Search results for: Islamic financial services
2535 The Role of Midwives in Promoting Childbearing in Respect to the Law of Population Youth in Iran
Authors: Parvin Abedi, Poorandokht Afshari
Abstract:
Introduction: In 2022, the Youth Law of the Population was notified to all organizations, including the Iranian Ministry of Health. Some of the articles of this law are about the role of midwives in health and treatment to promote childbearing. In this regard, articles number 45, 48, 49, and 50 are related to midwifery work that will be reviewed in this article. Methods: In this review, the law of population youth was reviewed. In this regard, the statistics of midwives working in the treatment and health sector were collected and analyzed according to the population youth law. Results: Nearly 47 000 midwives are working in the public and private sectors of the country and in the healthcare sector; according to Article 49, which states that there should be one midwife for every two parturient women, about 12,000 midwives are needed in the treatment department and about 8,000 midwives are needed in the health department. In Article 50 it is mentioned to modify tariffs and efficiency in order to increase natural childbirth, and in this field, insurance organizations should have sufficient cooperation with payments. The tariff for midwifery services has been increased, but it is not enough for the stressful job of midwifery. The labor incentive for delivery by midwives is also low. Conclusion: Midwives are one of the fundamental pillars of the law of the population, and without increasing the motivation of midwives, it is not possible to increase the rate of natural childbirth and make childbirth pleasant.Keywords: law of the population, midwife, motivation, childbearing
Procedia PDF Downloads 482534 Rural to Urban Migration and Mental Health Consequences in Urbanizing China
Authors: Jie Li, Nick Manning
Abstract:
The mass rural-urban migrants in China associated with the urbanization processes bear significant implications on public health, which is an important yet under-researched area. Urban social and built environment, such as noise, air pollution, high population density, and social segregation, has the potential to contribute to mental illness. In China, rural-urban migrants are also faced with institutional discrimination tied to the hukou (household registration) system, through which they are denied of full citizenship to basic social welfare and services, which may elevate the stress of urban living and exacerbate the risks to mental illness. This paper aims to link the sociospatial exclusion, everyday life experiences and its mental health consequences on rural to urban migrants living in the mega-city of Shanghai. More specifically, it asks what the daily experience of being a migrant in Shanghai is actually like, particularly regarding sources of stress from housing, displacement, service accessibility, and cultural conflict, and whether these stresses affect mental health? Secondary data from literature review on migration, urban studies, and epidemiology research, as well as primary data from preliminary field trip observations and interviews are used in the analysis.Keywords: migration, urbanisation, mental health, China
Procedia PDF Downloads 3762533 A Chronological and Comparative Examination of Traditional American Post-Secondary Institutions of Higher Learning Delivery of Instruction for College Students with Autism Spectrum Disorders
Authors: Shannon Melideo
Abstract:
Post-secondary schools that provide specialized instruction for college students with special needs have been in existence for some time in the United States of America. Whether students experience learning disabilities, visual impairments, physical limitations, Autism Spectrum Disorders or any other issue that impacts their learning are able to attend universities that intentionally cater to their needs. While this selection of post-secondary education may be preferred by some students, other have sought a different experience. Over the last ten years, the number of students with Autism Spectrum Disorders (ASD) attending traditional universities in the United States of America has increased significantly. Students with ASD tend to select smaller, private institutions that appear to offer more personal attention and services. This paper will examine how traditional American universities are preparing for this relatively new group of students in their college classrooms. This paper will provide a brief historical timeline of access to university instruction for students with Autism Spectrum Disorders, and how and if students with ASD are received in colleges around the globe, and best research supported practices for success.Keywords: autism spectrum disorders, access to learning, university instruction, accommodations
Procedia PDF Downloads 1772532 The Relationship between Corporate Governance and Intellectual Capital Disclosure: Malaysian Evidence
Authors: Rabiaal Adawiyah Shazali, Corina Joseph
Abstract:
