Search results for: impersonal trust
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 769

Search results for: impersonal trust

289 Effects of Tillage and Crop Residues Management in Improving Rainfall-Use Efficiency in Dryland Crops under Sandy Soils

Authors: Cosmas Parwada, Ronald Mandumbu, Handseni Tibugari, Trust Chinyama

Abstract:

A 3-yr field experiment to evaluate effects of tillage and residue management on soil water storage (SWS), grain yield, harvest index (HI) and water use efficiency (WUE) of sorghum was done in sandy soils. Treatments were conventional (CT) and minimum (MT) tillage without residue retention and conventional (CT × RT) and minimum (MT × RT) tillage with residue retention. Change in SWS was higher under CT and MT than in CT × RT and MT × RT, especially in the 0-10 cm soil layer. Grain yield and HI were significantly (P < 0.05) lower in CT and MT than CT × RT and MT × RT. Grain yield and HI were significantly (P < 0.05) positively correlated to WUE but WUE significantly (P < 0.05) negatively correlated to sand (%) particle content. The SWS was lower in winter but higher in summer and was significantly correlated to soil organic carbon (SOC), sand (%), grain yield (t/ha), HI and WUE. The WUE linearly increasing from first to last cropping seasons in tillage with returned residues; higher in CT × RT and MT × RT that promoted SOC buildup than where crop residues were removed. Soil tillage decreased effects of residues on SWS, WUE, grain yield and HI. Minimum tillage coupled to residue retention sustainably enhanced WUE but further research to investigate the interaction effects of the tillage on WUE and soil fertility management is required. Understanding and considering the WUE in crops can be a primary condition for cropping system designs. The findings pave way for further research and crop management programmes, allowing to valorize the water in crop production.

Keywords: evapotranspiration, infiltration rate, organic mulch, sand, water use efficiency

Procedia PDF Downloads 214
288 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 145
287 Fighting Competition Stress by Focusing the Psychological Training on the Vigor-Activity Mood States

Authors: Majid Al-Busafi, Alexe Cristina Ioana, Alexe Dan Iulian

Abstract:

The specific competition and pre-competition stress in professional track and field determined an increasing engagement, from a biological and psychological point of view, of the middle distance and long distance runners, to obtain the top performances that would get them to win in a competition. Under these conditions, if the psychological stress is not properly managed, the negative effects can lead to a total drop in self-confidence, and can affect the value, the talent, and the self-trust, which generates an even higher stress. One of the means at our disposal is the psychological training, specially adapted to the athlete's individual characteristics, to the characteristics of the athletic event, or of the competition. This paper aims to highlight certain original aspects regarding the effects of a specific psychological training program on the mood states characterized by psychological activation, vigor, vitality. The subjects were represented by 12 professional middle distance and long distance runners, subjected to an applicative intervention to which they have participated voluntarily, over the course of 6 months (a competition season). The results indicated that The application of a psychological training program, adapted to the track and field competition system, over a period of time characterized by high competition stress, can determine an increase in the states of vigor and psychological activation, at the same time diminishing those moods that have negative effects on the performance, in the middle distance and long distance running events. This conclusion confirms the hypothesis of this research.

Keywords: competition stress, psychological training, track and field, vigor-activity

Procedia PDF Downloads 458
286 Exploring the Impact of Transformational Collegial Leadership in Organizations

Authors: Prakash Singh

Abstract:

Far-reaching organizational and structural changes are required to address the severe imbalances in the provision and strong bureaucratic controls in many organizations at all levels. Transformational collegial leadership (TCL) is a collective action generated by transforming leadership which empowers all individuals who participate in this process, whether it is in business or education, or in any other organization. Recent research is strongly supportive of collegiality as a key factor in transforming traditional bureaucratic management practices (TBMPs) in organizations. The primary objective of this study was therefore to gauge the extent to which organizations have affected a shift from TBMPs towards TCL and how this can affect the development of human resources. This qualitative study investigated the impact of TCL on developing human resources in two organizations which were purposively selected to participate in this study. The findings of this study affirm that human resource development and TCL embrace the values of collaboration, confrontation, authenticity, trust, support and openness. In order to overcome TBMPs, a clear sense of direction must be communicated by collegial leaders throughout their organizations so that lower-level employees can initiate actions without the same degree of vulnerability. The TCL approach must respond to needs amongst followers and must look for motives, extrinsic and intrinsic, to satisfy those needs by enhancing opportunities, empowering people and giving more freedom, performance evaluation and the full support of the leader. Evidently, the collegial model emphasizes the valuing of individuals where there is a breadth of leadership and an absence of hierarchy.

