Search results for: crisis computing
1705 The Impact of the Global Financial Crisis on the Performance of Czech Industrial Enterprises
Authors: Maria Reznakova, Michala Strnadova, Lukas Reznak
Abstract:
The global financial crisis that erupted in 2008 is associated mainly with the debt crisis. It quickly spread globally through financial markets, international banks and trade links, and affected many economic sectors. Measured by the index of the year-on-year change in GDP and industrial production, the consequences of the global financial crisis manifested themselves with some delay also in the Czech economy. This can be considered a result of the overwhelming export orientation of Czech industrial enterprises. These events offer an important opportunity to study how financial and macroeconomic instability affects corporate performance. Corporate performance factors have long been given considerable attention. It is therefore reasonable to ask whether the findings published in the past are also valid in the times of economic instability and subsequent recession. The decisive factor in effective corporate performance measurement is the existence of an appropriate system of indicators that are able to assess progress in achieving corporate goals. Performance measures may be based on non-financial as well as on financial information. In this paper, financial indicators are used in combination with other characteristics, such as the firm size and ownership structure. Financial performance is evaluated based on traditional performance indicators, namely, return on equity and return on assets, supplemented with indebtedness and current liquidity indices. As investments are a very important factor in corporate performance, their trends and importance were also investigated by looking at the ratio of investments to previous year’s sales and the rate of reinvested earnings. In addition to traditional financial performance indicators, the Economic Value Added was also used. Data used in the research were obtained from a questionnaire survey administered in industrial enterprises in the Czech Republic and from AMADEUS (Analyse Major Database from European Sources), from which accounting data of companies were obtained. Respondents were members of the companies’ senior management. Research results unequivocally confirmed that corporate performance dropped significantly in the 2010-2012 period, which can be considered a result of the global financial crisis and a subsequent economic recession. It was reflected mainly in the decreasing values of profitability indicators and the Economic Value Added. Although the total year-on-year indebtedness declined, intercompany indebtedness increased. This can be considered a result of impeded access of companies to bank loans due to the credit crunch. Comparison of the results obtained with the conclusions of previous research on a similar topic showed that the assumption that firms under foreign control achieved higher performance during the period investigated was not confirmed.Keywords: corporate performance, foreign control, intercompany indebtedness, ratio of investment
Procedia PDF Downloads 3321704 The Grievances Theory versus Transnationalism and the Cameroon Anglophone Question, 1961-2017
Authors: Nkatow Mafany Christian
Abstract:
No other period in human history has offered such great opportunities for grievances not only to last long but also to be manifested across international boundaries. This state of affairs is likely a common feature of the advent of social media. The Anglophone Question in Cameroon has been a problem of poor constitutional arrangements that can be traced to 1961 when the former French Cameroon reunified with former British Southern Cameroons following a plebiscite in which the latter overwhelmingly voted to reunify with the former. Though Southern/Anglophone Cameroons complained of perceived marginalization and an attempt by the majority French section to assimilate them, the manifestation was subtle and took place only through protests, petitions, strikes movements and demonstrations. However, with the advent of social media, a new cream of leaders emerged in the diaspora, including the US, Canada, Europe, Asia and the Middle East, to champion the manifestations leading to violence and conflicts that have bedeviled the region since 2017. The feeling of political subjugation, economic exploitation, social suppression and cultural assimilation among Anglophone Cameroonians united them under diaspora leaders against the government of Cameroon, calling for the creation of a separate state for Anglophones. This paper draws from this lead-up to analyze the current Anglophone Crisis in Cameroon in the light of the Grievance Theory and Transnationalism. The paper makes an appeal to field experience, interviews, official sources, documentation, and the internet to succor its central thesis. From the fertility of its sources, the paper submits that social media is a potent source of conflicts and makes nonsense of the principle of sovereignty and territorial integrity by its capacity to promote the transnational manifestation of grievances.Keywords: grievance, transnationalism, anglophone crisis, Cameroon, crisis and social media
Procedia PDF Downloads 631703 The Need for Selective Credit Policy Implementation: Case of Croatia
Authors: Drago Jakovcevic, Mihovil Andelinovic, Igor Husak
Abstract:
The aim of this paper is to explore the economic circumstances in which the selective credit policy, the least used instrument of four types of instruments on disposal to central banks, should be used. The most significant example includes the use of selective credit policies in response to the emergence of the global financial crisis by the FED. Specifics of the potential use of selective credit policies as the instigator of economic growth in Croatia, a small open economy, are determined by high euroization of financial system, fixed exchange rate and long-term trend growth of external debt that is related to the need to maintain high levels of foreign reserves. In such conditions, the classic forms of selective credit policies are unsuitable for the introduction. Several alternative approaches to implement selective credit policies are examined in this paper. Also, thorough analysis of distribution of selective monetary policy loans among economic sectors in Croatia is conducted in order to minimize the risk of investing funds and maximize the return, in order to influence the GDP growth.Keywords: global crisis, selective credit policy, small open economy, Croatia
Procedia PDF Downloads 4371702 Revolutionizing Traditional Farming Using Big Data/Cloud Computing: A Review on Vertical Farming
Authors: Milind Chaudhari, Suhail Balasinor
Abstract:
Due to massive deforestation and an ever-increasing population, the organic content of the soil is depleting at a much faster rate. Due to this, there is a big chance that the entire food production in the world will drop by 40% in the next two decades. Vertical farming can help in aiding food production by leveraging big data and cloud computing to ensure plants are grown naturally by providing the optimum nutrients sunlight by analyzing millions of data points. This paper outlines the most important parameters in vertical farming and how a combination of big data and AI helps in calculating and analyzing these millions of data points. Finally, the paper outlines how different organizations are controlling the indoor environment by leveraging big data in enhancing food quantity and quality.Keywords: big data, IoT, vertical farming, indoor farming
Procedia PDF Downloads 1751701 A Review on Big Data Movement with Different Approaches
Authors: Nay Myo Sandar
Abstract:
With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques
Procedia PDF Downloads 861700 A Soft Computing Approach Monitoring of Heavy Metals in Soil and Vegetables in the Republic of Macedonia
Authors: Vesna Karapetkovska Hristova, M. Ayaz Ahmad, Julijana Tomovska, Biljana Bogdanova Popov, Blagojce Najdovski
Abstract:
The average total concentrations of heavy metals; (cadmium [Cd], copper [Cu], nickel [Ni], lead [Pb], and zinc [Zn]) were analyzed in soil and vegetables samples collected from the different region of Macedonia during the years 2010-2012. Basic soil properties such as pH, organic matter and clay content were also included in the study. The average concentrations of Cd, Cu, Ni, Pb, Zn in the A horizon (0-30 cm) of agricultural soils were as follows, respectively: 0.25, 5.3, 6.9, 15.2, 26.3 mg kg-1 of soil. We have found that neural networking model can be considered as a tool for prediction and spatial analysis of the processes controlling the metal transfer within the soil-and vegetables. The predictive ability of such models is well over 80% as compared to 20% for typical regression models. A radial basic function network reflects good predicting accuracy and correlation coefficients between soil properties and metal content in vegetables much better than the back-propagation method. Neural Networking / soft computing can support the decision-making processes at different levels, including agro ecology, to improve crop management based on monitoring data and risk assessment of metal transfer from soils to vegetables.Keywords: soft computing approach, total concentrations, heavy metals, agricultural soils
Procedia PDF Downloads 3671699 Tax Avoidance During The Financial Crisis: Role Of Independent Commissioners And External Auditors
Authors: Yasir Ramadhan
Abstract:
This study aims to investigate tax avoidance practices when a financial crisis occurs due to the effects of the COVID-19 pandemic. This study also finds out how the influence of independent commissioners and external auditors on tax avoidance practices during the COVID-19 pandemic. Tax avoidance practices are measured by the current ETR. The role of the independent board of commissioners is measured by the proportion of independent commissioners in the composition of the board of commissioners, while the external auditor is measured by audit quality. In this study, there were 342 observations of companies listed on the Indonesia Stock Exchange from 2019 to 2020. This study used the difference-in-differences (DiD) method in data analysis. The results of this study indicate that companies do tax avoidance during the COVID-19 pandemic. Meanwhile, independent commissioners and qualified audits are not proven to be able to negate tax avoidance practices during the COVID-19 Pandemic. These results also show that a higher proportion of independent commissioners and audit quality are not sufficient for countries with low levels of auditor litigation and investor protection and weak regulatory frameworks.Keywords: audit, commissioner, tax avoidance, COVID-19 pandemic
Procedia PDF Downloads 1471698 The Applicability of General Catholic Canon Law during the Ongoing Migration Crisis in Hungary
Authors: Lorand Ujhazi
Abstract:
The vast majority of existing canonical studies about migration are focused on examining the general pastoral and legal regulations of the Catholic Church. The weakness of this approach is that it ignores a number of important factors; like the financial, legal and personal circumstances of a particular church or the canonical position of certain organizations which actually look after the immigrants. This paper is a case study, which analyses the current and historical migration related policies and activities of the Catholic Church in Hungary. To achieve this goal the study uses canon law, historical publications, various instructions and communications issued by church superiors, Hungarian and foreign media reports and the relevant Hungarian legislation. The paper first examines how the Hungarian Catholic Church assisted migrants like Armenians fleeing from the Ottoman Empire, Poles escaping during the Second World War, East German and Romanian citizens in the 1980s and refugees from the former Yugoslavia in the 1990s. These events underline the importance of past historical experience in the development of contemporary pastoral and humanitarian policy of the Catholic Church in Hungary. Then the paper turns to the events of the ongoing crisis by describing the unique challenges faced by churches in transit countries like Hungary. Then the research contrasts these findings with the typical responsibilities of churches in countries which are popular destinations for immigrants. The next part of the case study focuses on the changes to the pre-crisis legal and canonical framework which influenced the actions of hierarchical and charity organizations in Hungary. Afterwards, the paper illustrates the dangers of operating in an unclear legal environment, where some charitable activities of the church like a fundraising campaign may be interpreted as a national security risk by state authorities. Then the paper presents the reactions of Hungarian academics to the current migration crisis and finally it offers some proposals how to improve parts of Canon Law which govern immigration. The conclusion of the paper is that during the formulation of the central refugee policy of the Catholic Church decision makers must take into consideration the peculiar circumstances of its particular churches. This approach may prevent disharmony between the existing central regulations, the policy of the Vatican and the operations of the local church organizations.Keywords: canon law, Catholic Church, civil law, Hungary, immigration, national security
Procedia PDF Downloads 3081697 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan
Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed
Abstract:
This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis
Procedia PDF Downloads 721696 Emerging Technology for Business Intelligence Applications
Authors: Hsien-Tsen Wang
Abstract:
Business Intelligence (BI) has long helped organizations make informed decisions based on data-driven insights and gain competitive advantages in the marketplace. In the past two decades, businesses witnessed not only the dramatically increasing volume and heterogeneity of business data but also the emergence of new technologies, such as Artificial Intelligence (AI), Semantic Web (SW), Cloud Computing, and Big Data. It is plausible that the convergence of these technologies would bring more value out of business data by establishing linked data frameworks and connecting in ways that enable advanced analytics and improved data utilization. In this paper, we first review and summarize current BI applications and methodology. Emerging technologies that can be integrated into BI applications are then discussed. Finally, we conclude with a proposed synergy framework that aims at achieving a more flexible, scalable, and intelligent BI solution.Keywords: business intelligence, artificial intelligence, semantic web, big data, cloud computing
Procedia PDF Downloads 941695 A 'German Europe' Emerged from the Euro Crisis: A Study through the Portuguese Quality Press
Authors: Ana Luísa Mouro
Abstract:
When the financial crisis exploded in 2008 in the United States, unleashed by the collapse of Lehman Brothers, and contaminated the economies of the European periphery, Germany appeared as the anchor of the stability of all European institutions and countries in difficulty. The solutions provided by the German government have triggered a deep political debate about the key position Germany has conquered at the heart of Europe - a new “German question” has been created. Some say Germany has achieved by peaceful means what was not able to get through military conquest - the domination of Europe – and many fear Germany’s economic power. This debate about the new role of Germany in Europe has received special attention in the European media and Portugal has not been the exception. The present study has been based on the survey, selection and critical analysis of news reporting, opinion articles, interviews and editorials, published in the weekly Expresso and in the daily Público, between 2008 and 2015 (year of the 25th anniversary of Germany’s unification). The findings of this study will show the paradox of German power and its relevance for Europe’s future.Keywords: Euro crises, German Europe, intercultural hermeneutics, Portuguese quality press
Procedia PDF Downloads 2381694 Keynote Talk: The Role of Internet of Things in the Smart Cities Power System
Authors: Abdul-Rahman Al-Ali
Abstract:
As the number of mobile devices is growing exponentially, it is estimated to connect about 50 million devices to the Internet by the year 2020. At the end of this decade, it is expected that an average of eight connected devices per person worldwide. The 50 billion devices are not mobile phones and data browsing gadgets only, but machine-to-machine and man-to-machine devices. With such growing numbers of devices the Internet of Things (I.o.T) concept is one of the emerging technologies as of recently. Within the smart grid technologies, smart home appliances, Intelligent Electronic Devices (IED) and Distributed Energy Resources (DER) are major I.o.T objects that can be addressable using the IPV6. These objects are called the smart grid internet of things (SG-I.o.T). The SG-I.o.T generates big data that requires high-speed computing infrastructure, widespread computer networks, big data storage, software, and platforms services. A company’s utility control and data centers cannot handle such a large number of devices, high-speed processing, and massive data storage. Building large data center’s infrastructure takes a long time, it also requires widespread communication networks and huge capital investment. To maintain and upgrade control and data centers’ infrastructure and communication networks as well as updating and renewing software licenses which collectively, requires additional cost. This can be overcome by utilizing the emerging computing paradigms such as cloud computing. This can be used as a smart grid enabler to replace the legacy of utilities data centers. The talk will highlight the role of I.o.T, cloud computing services and their development models within the smart grid technologies.Keywords: intelligent electronic devices (IED), distributed energy resources (DER), internet, smart home appliances
Procedia PDF Downloads 3231693 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 3341692 D-Wave Quantum Computing Ising Model: A Case Study for Forecasting of Heat Waves
Authors: Dmytro Zubov, Francesco Volponi
Abstract:
In this paper, D-Wave quantum computing Ising model is used for the forecasting of positive extremes of daily mean air temperature. Forecast models are designed with two to five qubits, which represent 2-, 3-, 4-, and 5-day historical data respectively. Ising model’s real-valued weights and dimensionless coefficients are calculated using daily mean air temperatures from 119 places around the world, as well as sea level (Aburatsu, Japan). In comparison with current methods, this approach is better suited to predict heat wave values because it does not require the estimation of a probability distribution from scarce observations. Proposed forecast quantum computing algorithm is simulated based on traditional computer architecture and combinatorial optimization of Ising model parameters for the Ronald Reagan Washington National Airport dataset with 1-day lead-time on learning sample (1975-2010 yr). Analysis of the forecast accuracy (ratio of successful predictions to total number of predictions) on the validation sample (2011-2014 yr) shows that Ising model with three qubits has 100 % accuracy, which is quite significant as compared to other methods. However, number of identified heat waves is small (only one out of nineteen in this case). Other models with 2, 4, and 5 qubits have 20 %, 3.8 %, and 3.8 % accuracy respectively. Presented three-qubit forecast model is applied for prediction of heat waves at other five locations: Aurel Vlaicu, Romania – accuracy is 28.6 %; Bratislava, Slovakia – accuracy is 21.7 %; Brussels, Belgium – accuracy is 33.3 %; Sofia, Bulgaria – accuracy is 50 %; Akhisar, Turkey – accuracy is 21.4 %. These predictions are not ideal, but not zeros. They can be used independently or together with other predictions generated by different method(s). The loss of human life, as well as environmental, economic, and material damage, from extreme air temperatures could be reduced if some of heat waves are predicted. Even a small success rate implies a large socio-economic benefit.Keywords: heat wave, D-wave, forecast, Ising model, quantum computing
Procedia PDF Downloads 4971691 Legal Initiatives for Afghan Humanitarian Crisis
Authors: Fereshteh Ganjavi, Rachel Schaffer, Varsha Jorawar
Abstract:
Elena’s Light is a non-profit organization focused on building brighter futures for refugees, especially women and children. Our mission is to empower refugee women and children by addressing social, legal, and public health issues that predominantly concern them. Elena’s Light offers a range of services that support refugees from structural disadvantages, cultural and social stress, marginalization, and other stressors related to migration. Using a three-pronged approach, our programs focus on legal advocacy, English language acquisition, and health and wellness. Following the Afghan humanitarian crisis, Elena’s Light has developed and intensified advocacy efforts in the legal realm to address the influx of refugees who desperately need assistance. We developed and hosted a Know Your Rights presentation with local immigration lawyers and professionals in February 2022 on the Afghan Humanitarian Parole, which was very successful with over 100 attendees. Elena’s Light is hosting the second Know Your Rights session in early August 2022 on immigration options for Afghans, including Temporary Protected Status (TPS), asylum, Special Immigrant Visa (SIV), and humanitarian parole. Lastly, EL is also leading the local initiative to develop a pro-bono committee to respond to the overwhelming need for lawyers to work on legal cases for Afghan during this crisis. Furthermore, through our other services, we provide free, in-home customizable ESL tutoring sessions to refugee women with a focus on driver’s education, facilitating acculturation, and improving employment opportunities. We also provide in-home maternal, pediatric, and mental health education and wellness services that are aimed at addressing the explicit and implicit barriers to healthcare for refugee populations. Elena’s Light’s diverse community aims to counter the structural disadvantages and anxiety-inducing emotions and experiences related to being a refugee. We would like to join this International Conference on Refugee Law since protecting refugee rights is our mission. We would like to share what we have learned from our legal initiatives for refugee rights. We would also like to listen, learn from, and discuss with experts and researchers how to better understand and advocate for refugee rights. We hope to improve our understanding of how to provide better legal aid for our clients through this conference.Keywords: legal, advocacy, Afghan humanitarian crisis, policy, pro-bono