The disclosure of Intellectual Capital (IC) information is getting more vital in today’s era of a knowledge-based economy. Companies are advised by accounting bodies to enhance IC disclosure which complements the conventional financial disclosures. There are no accounting standards for Intellectual Capital Disclosure (ICD), therefore the disclosure is entirely voluntary. Hence, this study aims to investigate the extent of ICD and to examine the relationship between corporate governance and ICD in Malaysia. This study employed content analysis of 100 annual reports by the top 100 public listed companies in Malaysia during 2012. The uniqueness of this study lies on its underpinning theory used where it applies the institutional isomorphism theory to support the effect of the attributes of corporate governance towards ICD. In order to achieve the stated objective, multiple regression analysis were employed to conduct this study. From the descriptive statistics, it was concluded that public listed companies in Malaysia have increased their awareness towards the importance of ICD. Furthermore, results from the multiple regression analysis confirmed that corporate governance affects the company’s ICD where the frequency of audit committee meetings and the board size has positively influenced the level of ICD in companies. Findings from this study would provide an incentive for companies in Malaysia to enhance the disclosure of IC. In addition, this study would assist Bursa Malaysia and other regulatory bodies to come up with a proper guideline for the disclosure of IC.Keywords: annual report, content analysis, corporate governance, intellectual capital disclosure
Procedia PDF Downloads 2182531 The Behavior and Satisfaction of Tourists Affecting the Sustainable Tourism at the Amphawa Floating Market in Samut Songkhram Province
Authors: Chanpen Meenakorn
Abstract:
This research aims to study; (1) behavior of the tourists affecting the satisfaction level of tourism at the Amphawa floating market in Samut Songkhram province, (2) to study the satisfaction level of tourism at the Amphawa floating market. The research method will use quantitative research; data was collected by questionnaires distributed to the tourist who visits the Amphawa floating market for 480 samples. Data was analyzed by SPSS software to process descriptive statistic including frequency, percentage, mean, standard deviation and inferential statistic is t-test, F-test, and chi-square. The results showed that the behavior of tourists had known tourist attractions in the province comes from the mouth of relatives and friends suggested that he come here before and the reasons to visit is to want to pay homage to the various temples for the frequency to visit travel an average of 2-4 times and the satisfaction of the tourists in the province found that the satisfaction level of tourists in the province at the significant level of the place, convenient and services have a high level of satisfaction.Keywords: amphawa floating market behavior of the tourists, satisfaction level, sustainable tourism, Samut Songkhram province
Procedia PDF Downloads 3692530 Assessing the Impact of Covid-19 Pandemic on Waste Management Workers in Ghana
Authors: Mensah-Akoto Julius, Kenichi Matsui
Abstract:
This paper examines the impact of COVID-19 on waste management workers in Ghana. A questionnaire survey was conducted among 60 waste management workers in Accra metropolis, the capital region of Ghana, to understand the impact of the COVID-19 pandemic on waste generation, workers’ safety in collecting solid waste, and service delivery. To find out correlations between the pandemic and safety of waste management workers, a regression analysis was used. Regarding waste generation, the results show the pandemic led to the highest annual per capita solid waste generation, or 3,390 tons, in 2020. Regarding the safety of workers, the regression analysis shows a significant and inverse association between COVID-19 and waste management services. This means that contaminated wastes may infect field workers with COVID-19 due to their direct exposure. A rise in new infection cases would have a negative impact on the safety and service delivery of the workers. The result also shows that an increase in economic activities negatively impacts waste management workers. The analysis, however, finds no statistical relationship between workers’ service deliveries and employees’ salaries. The study then discusses how municipal waste management authorities can ensure safe and effective waste collection during the pandemic.Keywords: Covid-19, waste management worker, waste collection, Ghana
Procedia PDF Downloads 2072529 A Unified Approach for Naval Telecommunication Architectures
Authors: Y. Lacroix, J.-F. Malbranque
Abstract:
We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion
Procedia PDF Downloads 2932528 Flo: Period-Tracking App with AI Powered Tools
Authors: Dania Baaboud, Renad Al-zahrani, Mahnoor Khan, Riya Afroz
Abstract:
Flo is a smart period-tracking tool that uses artificial intelligence (AI) to offer individualized reproductive health predictions and insights. Flo makes very accurate predictions about menstrual cycles, ovulation, and fertility windows by evaluating user inputs, including cycle duration, symptoms, and patterns. Its machine learning algorithms are constantly evolving, providing personalized health recommendations, instructional materials, and early identification of possible health abnormalities such as reproductive problems and hormone imbalances. Flo, which was introduced in 2015 and upgraded with AI in 2017, is a revolutionary use of technology in healthcare that empowers people to make knowledgeable decisions regarding their well-being. Despite its advantages, our study included drawbacks, such as limited access to premium services and a small sample size. While highlighting unique characteristics, a comparative comparison with similar applications such as Clue and Glow confirmed Flo's outstanding AI integration for individualized healthcare. All things considered, Flo is a prime example of how AI can be used to tackle intricate biological processes, giving consumers the ability to efficiently control their reproductive health and opening the door for improvements in individualized medical technology.Keywords: Flo, period-tracking app, period symptoms, women’s health, machinery