Keywords: bureaucratic management model, human resource development, transformational collegial leadership model, transforming leader

Procedia PDF Downloads 431
285 Islamic Banking and Finance in Theory and Practice: The Experience of Malaysia and Algeria

Authors: Zidane Abderrezaq

Abstract:

This paper’s primary objective is to identify the relative importance of various Islamic financial products, in theory and in practice, by examining the financing records of the Bank Islam Malaysia (Berhad) and the Algeria Islamic Bank. Currently, seven available Islamic financing products are considered viable alternatives to interest-based conventional contracts: mudarabah (trust financing), musharakah (equity financing), ijarah (lease financing), murabahah (trade financing), qard al-hassan (welfare loan), bay` bi al-thaman al-ajil (deferred payment financing), and istisna` (progressive payments). Among these financial products, mudarabah and musharakah are the most distinct. Their unique characteristics (at least in theory) make Islamic banks and Islamic financing viable alternatives to the conventional interest-based financial system. The question before us is to determine the extent of mudarabah and musharakah in Islamic financing in practice. The data are as follows: the average mudarabah is 5% of total financing, and the average musharakah is less than 3%. The combined average of mudarabah and musharakah for the two Islamic banks is less than 4% of the total finance and advances. The average qard al-hassan is about 4%, while istisna` does not yet exist in practice. Murabahah is the most popular and dominates all other modes of Islamic financing. The average use of murabahah is over 54%. When the bay` bi al-thaman al-ajil is added to the murabahah, the percentage of total financing is shown to be 82.68%. This paper also explores some possible reasons why these two Islamic banks appear to prefer murabahah to mudarabah and musharakah.

Keywords: Islamic banking, Islamic finance, Islamic banking rofitability, investment banking

Procedia PDF Downloads 482
284 Anti-crisis Public Relations and Aspects of Effective Management in Georgian Companies

Authors: Marine Kobalava

Abstract:

Introduction. The paper substantiates the crucial role of anti-crisis PR in managing the image and reputation of companies. The critical situation caused by the Covid-19 virus in various countries of the world and the actions taken have had a significant negative impact on the image of companies and public groups. The mentioned circumstance has caused some problems for companies’ products in terms of customer demand. Accordingly, the main goal of PR has become to achieve the optimal relationship between companies and society with effective management. It should also be taken into account that the range of action of PR in crisis situations is much wider than that of advertising. In the paper, Public Relations is evaluated as a determining factor of the companies' prestige, its reliability, which has a decisive effect on the goodwill, trust, and general reputation of the public towards the company. The purpose of the study is to reveal the challenges of anti-crisis PR in Georgian companies and to develop recommendations on effective management mechanisms. Methodologies. Analysis, induction, synthesis, and other methods are used in the paper; Matrix and SWOT analysis are constructed. Ways of establishing and implementing an anti-crisis PR system in companies are proposed. The main aspects of anti-crisis management are identified by using the matrix of the choice of diversification strategy of the companies' activities, the possibilities of making adequate decisions using PR are studied according to the characteristics of the companies' activities and priority directions. Conclusion. The paper draws conclusions on modern problems of anti-crisis PR, offers recommendations on ways to solve it through PR strategies.

Keywords: anti-crisis PR, effective management, company, PR strategy

Procedia PDF Downloads 79
283 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations

Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin

Abstract:

In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.

Keywords: military, Nigerian criminal, physical, psychological force

Procedia PDF Downloads 160
282 Techno-Apocalypse in Christian End-Time Literature

Authors: Sean O'Callaghan

Abstract:

Around 2011/2012, a whole new genre of Christian religious writing began to emerge, focused on the role of advanced technologies, particularly the GRIN technologies (Genetics, Robotics, Information Technology and Nanotechnology), in bringing about a techno-apocalypse, leading to catastrophic events which would usher in the end of the world. This genre, at first niche, has now begun to grow in significance in many quarters of the more fundamentalist and biblically literalist branches of evangelicalism. It approaches science and technology with more than extreme skepticism. It accuses transhumanists of being in league with satanic powers and a satanic agenda and contextualizes transhumanist scientific progress in terms of its service to what it believes to be a soon to come Antichrist figure. The genre has moved beyond literature and videos about its message can be found on YouTube and other forums, where many of the presentations there get well over a quarter of a million views. This paper will examine the genre and its genesis, referring to the key figures involved in spreading the anti-intellectualist and anti-scientific message. It will demonstrate how this genre of writing is similar in many respects to other forms of apocalyptic writing which have emerged in the twentieth and twenty-first centuries, all in response to both scientific and political events which are interpreted in the light of biblical prophecy. It will also set the genre in the context of a contemporary pre-occupation with conspiracy theory. The conclusions of the research conducted in this field by the author are that it does a grave disservice to both the scientific and Christian audiences which it targets, by misrepresenting scientific advances and by creating a hermeneutic of suspicion which makes it impossible for Christians to place their trust in scientific claims.

Keywords: antichrist, catastrophic, Christian, techno-apocalypse

Procedia PDF Downloads 205
281 Senior Leadership Team Coaching in Action: Creating High-Performance Teams

Authors: Siqi Fang, Jingxi Hou

Abstract:

Positive psychology and coaching psychology share a number of fundamental assumptions and common themes. Blending positive psychology, mindfulness, and coaching psychology, our work in team coaching with leaders enhances both leadership and team effectiveness. Although individual coaching has proven to be effective, this article advocates the benefits of leadership coaching in team settings, because durable changes in leadership behaviors are more likely to occur. Does leadership team coaching really work? Does it help improve senior leadership team effectiveness and productivity? This action research study answers these questions by tracking the progress of three typical senior leadership teams consisting of 31 executives participating in a six-month team coaching program. Assessments (pre- and post), workshops, and feedback based on ego development theories and mindfulness were applied to upgrade the senior leadership teams’ transformational stages and reframe their organizational leadership cultures. Results suggest that the team effectiveness of the three leadership teams increased up to 43 percent according to post-survey feedback from superior, direct report, and peers. Discussion is offered to show that senior leadership team coaching help teams to achieve a consensus on common purposes, establish a foundation of trust, improve collective skills, and promote efficient operation. All factors translate into better team performance. Implications of the results for future executive development programs are discussed and specific recommendations are provided.

Keywords: action research, ego development, mindfulness, senior leadership team coaching, team effectiveness, transformational stages

Procedia PDF Downloads 367
280 Political Corruption and Workplace Misconduct

Authors: Masako Darrough, Mahmud Hossain, Santanu Mitra

Abstract:

The prevalent and increasing workplace misconduct in the United States presents a significant threat to social welfare. Despite efforts by enforcement agencies, U.S. workers remain vulnerable to employer exploitation, as evidenced by rising workplace injuries and discrimination lawsuits. While existing literature has identified several factors associated with unethical labor practices, the influence of political corruption remains largely unexplored. This paper aims to fill this gap by investigating the relationship between political corruption and workplace misconduct in the U.S. context. Using the data from the U.S. Bureau of Labor Statistics, the Equal Employment Opportunity Commission, and corruption convictions reported by the Department of Justice, we find a positive association between political corruption and workplace misconduct among U.S.-listed firms that are headquartered in different states from 2004 to 2022. Both unionization and stricter labor laws attenuate the positive association between corruption and unethical labor practices. Our analyses also address potential endogeneity concerns via difference-in-differences, instrumental variables, and propensity-score-matched analyses, reaffirming the robustness of our findings. This research contributes to the literature by shedding light on how corrupt political climates influence organizational operational behavior and unethical practices. It also underscores the importance of stakeholder trust and the role of regulatory frameworks and offers practical insights to policymakers by suggesting a judicious allocation of enforcement resources to more corrupt states.