Procedia PDF Downloads 1341690 Migration Law in Republic of Panama
Authors: Ronel Solis, Leonardo Collado
Abstract:
Migration law in the Republic of Panama has been regulated mainly by the executive branch. This has created a crisis not only institutional but also social because the evolution of these norms has rested greatly from the discretion of the government in office. This has created instability in immigration regulation and more now, with the migration crisis of which Panama is also part. Different migration policies have been established. The most recent is that of the controlled migration flow, in which, for humanitarian reasons, migrants move from the border with Colombia to the border with Costa Rica. Unfortunately, such control is not enough, and in some cases, unprotected migrants have been confined for months, their passports have been withheld, and no recognition of their rights is offered. The Inter-American Court of Human Rights has condemned Panama for the unfair detention of an irregular migrant, who was detained for two years in Panamanian prisons, without having committed a crime and without accessing a just defense. This is the case Vélez Loor vs. the Republic of Panama. Uncontrollable migration has been putting pressure on Panamanian public health services. The recent denunciation of HIV-related NGOs that warns that there are hundreds of foreigners who receive expensive antiretroviral therapy in Panama is serious, and several of them are irregular migrants. On the other hand, there are no border control posts with the Republic of Colombia, because it is a jungle area and migrants are exposed to arms and drug trafficking, and unfortunately, also to prostitution. Government entities such as the border police service have provided humanitarian support to migrants on the border with Colombia, although it is not their administrative function, and various entities discuss who should address this crisis. However, few economic resources are allocated by the government to solve this problem, especially with the recent mass migration of Venezuelans who have fled their country. The establishment of a migratory normative code is necessary to establish uniformity in the recognition and application of migratory rights. In this way, dependence on the changing migration policies of the different Panamanian governments would be eliminated, and the rights of migrants and nationals would be guaranteed.Keywords: executive branch, irregular migration, migration code, Republic of Panama
Procedia PDF Downloads 1231689 Audio Information Retrieval in Mobile Environment with Fast Audio Classifier
Authors: Bruno T. Gomes, José A. Menezes, Giordano Cabral
Abstract:
With the popularity of smartphones, mobile apps emerge to meet the diverse needs, however the resources at the disposal are limited, either by the hardware, due to the low computing power, or the software, that does not have the same robustness of desktop environment. For example, in automatic audio classification (AC) tasks, musical information retrieval (MIR) subarea, is required a fast processing and a good success rate. However the mobile platform has limited computing power and the best AC tools are only available for desktop. To solve these problems the fast classifier suits, to mobile environments, the most widespread MIR technologies, seeking a balance in terms of speed and robustness. At the end we found that it is possible to enjoy the best of MIR for mobile environments. This paper presents the results obtained and the difficulties encountered.Keywords: audio classification, audio extraction, environment mobile, musical information retrieval
Procedia PDF Downloads 5441688 Mapping Identity: Algerian Diasporic Voices in Literature
Authors: Salma Kaouthar Letaief
Abstract:
This article investigates the experience of diaspora in the writings of Algerian diasporic writers, namely: Leila Sebbar’s Silence on the Shores (2000), Keltoum Staali’ December’s Mimosa (2012). The study discusses the collective trauma of violence in Algeria and overseas. The experience of displacement of the characters to an alien territory compel their journey with issues related to nostalgia, identity crisis, alienation, racism, and in-betweeness. The focus in this research is, thus, on Algerian immigrants’ experience in the host country and their psychological conflicts. The theories Multiculturalism and Psychoanalysis are used to analyse the novels in this paper. While Multiculturalism examines how characters negotiate and navigate their identities in multicultural settings, Psychoanalysis enables the analysis of how characters in diasporic novels grapple with issues of identity, belonging, and self-discovery. Hence, interweaving multiculturalism and psychoanalysis provides an interdisciplinary framework that addresses both the socio-cultural and psychological aspects of the diasporic experience. Accordingly, this paper is an attempt to examine the diasporic experience and cultural dialectics.Keywords: diaspora, algerian diasporic writers, trauma, algeria, displacement, identity crisis, cultural dialects
Procedia PDF Downloads 3071687 A Novel Approach to Design and Implement Context Aware Mobile Phone
Authors: G. S. Thyagaraju, U. P. Kulkarni
Abstract:
Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability
Procedia PDF Downloads 3651686 Analyzing Large Scale Recurrent Event Data with a Divide-And-Conquer Approach
Authors: Jerry Q. Cheng
Abstract:
Currently, in analyzing large-scale recurrent event data, there are many challenges such as memory limitations, unscalable computing time, etc. In this research, a divide-and-conquer method is proposed using parametric frailty models. Specifically, the data is randomly divided into many subsets, and the maximum likelihood estimator from each individual data set is obtained. Then a weighted method is proposed to combine these individual estimators as the final estimator. It is shown that this divide-and-conquer estimator is asymptotically equivalent to the estimator based on the full data. Simulation studies are conducted to demonstrate the performance of this proposed method. This approach is applied to a large real dataset of repeated heart failure hospitalizations.Keywords: big data analytics, divide-and-conquer, recurrent event data, statistical computing
Procedia PDF Downloads 1651685 Systemic Functional Linguistics in the Rhetorical Strategies of Persuasion: A Longitudinal Study of Transitivity and Ergativity in the Rhetoric of Saras’ Sustainability Reports
Authors: Antonio Piga
Abstract:
This study explores the correlation between Systemic Functional Linguistics (SFL) and Critical Discourse Analysis (CDA) as tools for analysing the evolution of rhetoric in the communicative strategies adopted in a company’s Reports on social and environmental responsibility. In more specific terms, transitivity and ergativity- concepts from Systemic Functional Linguistics (SFL) - through the lenses of CDA, are employed as a theoretical means for the analysis of a longitudinal study in the communicative strategies employed by Saras SpA pre- and during the Covid-19 pandemic crisis. Saras is an Italian joint-stock company operating in oil refining and power generation. The qualitative and quantitative linguistic analysis carried out through the use of Sketch Engine software aims to identify and explain how rhetoric - and ideology - is constructed and presented through language use in Saras SpA Sustainability Reports. Specific focus is given to communication strategies to local and global communities and stakeholders in the years immediately before and during the Covid-19 pandemic. The rationale behind the study lies in the fact that 2020 and 2021 have been among the most difficult years since the end of World War II. Lives were abruptly turned upside down by the pandemic, which had grave negative effects on people’s health and on the economy. The result has been a threefold crisis involving health, the economy and social tension, with the refining sector being one of the hardest hit, since the oil refining industry was one of the most affected industries due to the general reduction in mobility and oil consumption brought about by the virus-fighting measures. Emphasis is placed on the construction of rhetorical strategies pre- and during the pandemic crisis using the representational process of transitivity and ergativity (SFL), thus revealing the close relationship between the use language in terms of Social Actors and semantic roles of syntactic transformation on the one hand, and ideological assumptions on the other. The results show that linguistic decisions regarding transitivity and ergativity choices play a crucial role in how effective writing achieves its rhetorical objectives in terms of spreading and maintaining dominant and implicit ideologies and underlying persuasive actions, and that some ideological motivation is perpetuated – if not actually overtly or subtly strengthened - in social-environmental Reports issued in the midst of the Covid-19 pandemic crisis.Keywords: systemic functional linguistics, sustainability, critical discourse analysis, transitivity, ergativity
Procedia PDF Downloads 1071684 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia
Authors: Logan Carmichael
Abstract:
As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis
Procedia PDF Downloads 1121683 The Role of Islamic Social Finance in Mitigating the Poverty Levels in the Post-Pandemic Period
Authors: Mohammad Enayet Hossain, Nur Farhah Mahadi
Abstract:
The global COVID-19 pandemic has contaminated millions of people at a startling rate. The COVID-19 pandemic came out of mediocre and has since spread all over the world, causing to record 5 million deaths worldwide in just a few months. The economic crisis has triggered a global contraction, leading to an economic collapse expected over 2020-2021. This study examines whether Islamic social finance can effectively mitigate the dangers of humanitarian catastrophes. The study provides a multirange method for maximizing the advantage of Islamic social financings tools such as zakat and waqf. The information, documents, and data for this study are gathered using a qualitative method. The study employed ongoing research, literature review, news stories, reports, and trusted online sources. Eventually, this may add to knowledge by examining the role of Islamic social finance in the current Covid-19 crisis. The findings have consequences for governments and policymakers who want to solve the COVID-19 problem with Islamic social finance ideas and solutions, thereby enhancing people's social well-being and the global economy's development.Keywords: covid-19 pandemic, Islamic social finance, zakat, waqf
Procedia PDF Downloads 1081682 Debts and Debt-Based Sukuk Related to Risk Shifting Behavior
Authors: Siti Raihana Hamzah
Abstract:
This paper elaborates risk shifting in debt financing system as the ultimate cause of the global financial crisis. In contrast, risk sharing in equity financing like sukuk helps the economic system to be better sustained. Nevertheless, some types of sukuk are haunted by the issue of imitation with bonds. The critics on the imitation issue not only have raised doubt on the ability of sukuk to diminish risk shifting behavior but also the ability of this Islamic financial instrument to ensure better future financial stability. Through that, this paper provides discussion on the possibility of sukuk to induce risk shifting and how equity financing may help sukuk to be free from risk shifting. This paper is important in the sense that sukuk receives a significant demand from investors throughout the world. For this instrument to be supportive in the future economic stability, the issue of imitation needs to be identified and addressed. Furthermore, critics cannot be focused on debts and its ability to gauge the financial flux but also to sukuk due to their structures similarity.Keywords: global financial crisis, debt, risk-shifting, risk sharing, equity, sukuk, bonds
Procedia PDF Downloads 3861681 Time Variance and Spillover Effects between International Crude Oil Price and Ten Emerging Equity Markets
Authors: Murad A. Bein
Abstract:
This paper empirically examines the time-varying relationship and spillover effects between the international crude oil price and ten emerging equity markets, namely three oil-exporting countries (Brazil, Mexico, and Russia) and seven Central and Eastern European (CEE) countries (Bulgaria, Croatia, Czech Republic, Hungary, Poland, Romania, and Slovakia). The results revealed that there are spillover effects from oil markets into almost all emerging equity markets save Slovakia. Besides, the oil supply glut had a homogenous effect on the emerging markets, both net oil-exporting, and oil-importing countries (CEE). Further, the time variance drastically increased during financial turmoil. Indeed, the time variance remained high from 2009 to 2012 in response to aggregate demand shocks (global financial crisis and Eurozone debt crisis) and quantitative easing measures. Interestingly, the time variance was slightly higher for the oil-exporting countries than for some of the CEE countries. Decision-makers in emerging economies should therefore seek policy coordination when dealing with financial turmoil.Keywords: crude oil, spillover effects, emerging equity, time-varying, aggregate demand shock
Procedia PDF Downloads 1241680 Make Populism Great Again: Identity Crisis in Western World with a Narrative Analysis of Donald Trump's Presidential Campaign Announcement Speech
Authors: Soumi Banerjee
Abstract:
In this research paper we will go deep into understanding Benedict Anderson’s definition of the nation as an imagined community and we will analyze why and how national identities were created through long and complex processes, and how there can exist strong emotional bonds between people within an imagined community, given the fact that these people have never known each other personally, but will still feel some form of imagined unity. Such identity construction on the part of an individual or within societies are always in some sense in a state of flux as imagined communities are ever changing, which provides us with the ontological foundation for reaching on this paper. This sort of identity crisis among individuals living in the Western world, who are in search for psychological comfort and security, illustrates a possible need for spatially dislocated, ontologically insecure and vulnerable individuals to have a secure identity. To create such an identity there has to be something to build upon, which could be achieved through what may be termed as ‘homesteading’. This could in short, and in my interpretation of Kinnvall and Nesbitt’s concept, be described as a search for security that involves a search for ‘home’, where home acts as a secure place, which one can build an identity around. The next half of the paper will then look into how populism and identity have played an increasingly important role in the political elections in the so-called western democracies of the world, using the U.S. as an example. Notions of ‘us and them’, the people and the elites will be looked into and analyzed through a social constructivist theoretical lens. Here we will analyze how such narratives about identity and the nation state affects people, their personality development and identity in different ways by studying the U.S. President Donald Trump’s speeches and analyze if and how he used different identity creating narratives for gaining political and popular support. The reason to choose narrative analysis as a method in this research paper is to use the narratives as a device to understand how the perceived notions of 'us and them' can initiate huge identity crisis with a community or a nation-state. This is a relevant subject as results and developments such as rising populist rightwing movements are being felt in a number of European states, with the so-called Brexit vote in the U.K. and the election of Donald Trump as president are two of the prime examples. This paper will then attempt to argue that these mechanisms are strengthened and gaining significance in situations when humans in an economic, social or ontologically vulnerable position, imagined or otherwise, in a general and broad meaning perceive themselves to be under pressure, and a sense of insecurity is rising. These insecurities and sense of being under threat have been on the rise in many of the Western states that are otherwise usually perceived to be some of the safest, democratically stable and prosperous states in the world, which makes it of interest to study what has changed, and help provide some part of the explanation as to how creating a ‘them’ in the discourse of national identity can cause massive security crisis.Keywords: identity crisis, migration, ontological security(in), nation-states
