazardous events. Moreover, understanding threats and diseases trends, frontline or point of care response delivery is crucial to promote integrated and sustainable targeted local, national “One Health” surveillance and response approach needs implementation. Importantly, operational guidelines are vital in increasing coherent financing and national workforce capacity development mechanisms. Strengthening participatory partnerships, collaboration and monitoring strategies in achieving global health agenda effectiveness in Africa. At the same enhancing surveillance data information streams reporting and dissemination usefulness in informing policies decisions, health systems programming and financial mobilization and prioritized allocation pre, during and post threats and epidemics crises programs strengths and weaknesses. Thus, capitalizing on “One Health” surveillance and response approach advocacy and mitigation implementation is timely in consolidating Africa Union 2063 agenda and Africa renaissance capabilities and expectations.Keywords: Africa, one health approach, surveillance, response
Procedia PDF Downloads 421776 The Contemporary Issues of Quality Management: Relationship between Total Quality Management and Knowledge Management
Authors: Mehrnoosh Askarizadeh
Abstract:
To meet the challenges of the new global environment, companies have started paying great attention towards quality management as an integral part of their strategic business plans. The purpose of this article is to investigate the relationship between total quality management (TQM) and knowledge management (KM). Successful total quality management implementation throughout the organizations requires major changes in the main four aspects of knowledge management, namely: Creating, storage, sharing and application. Skill, knowledge and productivity are important factors in organization’s success and have important role. Therefore, TQM management system pays special attention to it. However, knowledge as the source is essential for organization’s survival. Our study points out how the quality management and knowledge management have been incorporated into each other for the development of the quality culture within the organization.Keywords: knowledge management (KM), total quality management (TQM), organizational performance (OP), deming cycle
Procedia PDF Downloads 481775 Application of Quality Function Deployment Approach to Industrial Engineering Department of Gaziantep University
Authors: Eren Özceylan, Cihan Çetinkaya
Abstract:
Quality function deployment (QFD) is a technique to assist transform the voice of the customer into engineering characteristics for a product/service. With the difference of existing studies, QFD is applied to an educational area that is a service sector which is not a manufacturing firm. The objective of the study is to design the undergraduate program according to students’ desire and expectations. To do so, third and fourth year students of industrial engineering department of Gaziantep University are considered as customers. Some suggestions about lecturers, courses, exams and facility for how to satisfy students’ demands are presented and as a result, sharing the materials of courses is the most important requirement among others.Keywords: higher education, quality function deployment, quality house, voice of customer
Procedia PDF Downloads 437774 Measuring Systems Interoperability: A Focal Point for Standardized Assessment of Regional Disaster Resilience
Authors: Joel Thomas, Alexa Squirini
Abstract:
The key argument of this research is that every element of systems interoperability is an enabler of regional disaster resilience, and arguably should become a focal point for standardized measurement of communities’ ability to work together. Few resilience research efforts have focused on the development and application of solutions that measurably improve communities’ ability to work together at a regional level, yet a majority of the most devastating and disruptive disasters are those that have had a regional impact. The key findings of the research include a unique theoretical, mathematical, and operational approach to tangibly and defensibly measure and assess systems interoperability required to support crisis information management activities performed by governments, the private sector, and humanitarian organizations. A most effective way for communities to measurably improve regional disaster resilience is through deliberately executed disaster preparedness activities. Developing interoperable crisis information management capabilities is a crosscutting preparedness activity that greatly affects a community’s readiness and ability to work together in times of crisis. Thus, improving communities’ human and technical posture to work together in advance of a crisis, with the ultimate goal of enabling information sharing to support coordination and the careful management of available resources, is a primary means by which communities may improve regional disaster resilience. This model describes how systems interoperability can be qualitatively and quantitatively assessed when characterized as five