Procedia PDF Downloads 102527 REDD+ and Conservation: Challenges and Opportunities of the Landscape Governance Approach
Authors: Richard Mbatu
Abstract:
Implementation of the Reducing Emissions from Deforestation and forest Degradation (REDD+) program will not only lead to significant net gains in greenhouse gas reduction but also gains in biodiversity conservation. However, the looming paradigm shift in the program in the form of the proposed landscape governance approach could change this inclination. The concern lies with the fact that pursue of carbon credits by governments and private entities under the proposed landscape approach could encourage obstinate land use behaviors that are detrimental to the cause of biodiversity conservation and ecosystem services. Yet, the landscape approach could also stimulate governments to develop and implement land use management policies for climate change adaptation and mitigation. Using two potential areas of land use under the proposed landscape approach – carbon farming in grasslands and carbon farming in plantations – this paper provides a balanced analytical review of conservation challenges and opportunities for forest governance and beyond under the proposed landscape approach to REDD+. The paper argues that such a balanced view will enable policymakers and other stakeholders to better present their arguments in their efforts to shape the course of the REDD+ program in the post-Paris Agreement era.Keywords: biodiversity conservation, REDD+, forest governance, grasslands, landscape approach, plantations
Procedia PDF Downloads 3702526 Children with Autistic Spectrum Disorders in Co-Taught Classes in Greece: Teachers’ View
Authors: Tryfon Mavropalias, Anastasia Alevriadou
Abstract:
Co-teaching is a relatively recent model of providing teaching services to students with disabilities in Greece. According to recent studies, it seems that the largest number of students who take part in the Greek co-teaching programme are children with Autistic Spectrum Disorders (ASD). The aim of the suggested study is to investigate the effectiveness and usefulness of co-teaching to students with ASD as well as skills students with ASD develop during co-teaching in primary education classes. To conduct the research, quantitative method of research was used, with the means of research being a questionnaire including open and close type questions. The sample of this research consists of 142 primary school co-teachers from all over Northern Greece (71 general education teachers and 71 special education teachers). Given the results, it was concluded that co-teachers believe that including and educating children with Autistic Spectrum Disorders in the general class benefits those who autism is measured from the middle to the upper end of the spectrum. Additionally, children develop social skills first, followed by emotional and cognitive skills. Ultimately, educators declared that they are prepared only to a limited degree to effectively support students with Autistic Spectrum Disorders in general classes.Keywords: Autistic spectrum disorders, co-teaching, co-teachers, co-taught class
Procedia PDF Downloads 3612525 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict
Authors: Christopher Holroyd
Abstract:
With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.Keywords: human trafficking, reconstruction, security, terrorism
Procedia PDF Downloads 1362524 A Nonlinear Stochastic Differential Equation Model for Financial Bubbles and Crashes with Finite-Time Singularities
Authors: Haowen Xi
Abstract:
We propose and solve exactly a class of non-linear generalization of the Black-Scholes process of stochastic differential equations describing price bubble and crashes dynamics. As a result of nonlinear positive feedback, the faster-than-exponential price positive growth (bubble forming) and negative price growth (crash forming) are found to be the power-law finite-time singularity in which bubbles and crashes price formation ending at finite critical time tc. While most literature on the market bubble and crash process focuses on the nonlinear positive feedback mechanism aspect, very few studies concern the noise level on the same process. The present work adds to the market bubble and crashes literature by studying the external sources noise influence on the critical time tc of the bubble forming and crashes forming. Two main results will be discussed: (1) the analytical expression of expected value of the critical timeKeywords: bubble, crash, finite-time-singular, numerical simulation, price dynamics, stochastic differential equations
Procedia PDF Downloads 1362523 Entrepreneurial Orientation and Customer Satisfaction: Evidences nearby Khao San Road
Authors: Vichada Chokesikarin
Abstract:
The study aims to determine which factors account for customer satisfaction and to investigate the relationship between entrepreneurial orientation and business success, in particular, context of the information understanding of hostel business in Pranakorn district, Bangkok and the significant element of entrepreneurship in tourism industry. This study covers 352 hostels customers and 61 hostel owners/managers nearby Khao San Road. Data collection methods were used by survey questionnaire and a series of hypotheses were developed from services marketing literature. The findings suggest the customer satisfaction most influenced by image, service quality, room quality and price accordingly. Furthermore the findings revealed that significant relationships exist between entrepreneurial orientation and business success; while competitive aggressiveness was found unrelated. The ECSI model’s generic measuring customer satisfaction was found partially mediate the business success. A reconsideration of other variables applicable should be supported with the model of hostel business. The study provides context and overall view of hostel business while discussing from the entrepreneurial orientation to customer satisfaction, thereby reducing decision risk on hostel investment.Keywords: customer satisfaction, ECSI model, entrepreneurial orientation, small hotel, hostel, business performance
Procedia PDF Downloads 3392522 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 1332521 Using Bidirectional Encoder Representations from Transformers to Extract Topic-Independent Sentiment Features for Social Media Bot Detection
Authors: Maryam Heidari, James H. Jones Jr.
Abstract:
Millions of online posts about different topics and products are shared on popular social media platforms. One use of this content is to provide crowd-sourced information about a specific topic, event or product. However, this use raises an important question: what percentage of information available through these services is trustworthy? In particular, might some of this information be generated by a machine, i.e., a bot, instead of a human? Bots can be, and often are, purposely designed to generate enough volume to skew an apparent trend or position on a topic, yet the consumer of such content cannot easily distinguish a bot post from a human post. In this paper, we introduce a model for social media bot detection which uses Bidirectional Encoder Representations from Transformers (Google Bert) for sentiment classification of tweets to identify topic-independent features. Our use of a Natural Language Processing approach to derive topic-independent features for our new bot detection model distinguishes this work from previous bot detection models. We achieve 94\% accuracy classifying the contents of data as generated by a bot or a human, where the most accurate prior work achieved accuracy of 92\%.Keywords: bot detection, natural language processing, neural network, social media
Procedia PDF Downloads 1182520 Regulation, Supervision and Accounting Conservatism: Interaction of the Three Pillars of Basel II to Achieve Quality of Reporting Earnings in Worldwide Banks
Authors: I. Diaz Sanchez, I. M. Martinez-Conesa, M. Illueca
Abstract:
Accounting conservatism is a desirable quality of earnings that is positively associated with the stridency of regulatory and supervisory regimen and high market discipline. But how these three pillars interact each other is the main research question that is not empirically solved. We analyze how regulatory and supervisory regimes interact with the market discipline measures, such as listing status, ownership and market concentration using a sample of 14,651 bank-year observations covering 54 countries over the period 1997-2009. We evidence that regulation a supervision and extend on which they are enforcement is a strong mechanism to achieved accounting conservatism in those countries or situations where the market discipline fails. Generally, the supervisory power reinforces the effect of listing status, ownership and concentration on conservatism, while capital regulatory mitigates the effect of market discipline on conservatism. This paper may contribute to debate about the mechanism introduced by Basel III that strongly increases the regulation, his enforcement, and the supervisory power after long deregulation period. Although Market discipline is relevant to achieve the financial stability, strong Pillar I and II can ensure the quality of the accounting earnings to prevent bank failures.Keywords: accounting conservatism, bank regulation, bank supervision, loan loss recognition, market discipline
Procedia PDF Downloads 1752519 Development a Battery of Measurements to Assess Giftedness Initiatives in Light of the Objectives of Saudi Arabia's Future Vision of Gifted Education
Authors: Saeed M. Al Qahtani, Alaa Eldin A. Ayoub
Abstract:
The study aimed to develop a battery of measures to assessment gifted initiatives in Saudi Arabia. The battery consisted of 17 measures developed in light of Saudi Arabia's future vision objectives for gifted education. A battery was applied to 193 gifted students who benefit from gifted initiatives and programs, 42 teachers of gifted as well as, 40 experts of gifted. Samples were taken from three main regions: Riyadh, Sharqia, Gharbia in Saudi Arabia. The results indicated that battery measures have a reliability and stability index ranging from 0.6 to 0.87. Besides that, results showed that the educational environment lacks many basic components such as facilities, laboratories, and activities that may stimulate creativity and innovation. Furthermore, results showed that there is a weakness in private sector involvement in the construction of educational buildings, special centers for gifted people and the provision of certain facilities that support talented programs. The recommendations of the study indicate the need for the private sector participation in the provision of services and projects for the care of gifted students in Saudi Arabia.Keywords: battery of measures, gifted care initiatives, Saudi future vision, gifted student