Keywords: workplace misconduct, political corruption, unionization, labor law strictness

Procedia PDF Downloads 22
279 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 118
278 Investor Sentiment and Satisfaction in Automated Investment: A Sentimental Analysis of Robo-Advisor Platforms

Authors: Vertika Goswami, Gargi Sharma

Abstract:

The rapid evolution of fintech has led to the rise of robo-advisor platforms that utilize artificial intelligence (AI) and machine learning to offer personalized investment solutions efficiently and cost-effectively. This research paper conducts a comprehensive sentiment analysis of investor experiences with these platforms, employing natural language processing (NLP) and sentiment classification techniques. The study investigates investor perceptions, engagement, and satisfaction, identifying key drivers of positive sentiment such as clear communication, low fees, consistent returns, and robust security. Conversely, negative sentiment is linked to issues like inconsistent performance, hidden fees, poor customer support, and a lack of transparency. The analysis reveals that addressing these pain points—through improved transparency, enhanced customer service, and ongoing technological advancements—can significantly boost investor trust and satisfaction. This paper contributes valuable insights into the fields of behavioral finance and fintech innovation, offering actionable recommendations for stakeholders, practitioners, and policymakers. Future research should explore the long-term impact of these factors on investor loyalty, the role of emerging technologies, and the effects of ethical investment choices and regulatory compliance on investor sentiment.

Keywords: artificial intelligence in finance, automated investment, financial technology, investor satisfaction, investor sentiment, robo-advisors, sentimental analysis

Procedia PDF Downloads 17
277 Analyzing the Prospects and Challenges in Implementing the Legal Framework for Competition Regulation in Nigeria

Authors: Oluchukwu P. Obioma, Amarachi R. Dike

Abstract:

Competition law promotes market competition by regulating anti-competitive conduct by undertakings. There is a need for a third party to regulate the market for efficiency and supervision, since, if the market is left unchecked, it may be skewed against the consumers and the economy. Competition law is geared towards the protection of consumers from economic exploitation. It is the duty of every rational government to optimally manage its economic system by employing the best regulatory practices over the market to ensure it functions effectively and efficiently. The Nigerian government has done this by enacting the Federal Competition and Consumer Protection Act, 2018 (FCCPA). This is a comprehensive legal framework with the objective of governing competition issues in Nigeria. Prior to its enactment, the competition law regime in Nigeria was grossly inadequate despite Nigeria being the biggest economy in Africa. This latest legislation has become a bold step in the right direction. This study will use the doctrinal methodology in analyzing the FCCPA, 2018 in order to discover the extent to which the Act will guard against anti-competitive practices and promote competitive markets for the benefit of the Nigerian economy and consumers. The study finds that although the FCCPA, 2018 provides for the regulation of competition in Nigeria, there is a need to effectively tackle the challenges to the implementation of the Act and the development of anti-trust jurisprudence in Nigeria. This study concludes that incisive implementation of competition law in Nigeria will help protect consumers and create a conducive environment for economic growth, development, and protection of consumers from obnoxious competition practices.

Keywords: anti-competitive practices, competition law, competition regulation, consumer protection.

Procedia PDF Downloads 178
276 Caste Discourses in Popular Cinema in India

Authors: Devina Sethia

Abstract:

This paper will examine the discourse of sense of belonging in popular Hindi language cinema in India to understand how Dalit identities and experiences are negotiated. It will situate such discourse against the emergence of new rhetorical forms of nationalism that seem to contest colonial constructs of nation and identity while clearly envisioning anti-colonial futures through the invocation of a glorious pre-colonial past. While nations have always been 'imagined communities' with the Hobsbawmian invented traditions that leverage national consciousness to establish trust and legitimacy of governance, the concept of ethnic nationalism has been at odds with the idea of India itself as the concept of nationalism in India was born out of anti colonial ideology and not ethnicity. However, in recent times, anti colonial nationalism is transforming into Hindu nationalism and hardening the boundaries around what is Indian-ness and what it means to be Indian. In the past two decades films such as Masaan (2015), Manjhi - The Mountain Man (2015), Sairat (2016), Article 15 (2019) and Vedaa (2024) have gained immense popularity amongst different audience groups across the country. The success of this cinematic genre is interesting when juxtaposed against the reinforcing of a more rigid and exclusionary understanding of Indian-ness. Hence, further exploration of this is essential to gain insights into the anti colonial future of India. In conclusion, studying the discourse of Dalit sense of belonging in film serves as more than mere representation, but rather as a crucial intervention in the comprehension and envisioning of anticolonial possibilities amidst the rise of Hindu nationalism.