forms of capital: governance; standard operating procedures; technology; training and exercises; and usage. The unique measurement framework presented defines the relationships between systems interoperability, information sharing and safeguarding, operational coordination, community preparedness and regional disaster resilience, and offers a means by which to implement real-world solutions and measure progress over the course of a multi-year program. The model is being developed and piloted in partnership with the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the North Atlantic Treaty Organization (NATO) Advanced Regional Civil Emergency Coordination Pilot (ARCECP) with twenty-three organizations in Bosnia and Herzegovina, Croatia, Macedonia, and Montenegro. The intended effect of the model implementation is to enable communities to answer two key questions: 'Have we measurably improved crisis information management capabilities as a result of this effort?' and, 'As a result, are we more resilient?'Keywords: disaster, interoperability, measurement, resilience
Procedia PDF Downloads 143773 Examining the Role of Farmer-Centered Participatory Action Learning in Building Sustainable Communities in Rural Haiti
Authors: Charles St. Geste, Michael Neumann, Catherine Twohig
Abstract:
Our primary aim is to examine farmer-centered participatory action learning as a tool to improve agricultural production, build resilience to climate shocks and, more broadly, advance community-driven solutions for sustainable development in rural communities across Haiti. For over six years, sixty plus farmers from Deslandes, Haiti, organized in three traditional work groups called konbits, have designed and tested low-input agroecology techniques as part of the Konbit Vanyan Kapab Pwoje Agroekoloji. The project utilizes a participatory action learning approach, emphasizing social inclusion, building on local knowledge, experiential learning, active farmer participation in trial design and evaluation, and cross-community sharing. Mixed methods were used to evaluate changes in knowledge and adoption of agroecology techniques, confidence in advancing agroecology locally, and innovation among Konbit Vanyan Kapab farmers. While skill and knowledge in application of agroecology techniques varied among individual farmers, a majority of farmers successfully adopted techniques outside of the trial farms. The use of agroecology techniques on trial and individual farms has doubled crop production in many cases. Farm income has also increased, and farmers report less damage to crops and property caused by extreme weather events. Furthermore, participatory action strategies have led to greater local self-determination and greater capacity for sustainable community development. With increased self-confidence and the knowledge and skills acquired from participating in the project, farmers prioritized sharing their successful techniques with other farmers and have developed a farmer-to-farmer training program that incorporates participatory action learning. Using adult education methods, farmers, trained as agroecology educators, are currently providing training in sustainable farming practices to farmers from five villages in three departments across Haiti. Konbit Vanyan Kapab farmers have also begun testing production of value-added food products, including a dried soup mix and tea. Key factors for success include: opportunities for farmers to actively participate in all phases of the project, group diversity, resources for application of agroecology techniques, focus on group processes and overcoming local barriers to inclusive decision-making.Keywords: agroecology, participatory action learning, rural Haiti, sustainable community development
Procedia PDF Downloads 156772 An Effective Approach to Knowledge Capture in Whole Life Costing in Constructions Project
Authors: Ndibarafinia Young Tobin, Simon Burnett
Abstract:
In spite of the benefits of implementing whole life costing technique as a valuable approach for comparing alternative building designs allowing operational cost benefits to be evaluated against any initial cost increases and also as part of procurement in the construction industry, its adoption has been relatively slow due to the lack of tangible evidence, ‘know-how’ skills and knowledge of the practice, i.e. the lack of professionals in many establishments with knowledge and training on the use of whole life costing technique, this situation is compounded by the absence of available data on whole life costing from relevant projects, lack of data collection mechanisms and so on. This has proved to be very challenging to those who showed some willingness to employ the technique in a construction project. The knowledge generated from a project can be considered as best practices learned on how to carry out tasks in a more efficient way, or some negative lessons learned which have led to losses and slowed down the progress of the project and performance. Knowledge management in whole life costing practice can enhance whole life costing analysis execution in a construction project, as lessons learned from one project can be carried