Procedia PDF Downloads 1762518 Visual Text Analytics Technologies for Real-Time Big Data: Chronological Evolution and Issues
Authors: Siti Azrina B. A. Aziz, Siti Hafizah A. Hamid
Abstract:
New approaches to analyze and visualize data stream in real-time basis is important in making a prompt decision by the decision maker. Financial market trading and surveillance, large-scale emergency response and crowd control are some example scenarios that require real-time analytic and data visualization. This situation has led to the development of techniques and tools that support humans in analyzing the source data. With the emergence of Big Data and social media, new techniques and tools are required in order to process the streaming data. Today, ranges of tools which implement some of these functionalities are available. In this paper, we present chronological evolution evaluation of technologies for supporting of real-time analytic and visualization of the data stream. Based on the past research papers published from 2002 to 2014, we gathered the general information, main techniques, challenges and open issues. The techniques for streaming text visualization are identified based on Text Visualization Browser in chronological order. This paper aims to review the evolution of streaming text visualization techniques and tools, as well as to discuss the problems and challenges for each of identified tools.Keywords: information visualization, visual analytics, text mining, visual text analytics tools, big data visualization
Procedia PDF Downloads 4042517 The Effect of Technology in Improving Tourism Cluster Competitveness
Authors: Nancy Ayman Kamal Mohamed Mehrz
Abstract:
Like the economies of other countries in the Mediterranean region, the tourism sector in our country has excellent economic prospects. Tourism companies are building tourism, a sector that faces various challenges in its activities. These problems have made business activities and competition between companies difficult. In this study, which was conducted to identify the problems of the tourism sector in the Central Anatolia region, most of the problems faced by the tourism sector and consumer information on consumer rights were used. The aim is to contribute to the awareness of workers and managers working in the tourism sector and to attract the attention of companies and legislators working in the tourism sector. E-tourism is one of the newest issues in the field of tourism. Infrastructure and Information Technology (or ICT) and partner government and tourism organizations are required to achieve this type of tourism. This study measures the views of managers and tourism managers in Leman City regarding e-tourism; In addition, the effect of the literacy level of the tourism management system on tourist attractions was also examined. This research has been carried out. One of the suburbs of Isfahan province. This research is a documentary research and source material that includes literature and surveys. The results obtained show that if managers use ICT, it can help the development of e-tourism in the region, and increasing managers' views about e-tourism and improving their literacy levels can affect the development of tourism.Keywords: financial problems, the problems of tourism businesses, tourism businesses, internet, marketing, tourism, tourism management economic competitiveness, enhancing competitiveness
Procedia PDF Downloads 612516 Designing a Waste Management System for an Urban Area in Sri Lanka
Authors: R. A. C. K. Gunathilaka, P. T. D. Peiris, O. S. M. Jayawardane, S. M. A. I. Kulathunga
Abstract:
Waste management is one of the predominant aspects of resource utilization and sustainability. The absence of a proper waste management system may lead to adverse troubles and catastrophic tragedies ultimately. Sri Lanka has faced different predicaments for a long time due to the unavailability of a systematic manner in the waste management process. The main objective of this research is to design an efficient waste management system for an urban area in Sri Lanka. The research was dispersed into three categories as biodegradable, non-biodegradable, and hazardous waste. Different waste materials were researched for each category by probing the entire process from the beginning to final disposal for perceiving the prevailing problems in the waste management system. The distinctive segment of this research is comparing efficient foreign waste management strategies with efficacious approaches on increasing public commitment to uncovering cognizable ways of implementing such a system in the Sri Lankan context. Waste management systems in Singapore, Japan, Malaysia, USA, Maldives, and China incorporated their exemplary plan of action on tackling the waste problem in diverse sectors were studied. Ultimately, three coherent models were proposed for each category pertaining to the concepts of circular economy and lean manufacturing from the inception to the final disposal of the waste. This research also includes concealed financial opportunities regarding waste management.Keywords: circular economy, efficient waste management system, lean manufacturing, sustainability, urban area