Keywords: film studies, identity, sense of belonging, discourse

Procedia PDF Downloads 26
275 Contemporary Christian Mission in Nigeria, the Question of Identity and Self-Realization for Integral Development

Authors: Felix Ehimare Enegho

Abstract:

The issue of the Christian mission among various people in our world has become a subject of discussion for quite a while now considering the many challenges faced by people of different religions. The understanding of who we are and how we choose to live our life as a people is quite imperative in many societies. The Christian Church down through the ages attempted to define itself so as to become relevant in human society. In Africa, the question of identity and self-realization is quite imperative if Africans are to define themselves and place themselves in the proper perspective as Christians. With the high level of insecurity bedevilling the world and especially Nigerian society, there is the need for Christians in Nigeria to see themselves as one body belonging to the same family. It is however disheartening that for several years now, there is a high level of disunity, lack of trust, disharmony, and vices of all kinds even among Christians who are often too quick to segment themselves into denominations thereby making themselves weak, segmented ad powerless in the midst of great oppositions, as if the Christian church in Nigeria is a divided house. The significance of this paper is to explore the areas of conflict among Christians in Nigeria with a view to finding possible solutions that would lead to the integral formation and in the long run a common identity and invariably self-realization. This paper utilized the socio-historical method of research. Among the major findings in the work is the fact that it is only people that can truly be responsible and held accountable for how they define their identity and self-realization. This entails that Christianity’s identity and self-realization in Nigeria will not only lead to a better and more defined form of Christianity but would ultimately assist in the integral development of Christian mission in Nigeria, a kind of development that would lead to a better Nigerian society.

Keywords: contemporary, Christian, mission, Nigeria, identity, self-realization

Procedia PDF Downloads 88
274 Neighborhood Linking Social Capital as a Predictor of Drug Abuse: A Swedish National Cohort Study

Authors: X. Li, J. Sundquist, C. Sjöstedt, M. Winkleby, K. S. Kendler, K. Sundquist

Abstract:

Aims: This study examines the association between the incidence of drug abuse (DA) and linking (communal) social capital, a theoretical concept describing the amount of trust between individuals and societal institutions. Methods: We present results from an 8-year population-based cohort study that followed all residents in Sweden, aged 15-44, from 2003 through 2010, for a total of 1,700,896 men and 1,642,798 women. Social capital was conceptualized as the proportion of people in a geographically defined neighborhood who voted in local government elections. Multilevel logistic regression was used to estimate odds ratios (ORs) and between-neighborhood variance. Results: We found robust associations between linking social capital (scored as a three level variable) and DA in men and women. For men, the OR for DA in the crude model was 2.11 [95% confidence interval (CI) 2.02-2.21] for those living in areas with the lowest vs. highest level of social capital. After accounting for neighborhood-level deprivation, the OR fell to 1.59 (1.51-1-68), indicating that neighborhood deprivation lies in the pathway between linking social capital and DA. The ORs remained significant after accounting for age, sex, family income, marital status, country of birth, education level, and region of residence, and after further accounting for comorbidities and family history of comorbidities and family history of DA. For women, the OR decreased from 2.15 (2.03-2.27) in the crude model to 1.31 (1.22-1.40) in the final model, adjusted for multiple neighborhood-level and individual-level variables. Conclusions: Our study suggests that low linking social capital may have important independent effects on DA.

Keywords: drug abuse, social linking capital, environment, family

Procedia PDF Downloads 473
273 The Current Development and Legislation on the Acquisition and Use of Nuclear Energy in Contemporary International Law

Authors: Uche A. Nnawulezi

Abstract:

Over the past decades, the acquisition and utilization of nuclear energy have remained a standout amongst the most intractable issues which past world leaders have unsuccessfully endeavored to grapple with. This study analyzes the present advancement and enactment on the acquisition and utilization of nuclear energy in contemporary international law. It seeks to address international co-operations in the field of nuclear energy by looking at what nuclear energy is all about and how it came into being. It also seeks to address concerns expressed by a few researchers on the position of nuclear law in the most extensive domain of the law by looking at the authoritative procedure for nuclear law, system of arrangements and traditions. This study also agrees in favour of treaty on non-proliferation of nuclear weapons based on human right and humanitarian principles that are not duly moral, but also legal ones. Specifically, the past development activities on nuclear weapon and the practical system of the nuclear energy institute will be inspected. The study noted among others, former president Obama's remark on nuclear energy and Pakistan nuclear policies and its attendant outcomes. Essentially, we depended on documentary evidence and henceforth scooped a great part of the data from secondary sources. The study emphatically advocates for the adoption of absolute liability principles and setting up of a viability trust fund, all of which will help in sustaining global peace where global best practices in acquisition and use of nuclear energy will be widely accepted in the contemporary international law. Essentially, the fundamental proposals made in this paper if completely adopted, might go far in fortifying the present advancement and enactment on the application and utilization of nuclear energy and accordingly, addressing a portion of the intractable issues under international law.