Procedia PDF Downloads 2551679 Cash Flow Optimization on Synthetic CDOs
Authors: Timothée Bligny, Clément Codron, Antoine Estruch, Nicolas Girodet, Clément Ginet
Abstract:
Collateralized Debt Obligations are not as widely used nowadays as they were before 2007 Subprime crisis. Nonetheless there remains an enthralling challenge to optimize cash flows associated with synthetic CDOs. A Gaussian-based model is used here in which default correlation and unconditional probabilities of default are highlighted. Then numerous simulations are performed based on this model for different scenarios in order to evaluate the associated cash flows given a specific number of defaults at different periods of time. Cash flows are not solely calculated on a single bought or sold tranche but rather on a combination of bought and sold tranches. With some assumptions, the simplex algorithm gives a way to find the maximum cash flow according to correlation of defaults and maturities. The used Gaussian model is not realistic in crisis situations. Besides present system does not handle buying or selling a portion of a tranche but only the whole tranche. However the work provides the investor with relevant elements on how to know what and when to buy and sell.Keywords: synthetic collateralized debt obligation (CDO), credit default swap (CDS), cash flow optimization, probability of default, default correlation, strategies, simulation, simplex
Procedia PDF Downloads 2741678 Towards a Resources Provisioning for Dynamic Workflows in the Cloud
Authors: Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem
Abstract:
Cloud computing offers a new model of service provisioning for workflow applications, thanks to its elasticity and its paying model. However, it presents various challenges that need to be addressed in order to be efficiently utilized. The resources provisioning problem for workflow applications has been widely studied. Nevertheless, the existing works did not consider the change in workflow instances while they are being executed. This functionality has become a major requirement to deal with unusual situations and evolution. This paper presents a first step towards the resources provisioning for a dynamic workflow. In fact, we propose a provisioning algorithm which minimizes the overall workflow execution cost, while meeting a deadline constraint. Then, we extend it to support the dynamic adding of tasks. Experimental results show that our proposed heuristic demonstrates a significant reduction in resources cost by using a consolidation process.Keywords: cloud computing, resources provisioning, dynamic workflow, workflow applications
Procedia PDF Downloads 2951677 Inclusion and Changes of a Research Criterion in the Institute for Quality and Accreditation of Computing, Engineering and Technology Accreditation Model
Authors: J. Daniel Sanchez Ruiz
Abstract:
The paper explains why and how a research criterion was included within an accreditation system for undergraduate engineering programs, in spite of not being a common practice of accreditation agencies at a global level. This paper is divided into three parts. The first presents the context and the motivations that led the Institute for Quality and Accreditation of Computing, Engineering and Technology Programs (ICACIT) to add a research criterion. The second describes the criterion adopted and the feedback received during 2017 accreditation cycle. The third, the author proposes changes to the accreditation criteria that respond in a pertinent way to the results-based accreditation model and the national context. The author seeks to reconcile an outcome based accreditation model, aligned with the established by the International Engineering Alliance, with the particular context of higher education in Peru.Keywords: accreditation, engineering education, quality assurance, research
Procedia PDF Downloads 2811676 Optimization of Topology-Aware Job Allocation on a High-Performance Computing Cluster by Neural Simulated Annealing
Authors: Zekang Lan, Yan Xu, Yingkun Huang, Dian Huang, Shengzhong Feng
Abstract:
Jobs on high-performance computing (HPC) clusters can suffer significant performance degradation due to inter-job network interference. Topology-aware job allocation problem (TJAP) is such a problem that decides how to dedicate nodes to specific applications to mitigate inter-job network interference. In this paper, we study the window-based TJAP on a fat-tree network aiming at minimizing the cost of communication hop, a defined inter-job interference metric. The window-based approach for scheduling repeats periodically, taking the jobs in the queue and solving an assignment problem that maps jobs to the available nodes. Two special allocation strategies are considered, i.e., static continuity assignment strategy (SCAS) and dynamic continuity assignment strategy (DCAS). For the SCAS, a 0-1 integer programming is developed. For the DCAS, an approach called neural simulated algorithm (NSA), which is an extension to simulated algorithm (SA) that learns a repair operator and employs them in a guided heuristic search, is proposed. The efficacy of NSA is demonstrated with a computational study against SA and SCIP. The results of numerical experiments indicate that both the model and algorithm proposed in this paper are effective.Keywords: high-performance computing, job allocation, neural simulated annealing, topology-aware
Procedia PDF Downloads 116