on to future projects, resulting in continuous improvement, providing knowledge that can be used in the operation and maintenance phases of an assets life span. Purpose: The purpose of this paper is to report an effective approach which can be utilised in capturing knowledge in whole life costing practice in a construction project. Design/methodology/approach: An extensive literature review was first conducted on the concept of knowledge management and whole life costing. This was followed by a semi-structured interview to explore the existing and good practice knowledge management in whole life costing practice in a construction project. The data gathered from the semi-structured interview was analyzed using content analysis and used to structure an effective knowledge capturing approach. Findings: From the results obtained in the study, it shows that the practice of project review is the common method used in the capturing of knowledge and should be undertaken in an organized and accurate manner, and results should be presented in the form of instructions or in a checklist format, forming short and precise insights. The approach developed advised that irrespective of how effective the approach to knowledge capture, the absence of an environment for sharing knowledge, would render the approach ineffective. Open culture and resources are critical for providing a knowledge sharing setting, and leadership has to sustain whole life costing knowledge capture, giving full support for its implementation. The knowledge capturing approach has been evaluated by practitioners who are experts in the area of whole life costing practice. The results have indicated that the approach to knowledge capture is suitable and efficient.Keywords: whole life costing, knowledge capture, project review, construction industry, knowledge management
Procedia PDF Downloads 260771 Research on Perceptual Features of Couchsurfers on New Hospitality Tourism Platform Couchsurfing
Authors: Yuanxiang Miao
Abstract:
This paper aims to examine the perceptual features of couchsurfers on a new hospitality tourism platform, the free homestay website couchsurfing. As a local host, the author has accepted 61 couchsurfers in Kyoto, Japan, and attempted to figure out couchsurfers' characteristics on perception by hosting them. Moreover, the methodology of this research is mainly based on in-depth interviews, by talking with couchsurfers, observing their behaviors, doing questionnaires, etc. Five dominant perceptual features of couchsurfers were identified: (1) Trusting; (2) Meeting; (3) Sharing; (4) Reciprocity; (5) Worries. The value of this research lies in figuring out a deeper understanding of the perceptual features of couchsurfers, and the author indeed hosted and stayed with 61 couchsurfers from 30 countries and areas over one year. Lastly, the author offers practical suggestions for future research.Keywords: couchsurfing, depth interview, hospitality tourism, perceptual features
Procedia PDF Downloads 145770 Tracing Digital Traces of Phatic Communion in #Mooc
Authors: Judith Enriquez-Gibson
Abstract:
This paper meddles with the notion of phatic communion introduced 90 years ago by Malinowski, who was a Polish-born British anthropologist. It explores the phatic in Twitter within the contents of tweets related to moocs (massive online open courses) as a topic or trend. It is not about moocs though. It is about practices that could easily be hidden or neglected if we let big or massive topics take the lead or if we simply follow the computational or secret codes behind Twitter itself and third party software analytics. It draws from media and cultural studies. Though at first it appears data-driven as I submitted data collection and analytics into the hands of a third party software, Twitonomy, the aim is to follow how phatic communion might be practised in a social media site, such as Twitter. Lurking becomes its research method to analyse mooc-related tweets. A total of 3,000 tweets were collected on 11 October 2013 (UK timezone). The emphasis of lurking is to engage with Twitter as a system of connectivity. One interesting finding is that a click is in fact a phatic practice. A click breaks the silence. A click in one of the mooc website is actually a tweet. A tweet was posted on behalf of a user who simply chose to click without formulating the text and perhaps without knowing that it contains #mooc. Surely, this mechanism is not about reciprocity. To break the silence, users did not use words. They just clicked the ‘tweet button’ on a mooc website. A click performs and maintains connectivity – and Twitter as the medium in attendance in our everyday, available when needed to be of service. In conclusion, the phatic culture of breaking silence in Twitter does not have to submit to the power of code and analytics. It is a matter of human code.Keywords: click, Twitter, phatic communion, social media data, mooc
Procedia PDF Downloads 412769 Re-Invent Corporate Governance - Ethical Way
Authors: Talha Sareshwala
Abstract:
The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.Keywords: business, entrepreneur, ethics, governance, transparency.