Keywords: nuclear energy, international law, acquisition, development

Procedia PDF Downloads 178
272 Islamic Perception of Modern Democratic System

Authors: Muhammad Khubaib

Abstract:

The Holy Quran purport is to establish a democratic system in which Allah has the right to special authority and He who has the supreme power or sovereignty. The supreme leader, Allah ceded the right to govern to his prophet and whoever would ever rule he would have to govern as a deputy of Prophet of Allah and he will not have the right to deviate from the basic rules of law and constitution. Centuries before the birth of prevailing democracy, Muslim scholars and researchers continuously keep using the term of “Jamhür” (majority) in their books. Islam gives the basic importance to the public opinion to establish a government and make the public confidence necessary for the government. The most effective way to gain the trust of the people in the present to build national institutions is through the vote. Vote testifies in favor of the candidate and majority tells us who is more honest and talented. Each voter stands at the position of trustworthy. To vote a cruel person would be tantamount to treason and even not to vote would be considered as a national offence. After transparent process, the selected member of government would be seemed a fine example of the saying of Muhammad (S.A.W) in which he said; the majority of my people will never be agreed at misleading. In short in this article, there would be discussed democracy in the Islamic perception, while elaborating the western democracy so that it can be cleared that in which way the Holy Quran supported the democracy and what gestures Muhammad (S.A.W) made to spread the democracy and on the basis of those gestures, and how come those gestures are being followed to choose the sacred caliphate. It's hoped that this research would be helpful to refine the democratic system and support to meet the challenges Muslim world are facing.

Keywords: democracy, modern democratic system, respect of majority opinion, vote casting

Procedia PDF Downloads 194
271 Improving Cheon-Kim-Kim-Song (CKKS) Performance with Vector Computation and GPU Acceleration

Authors: Smaran Manchala

Abstract:

Homomorphic Encryption (HE) enables computations on encrypted data without requiring decryption, mitigating data vulnerability during processing. Usable Fully Homomorphic Encryption (FHE) could revolutionize secure data operations across cloud computing, AI training, and healthcare, providing both privacy and functionality, however, the computational inefficiency of schemes like Cheon-Kim-Kim-Song (CKKS) hinders their widespread practical use. This study focuses on optimizing CKKS for faster matrix operations through the implementation of vector computation parallelization and GPU acceleration. The variable effects of vector parallelization on GPUs were explored, recognizing that while parallelization typically accelerates operations, it could introduce overhead that results in slower runtimes, especially in smaller, less computationally demanding operations. To assess performance, two neural network models, MLPN and CNN—were tested on the MNIST dataset using both ARM and x86-64 architectures, with CNN chosen for its higher computational demands. Each test was repeated 1,000 times, and outliers were removed via Z-score analysis to measure the effect of vector parallelization on CKKS performance. Model accuracy was also evaluated under CKKS encryption to ensure optimizations did not compromise results. According to the results of the trail runs, applying vector parallelization had a 2.63X efficiency increase overall with a 1.83X performance increase for x86-64 over ARM architecture. Overall, these results suggest that the application of vector parallelization in tandem with GPU acceleration significantly improves the efficiency of CKKS even while accounting for vector parallelization overhead, providing impact in future zero trust operations.