Procedia PDF Downloads 1752515 Regulating the Emerging Platform Economy in Ethiopia: Issues in the Ride-Hailing Platforms
Authors: Nebiat Lemenih Lenger
Abstract:
Today, the digital economy is evolving faster than ever in Ethiopia. Platforms that provide a ride-hailing service are growing fast in the country. The market welcomed them as they disrupt it with quality services and lower prices. This revolution is, however, not without challenges. These include cybersecurity breaches, facilitating illegal economic activities, and challenging concepts of privacy. To mitigate the risks and utilize the benefits, appropriate regulation should be introduced in the economy. By identifying legal and institutional gaps in Ethiopia`s digital economy, this research work assists the government`s effort to create a better digital economy. Moreover, this study, being a pioneer study in the area, will be an input for further studies in academia. The research employs a qualitative legal research method and analyzes various legal and policy instruments in Ethiopia in comparison with best international experiences. As this research applies a qualitative research method, a grounded theory method of data analysis is used. The research concluded that Ethiopia is far from designing appropriate legal and regulatory infrastructures. Due to the government monopoly of the sector, there is poor digital infrastructure in the country. The existing labor laws have no specific provisions on the rights and obligations of gig workers.Keywords: Ethiopia, gig economy, digital, ride-hailing, regulation
Procedia PDF Downloads 992514 Strategies for Success: Strategic Thinking’s Critical Role in Entrepreneurial
Authors: Silvia Rahmita
Abstract:
Entrepreneurial success is crucial for economic growth, competitiveness, and job creation, yet many entrepreneurs face failure due to various challenges. This paper explores the critical role of strategic thinking in mitigating entrepreneurial failure. Entrepreneurial competencies—encompassing knowledge, skills, and traits—are essential for creating and growing ventures. Despite these competencies, numerous entrepreneurs fail due to poor management, inadequate support, and ineffective policies. The paper categorizes entrepreneurial failures into financial, operational, market, product or service, strategic, leadership, legal, human capital, technological, and environmental failures. Each failure type can be addressed through strategic thinking, which involves foresight, balancing short-term and long-term goals, and hypothesis-driven processes. By integrating strategic thinking into their approach, entrepreneurs can enhance risk management, adapt to market changes, and sustain growth. This process involves setting clear goals, innovating products, and maintaining a competitive edge. Ultimately, strategic thinking provides a framework for proactive planning, adaptation, and continuous improvement, reducing the likelihood of failure and ensuring long-term success. Entrepreneurs who prioritize strategic thinking are better equipped to navigate the complexities of the business environment and achieve sustainable growth.Keywords: entrepreneurial failure, strategic thinking, risk management, business failure
Procedia PDF Downloads 442513 Implementation of an Open Source ERP for SMEs in the Automotive Sector in Peru: A Case Study
Authors: Gerson E. Cornejo, Luis A. Gamarra, David S. Mauricio
Abstract:
The Enterprise Resource Planning Systems (ERP) allows the integration of all the business processes of the functional areas of the companies, in order to automate and standardize the processes, obtain accurate information and improve decision making in time real. In Peru, 79% of medium and small companies (SMEs) do not use any management software, this is because it is believed that ERPs are expensive, complex and difficult to implement. However, for more than 20 years there have been Open Source ERPs, which are more accessible and have the same benefit as proprietary ERPs, but there is little information on the implementation process. In this work is made a case of study, in order to show the implementation process of an Open Source ERP, Odoo, based on the ASAP methodology (Accelerated SAP) and applied to a company of corrective and preventive maintenance services of vehicles. The ERP allowed the SME to standardize its business processes, increase its productivity, reducing up to 40% certain processes. The study of this case shows that it is feasible and profitable to implement an Open Source ERP in SMEs in the Automotive Sector of Peru. In addition, it is shown that the ASAP methodology is adequate to carry out Open Source ERPs implementation projects.Keywords: ASAP, automotive sector, ERP implementation, open source
Procedia PDF Downloads 3392512 Plasmodium falciparum Infection and SARS-CoV-2 Immunoglobulin-G Positivity Rates Among Primary Healthcare Centre Attendees in Osogbo, Nigeria
Authors: Ojo Oo, Akinde S. B., Kiilani A. O., Jayeola Jo, Jogbodo T. M., Ajani Ka, Olaniyan So, Adeagbo Oy, Bolarinwa Ra, Durosomo Ha, Sule W. F.