Procedia PDF Downloads 74768 The French, the Yoruba, and the H-Thing: Sharing and Realising Same Phenomenon Differently
Authors: Rose-Juliet Anyanwu
Abstract:
The principal objective of this paper is to investigate whether some sort of phonological processes, such as elision, aspiration, glottalisation, and hardening can be used to account for the behaviour of the glottal fricative (or approximant, as the case may be) ‘h’ in both French and Yoruba. French and Yoruba speakers generally tend to say, for instance ‘ockey’ and ‘amburger’, instead of ‘hockey’ and ‘hamburger’, respectively. Whereas the Yoruba conversely say, for instance ‘hadd’ for ‘add’, ‘heat’ for ‘eat’ on the one hand and ‘ard’ for ‘hard’, ‘eat’ for ‘heat’ on the other hand, on a similar note, it is not quite clear whether the French, however, if not at least in rare instances, would tend to force themselves to pronounce (in any form whatsoever) the h-sound. Recorded sentences containing h-initial as well as vowel-initial words will be used for the investigation. The present paper is meant to contribute to work on aspiration, compensation, elision, and glottalisation, as well as hardening.Keywords: aspiration, compensation, glottalisation, hardening
Procedia PDF Downloads 170767 Digital Storytelling in the ELL Classroom: A Literature Review
Authors: Nicholas Jobe
Abstract:
English Language Learners (ELLs) often struggle in a classroom setting, too embarrassed at their skill level to write or speak in front of peers and too lacking in confidence to practice. Storytelling is an age-old method of teaching that allows learners to remember important details while listening or sharing a narrative. In the modern world, digital storytelling through the use of technological tools such as podcasts and videos allow students to safely interact with each other to build skills in a fun and engaging way that also works as a confidence booster. Specifically using a constructionist approach to learning, digital storytelling allows ELL students to grow and build new and prior knowledge by creating stories via these technological means. Research herein suggests, through the use of case studies and mixed methodologies, that digital storytelling mainly yields positive results for effective learning in an ELL classroom setting.Keywords: digital storytelling, ELL, narrative, podcast
Procedia PDF Downloads 138766 A Case from China on the Situation of Knowledge Management in Government
Authors: Qiaoyun Yang
Abstract:
Organizational scholars have paid enormous attention on how local governments manage their knowledge during the past two decades. Government knowledge management (KM) research recognizes that the management of knowledge flows and networks is critical to reforms on government service efficiency and the effect of administration. When dealing with complex affairs, all the limitations resulting from a lack of KM concept, processes and technologies among all the involved organizations begin to be exposed and further compound the processing difficulty of the affair. As a result, the challenges for individual or group knowledge sharing, knowledge digging and organizations’ collaboration in government's activities are diverse and immense. This analysis presents recent situation of government KM in China drawing from a total of more than 300 questionnaires and highlights important challenges that remain. The causes of the lapses in KM processes within and across the government agencies are discussed.Keywords: KM processes, KM technologies, government, KM situation
Procedia PDF Downloads 361765 Stabilization Technique for Multi-Inputs Voltage Sense Amplifiers in Node Sharing Converters
Authors: Sanghoon Park, Ki-Jin Kim, Kwang-Ho Ahn
Abstract:
This paper discusses the undesirable charge transfer through the parasitic capacitances of the input transistors in a multi-inputs voltage sense amplifier. Its intrinsic rail-to-rail voltage transitions at the output nodes inevitably disturb the input sides through the capacitive coupling between the outputs and inputs. Then, it can possible degrade the stabilities of the reference voltage levels. Moreover, it becomes more serious in multi-channel systems by altering them for other channels, and so degrades the linearity of the overall systems. In order to alleviate the internal node voltage transition, the internal node stabilization techniques are proposed. It achieves 45% and 40% improvements for node stabilization and input referred disturbance, respectively.Keywords: voltage sense amplifier, multi-inputs, voltage transition, node stabilization, biasing circuits
Procedia PDF Downloads 565764 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core