Abstract:
Lockdown imposed to control SARS-CoV-2 transmission hampered malaria control services in Nigeria. Considering COVID-19 vaccination, we assessed Plasmodium falciparum (Pf) antigen and SARS-CoV-2 immunoglobulin-G (IgG) positivity among adults in Osogbo, Osun State, Nigeria. Consenting attendees of four Healthcare Centres were consecutively enrolled for blood sampling; relevant socio-demographic/behavioral/clinical/environmental data were collected with a questionnaire. Samples were tested, using commercial rapid test kits, for Pf antigen and SARS-CoV-2 IgG and results were analyzed using logistic regression. Participants' mean age was 40.99 years (n=200), and they were predominantly females (84.5%), traders/businessmen/women (86.0%), with self-reported receipt of COVID-19 vaccine from 123 (61.5%). Pf antigen positivity was 17.5% (95% CI: 12.23–22.77%) with age (p=0.004), marital status (p=0.004), report of stagnant water around the workplace (p=0.041) and bush around homes (p=0.008) being associated. SARS-CoV-2 IgG positivity was 56.5% (95% CI: 49.63–63.37%) with age (p=0.012) and receipt of COVID-19 vaccination (p=0.001) being associated. Although the vaccinated had a 22.8 times higher likelihood of IgG positivity, no factor was predictive of COVID-19 vaccine receipt. We report 17.5% Pf antigen positivity with four predictors, and 56.5% SARS-CoV-2 IgG positivity with two predictors.Keywords: COVID-19, vaccine, IgG, Plasmodium falciparum, SARS-CoV-2
Procedia PDF Downloads 1472511 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics
Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood
Abstract:
We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka
Procedia PDF Downloads 3962510 Contextualizing Torture in Closed Institutions
Authors: Erinda Bllaca Ndroqi
Abstract:
The dilemma with which the monitoring professionals are facing in today’s reality is whether to accept that prisons all over the world constitute a place where not all rights are respected (ethical approach), or widen the scope of monitoring by prioritizing the special needs of people deprived of their liberties (human right approach), despite the context and the level of improved prison condition, staff profiling, more services oriented towards rehabilitation instead of punishment. Such dilemma becomes a concern if taking into consideration the fact that prisoners, due to their powerlessness and 'their lives at the hand of the state', are constantly under the threat of abuse of power and neglect, which in the Albanian case, has never been classified as torture. Scientific research in twenty-four (24) Albanian prisons shows that for some rights, prisoners belonging to 'vulnerable groups' such as mental illness, HIV positive status, sexual orientation, and terminal illness remain quite challenged and do not ensure that their basic rights are being met by the current criminal justice system (despite recommendations set forwards to prison authorities by the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT)). The research orients more discussion about policy and strategic recommendations that would need a thorough assessment of the impact of rehabilitation in special categories of prisoners, including recidivists.Keywords: prisons, rehabilitation, torture, vulnerability
Procedia PDF Downloads 1322509 Communication Barriers in Disaster Risk Management
Authors: Pooja Pandey
Abstract:
The role of communication plays an integral part in the management of any disaster, whether natural or human-induced, both require effective and strategic delivery of information. The way any information is conveyed carries the most weight while dealing with the disaster. Hence, integrating communication strategies in disaster risk management (DRM) are extensively acknowledged however, these integration and planning are missing from the practical books. Researchers are continuously exploring integrated DRM and have established substantial vents between research and implementation of the strategies (gaps between science and policy). For this reason, this paper reviews the communication barriers that obstruct effective management of the disaster. Communication between first responders (government agencies, police, medical services) and the public (people directly affected by the disaster) is most critical and lacks proper delivery during a disaster. And these challenges can only be resolved if the foundation of the problem is properly dealt with, which is resolving the issues within the organizations. Through this study, it was found that it is necessary to build the communication gap between the organizations themselves as most of the hindrances occur during the mitigation, preparedness, response and recovery phase of the disaster. The study is concluded with the main aim to review the communication barriers within and at the organizational, technological, and social levels that impact effective DRM. In the end, some suggestions are made to strengthen the knowledge for future improvement in communication between the responders and their organizations.Keywords: communication, organization, barriers, first responders, disaster risk management