Authors: Yashas Bedre Raghavendra, Pim Vullers
Abstract:
This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction
Procedia PDF Downloads 70763 Bridging Livelihood and Conservation: The Role of Ecotourism in the Campo Ma’an National Park, Cameroon
Authors: Gadinga Walter Forje, Martin Ngankam Tchamba, Nyong Princely Awazi, Barnabas Neba Nfornka
Abstract:
Ecotourism is viewed as a double edge sword for the enhancement of conservation and local livelihood within a protected landscape. The Campo Ma’an National Park (CMNP) adopted ecotourism in its management plan as a strategic axis for better management of the park. The growing importance of ecotourism as a strategy for the sustainable management of CMNP and its environs requires adequate information to bolster the sector. This study was carried out between November 2018 and September 2021, with the main objective to contribute to the sustainable management of the CMNP through suggestions for enhancing the capacity of ecotourism in and around the park. More specifically, the study aimed at; 1) Analyse the governance of ecotourism in the CMNP and its surrounding; 2) Assessing the impact of ecotourism on local livelihood around the CMNP; 3) Evaluating the contribution of ecotourism to biodiversity conservation in and around the CMNP; 4) Evaluate the determinants of ecotourism possibilities in achieving sustainable livelihood and biodiversity conservation in and around the CMNP. Data were collected from both primary and secondary sources. Primary data were obtained from household surveys (N=124), focus group discussions (N=8), and key informant interviews (N=16). Data collected were coded and imputed into SPSS (version 19.0) software and Microsoft Excel spreadsheet for both quantitative and qualitative analysis. Findings from the Chi-square test revealed overall poor ecotourism governance in and around the CMNP, with benefit sharing (X2 = 122.774, p <0.01) and conflict management (X2 = 90.839, p<0.01) viewed to be very poor. For the majority of the local population sampled, 65% think ecotourism does not contribute to local livelihood around CMNP. The main factors influencing the impact of ecotourism around the CMNP on the local population’s livelihood were gender (logistic regression (β) = 1.218; p = 0.000); and level of education (logistic regression (β) = 0.442; p = 0.000). Furthermore, 55.6% of the local population investigated believed ecotourism activities do not contribute to the biodiversity conservation of CMNP. Spearman correlation between socio-economic variables and ecotourism impact on biodiversity conservation indicated relationships with gender (r = 0.200, p = 0.032), main occupation (r = 0.300 p = 0.012), time spent in the community (r = 0.287 p = 0.017), and number of children (r =-0.286 p = 0.018). Variables affecting ecotourism impact on biodiversity conservation were age (logistic regression (β) = -0.683; p = 0.037) and gender (logistic regression (β) = 0.917; p = 0.045). This study recommends the development of ecotourism-friendly policies that can accelerate Public Private Partnership for the sustainable management of the CMNP as a commitment toward good governance. It also recommends the development of gender-sensitive ecotourism packages, with fair opportunities for rural women and more parity in benefit sharing to improve livelihood and contribute more to biodiversity conservation in and around the Park.Keywords: biodiversity conservation, Campo Ma’an national park, ecotourism, ecotourism governance, rural livelihoods, protected area management
Procedia PDF Downloads 120762 Performance Analysis of IDMA Scheme Using Quasi-Cyclic Low Density Parity Check Codes
Authors: Anurag Saxena, Alkesh Agrawal, Dinesh Kumar
Abstract:
The next generation mobile communication systems i.e. fourth generation (4G) was developed to accommodate the quality of service and required data rate. This project focuses on multiple access technique proposed in 4G communication systems. It is attempted to demonstrate the IDMA (Interleave Division Multiple Access) technology. The basic principle of IDMA is that interleaver is different for each user whereas CDMA employs different signatures. IDMA inherits many advantages of CDMA such as robust against fading, easy cell planning; dynamic channel sharing and IDMA increase the spectral efficiency and reduce the receiver complexity. In this, performance of IDMA is analyzed using QC-LDPC coding scheme further it is compared with LDPC coding and at last BER is calculated and plotted in MATLAB.Keywords: 4G, QC-LDPC, CDMA, IDMA
Procedia PDF Downloads 323761 Complexity Leadership and Knowledge Management in Higher Education
Authors: Prabhakar Venugopal G.