Procedia PDF Downloads 3072508 Eat Right Campaign Initiative to Prevent Hypertension Amongst the Corporates in Uganda
Authors: Katanku Denis Musoga
Abstract:
Eat Right Campaign is an initiative that was started by the Nutrition Unit of Uganda Heart Institute with the objective of informing corporate workers in both the Government and Private sectors about how to eat to prevent Hypertension. In Uganda, according to the recent research undertaken by the Ministry of Health, 1 out of 4 adults is hypertensive and yet over 80% of those are not aware. This is attributed largely to poor eating habits influenced by a lack of knowledge. The major objective of the campaign was to demonstrate the need for effective strategic communication among the corporates by organizing workshops that involved dietary education, food demonstrations, and food preparation in an effort to prevent Hypertension. Permission from various Organizations was sought to carry out sensitization and health education while highlighting the significance of reducing financial losses to health care. The Campaign provided strategies for how to influence positive dietary changes. It involved screening for risk factors. A Pretest was given to the staff to ascertain their knowledge of how to eat right to prevent hypertension, and thereafter the campaign, a post-test was given to the same staff. This was done in all the 10 Organizations that we carried out the campaign. Over 80% of the staff had learned significantly and promised to practice what they had learned; also, the majority who had a higher Blood pressure measurement prior to the campaign returned with significantly lower blood pressure. Food demonstrations, preparations, and regular dietary education should be woven into the entire clinical and Public Health practice.Keywords: eat right campaign initiative, corporates, prevent hypertension, dietary education
Procedia PDF Downloads 472507 The Leadership Criterion: Challenges in Pursuing Excellence in the Jordanian Public Sector
Authors: Shaker Aladwan, Paul Forrester
Abstract:
This paper explores the challenges that face leaders when implementing business excellence programmes in the Jordanian public sector. The study adopted a content analysis approach to analyse the excellence assessment reports that have been produced by the King Abdullah II Centre for Excellence (KACE). The sample comprises ten public organisations which have participated in the King Abdullah Award for Excellence (KAA) more than once and acknowledge in their reports that they have failed to achieve satisfactory results. The key challenges to the implementation of leadership criteria in the public sector in Jordan were found to be poor strategic planning, lack of employee empowerment, weaknesses in benchmarking performance, a lack of financial resources, poor integration and coordination, and poor measurement system: This study proposes a conceptual model for the as assessment of challenges that face managers when seeking to implement excellence in leadership in the Jordanian public sector. Theoretically, this paper fills context gaps in the excellence literature in general and organisational excellence in the public sector in particular. Leadership challenges in the public sector are generally widely studied, but it is important to gain a better understanding of how these challenges can be overcome. In comparison to many existing studies, this research has provided specific and detailed insights these organisational excellence challenges in the public sector and provides a conceptual model for use by other researchers into the future.Keywords: leadership criterion, organisational excellence, challenges, quality awards, public sector, Jordan
Procedia PDF Downloads 3932506 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery
Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman
Abstract:
Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.Keywords: CGA, IPv6, NDP, SEND
Procedia PDF Downloads 389