Abstract:
Complex environments triggered by globalization have necessitated new paradigms of leadership – complexity leadership that encompasses multiple roles that leaders need to take upon. The success of higher education institutions depends on how well leaders can provide adaptive, administrative and enabling leadership. Complexity leadership seems all the more relevant for institutions that are knowledge-driven and thrive on knowledge creation, knowledge storage and retrieval, knowledge sharing and knowledge applications. In this paper are the elements of globalization, the opportunities and challenges that are brought forth by globalization are discussed. The complexity leadership paradigm in a knowledge-based economy and the need for such a paradigm shift for higher education institutions is presented. Further, the paper also discusses the support the leader requires in a knowledge-driven economy through knowledge management initiatives.Keywords: globalization, complexity leadership, knowledge management
Procedia PDF Downloads 493760 Quantifying Multivariate Spatiotemporal Dynamics of Malaria Risk Using Graph-Based Optimization in Southern Ethiopia
Authors: Yonas Shuke Kitawa
Abstract:
Background: Although malaria incidence has substantially fallen sharply over the past few years, the rate of decline varies by district, time, and malaria type. Despite this turn-down, malaria remains a major public health threat in various districts of Ethiopia. Consequently, the present study is aimed at developing a predictive model that helps to identify the spatio-temporal variation in malaria risk by multiple plasmodium species. Methods: We propose a multivariate spatio-temporal Bayesian model to obtain a more coherent picture of the temporally varying spatial variation in disease risk. The spatial autocorrelation in such a data set is typically modeled by a set of random effects that assign a conditional autoregressive prior distribution. However, the autocorrelation considered in such cases depends on a binary neighborhood matrix specified through the border-sharing rule. Over here, we propose a graph-based optimization algorithm for estimating the neighborhood matrix that merely represents the spatial correlation by exploring the areal units as the vertices of a graph and the neighbor relations as the series of edges. Furthermore, we used aggregated malaria count in southern Ethiopia from August 2013 to May 2019. Results: We recognized that precipitation, temperature, and humidity are positively associated with the malaria threat in the area. On the other hand, enhanced vegetation index, nighttime light (NTL), and distance from coastal areas are negatively associated. Moreover, nonlinear relationships were observed between malaria incidence and precipitation, temperature, and NTL. Additionally, lagged effects of temperature and humidity have a significant effect on malaria risk by either species. More elevated risk of P. falciparum was observed following the rainy season, and unstable transmission of P. vivax was observed in the area. Finally, P. vivax risks are less sensitive to environmental factors than those of P. falciparum. Conclusion: The improved inference was gained by employing the proposed approach in comparison to the commonly used border-sharing rule. Additionally, different covariates are identified, including delayed effects, and elevated risks of either of the cases were observed in districts found in the central and western regions. As malaria transmission operates in a spatially continuous manner, a spatially continuous model should be employed when it is computationally feasible.Keywords: disease mapping, MSTCAR, graph-based optimization algorithm, P. falciparum, P. vivax, waiting matrix
Procedia PDF Downloads 78759 An Exploration of Possible Impact of Drumming on Mental Health in a Hospital Setting
Authors: Zhao Luqian, Wang Yafei
Abstract:
Participation in music activities is beneficial for enhancing wellbeing, especially for aged people (Creech, 2013). Looking at percussion group in particular, it can facilitate a sense of belonging, relaxation, energy, and productivity, learning, enhanced mood, humanising, seems of accomplishment, escape from trauma, and emotional expression (Newman, 2015). In health literatures, group drumming is effective in reducing stress and improving multiple domains of social-motional behaviors (Ho et al., 2011; Maschi et al., 2010) because it offers a creative and mutual learning space that allows patients to establish a positive peer interaction (Mungas et al., 2014; Perkins, 2016). However, very few studies have investigated the effect of group drumming from the aspect of patients’ needs. Therefore, this study focuses on the discussion of patients' specific needs within mental health and explores how group percussion may meet their needs. Seligman’s (2011) five core elements of mental health were applied as patients’ needs in this study: (1) Positive emotions; (2) Engagement; (3) Relationships; (4) Meaning and (5) Accomplishment. 12 participants aged 57- 80 years were interviewed individually. The researcher also had observation in four drumming groups simultaneously. The results reveal that group drumming could improve participants’ mental wellbeing. First, it created a therapeutic health care environment extending beyond the elimination of boredom, and patients could focus on positive emotions during the session of group drumming. Secondly, it was effective in satisfying patients’ level of engagement. Thirdly, this study found that joining a percussion group would require patients to work on skills such as turn-taking and sharing. This equal relationship is helpful for releasing patients’ negative mood and thus forming tighter relationships between and among them. Fourthly, group drumming was found to meet patients’ meaning needs through offering them a place of belonging and a place for sharing. Its leaner-oriented approach engaged patients by a sense of belonging, accepting, connecting, and ownership. Finally, group drumming could meet patients’ needs for accomplishment through the learning process. The inclusive learning process, which indicates there is no right or wrong throughout the process, allowed patients to make their own decisions. In conclusion, it is difficult for patients to achieve positive emotions, engagement, relationships, meanings, and accomplishments in a hospital setting. Drumming can be practiced for enhancement in terms of reducing patients’ negative emotions and improving their experiences in a hospital through enriched social interaction and sense of accomplishment. Also, it can help patients to enhance social skills in a controlled environment.Keywords: group drumming, hospital, mental health, music psychology
Procedia PDF Downloads 90758 Managing HR Knowledge in a Large Privately Owned Enterprise: An Empirical Case Analysis
Authors: Cindy Wang-Cowham, Judy Ningyu Tang
Abstract:
The paper contributes towards the development of scarce literature on HR knowledge management. Drawing literature from knowledge management, the authors define the meaning of HR knowledge and propose that there are social mechanisms in organizations that facilitate the management and sharing of HR knowledge. Instead of investigating the subject in large multinational corporations, the present paper examines it in a large Chinese privately owned enterprise, which has an international standing. The main finding of the case analysis is that communication and feedback plays a pivotal role when managing HR knowledge. Social mechanisms can stimulate the communication and feedback between employees, thus facilitate knowledge exchange.Keywords: HR knowledge, knowledge management, large privately owned enterprises, China
Procedia PDF Downloads 530757 Author Name Disambiguation for Biomedical Literature
Authors: Parthiban Srinivasan
Abstract:
PubMed provides online access to the National Library of Medicine database (MEDLINE) and other publications, which contain close to 25 million scientific citations from 1865 to the present. There are close to 80 million author name instances in those close to 25 million citations. For any work of literature, a fundamental issue is to identify the individual(s) who wrote it, and conversely, to identify all of the works that belong to a given individual. Due to the lack of universal standards for name information, there are two aspects of name ambiguity: name synonymy (a single author with multiple name representations), and name homonymy (multiple authors sharing the same name representation). In this talk, we present some results from our extensive work in author name disambiguation for PubMed citations. Information will be presented on the effectiveness and shortcomings of different aspects of successful name disambiguation such as parsing, validation, standardization and normalization.Keywords: disambiguation, normalization, parsing, PubMed
Procedia PDF Downloads 300