Keywords: CKKS scheme, runtime efficiency, fully homomorphic encryption (FHE), GPU acceleration, vector parallelization

Procedia PDF Downloads 23
270 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 148
269 ‘Internationalize Yourself’: Mobility in Academia as a Form of Continuing Professional Training

Authors: Sonja Goegele, Petra Kletzenbauer

Abstract:

The FH JOANNEUM- a university of applied sciences based in Austria - cooperates in teaching and research with well-known international universities and thus aims to foster so-called strategic partnerships. The exchange of university lecturers and other faculty members is a way to achieve and secure strategic company goals, in which excellent research and teaching play a central role in order to improve both the development of academics and administration. Thanks to mobility not only the university but also the involved people truly benefit in their professional development which can be seen on several levels: increased foreign language proficiency, excellent networking possibilities within the scientific community as well as reinforced didactic competencies in the form of different teaching and learning methodologies. The paper discusses mobility in the light of the university’s strategic paper entitled ‘Hands on 2022’ by presenting results from an empirical research study among faculty members who participate in exchange programmes on a regular basis. In the form of an online questionnaire, mobility was discussed from different angles such as networking, collaborative research, professional training for academics and the overall impact of the exchange within and outside the organization. From the findings, it can be concluded that mobility is an asset for any university. However, keeping in constant dialogue with partner universities requires more than the purpose of the exchange itself. Building rapport and keeping a relationship of trust are challenges that need to be addressed more closely in order to run successful mobility programmes. Best Practice examples should highlight the importance of mobility as a vital initiative to transfer disciplines.

Keywords: higher education, internationalization, mobility, strategic partnerships

Procedia PDF Downloads 139
268 Experiences of Marital Relationship of Middle-Aged Couples in Hong Kong: Implications for Services Interventions

Authors: Wai M. Shum

Abstract:

There was evidence that the change of marital quality satisfaction was related to the different stages of the family life cycle. Research studies have been largely based on western contexts, which found a curvilinear U-shaped trend in changes of marital satisfaction over the course of a marriage, but little is known about the marital experiences of Hong Kong couples. Through in-depth interviews, this qualitative study explored the marital relationship of middle-aged couples in a satisfying marriage and to identify how couples maintain a satisfying relationship in the local context. Findings from this study suggested twelve themes with some showing consistency with previous literature, such as communication, companionship, trust, and fidelity. The affective aspects of empathetic understanding and perceived empathy were found to have an enormous effect on couples’ bondedness. The high level of differentiation and security served as a basis for unconditional contribution, acceptance, and adjustment to unsolvable issues such that negative emotion would not be escalated. The manifestations of intimacy and commitment in the triangular theory of love were more frequently addressed than passion in striving for marital longevity in the local context. This study challenged the curvilinear trend of marital satisfaction throughout marriage, with couples showing different pathways of marital satisfaction. The study gave insights on martial enrichment, such as facilitating couples to disclose their vulnerabilities, desire for physical intimacy, and passion in the pursuit of enduring marriage instead of an emphasis on skills training on communication and conflict resolution.

Keywords: intimacy, marital relationship, marital satisfaction, middle-aged

Procedia PDF Downloads 114
267 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 475
266 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136
265 Optimization of Reliability Test Plans: Increase Wafer Fabrication Equipments Uptime

Authors: Swajeeth Panchangam, Arun Rajendran, Swarnim Gupta, Ahmed Zeouita

Abstract:

Semiconductor processing chambers tend to operate in controlled but aggressive operating conditions (chemistry, plasma, high temperature etc.) Owing to this, the design of this equipment requires developing robust and reliable hardware and software. Any equipment downtime due to reliability issues can have cost implications both for customers in terms of tool downtime (reduced throughput) and for equipment manufacturers in terms of high warranty costs and customer trust deficit. A thorough reliability assessment of critical parts and a plan for preventive maintenance/replacement schedules need to be done before tool shipment. This helps to save significant warranty costs and tool downtimes in the field. However, designing a proper reliability test plan to accurately demonstrate reliability targets with proper sample size and test duration is quite challenging. This is mainly because components can fail in different failure modes that fit into different Weibull beta value distributions. Without apriori Weibull beta of a failure mode under consideration, it always leads to over/under utilization of resources, which eventually end up in false positives or false negatives estimates. This paper proposes a methodology to design a reliability test plan with optimal model size/duration/both (independent of apriori Weibull beta). This methodology can be used in demonstration tests and can be extended to accelerated life tests to further decrease sample size/test duration.

Keywords: reliability, stochastics, preventive maintenance

Procedia PDF Downloads 15
264 Capitalizing on Differential Network Ties: Unpacking Individual Creativity from Social Capital Perspective

Authors: Yuanyuan Wang, Chun Hui

Abstract:

Drawing on social capital theory, this article discusses how individuals may utilize network ties to come up with creativity. Social capital theory elaborates how network ties enhances individual creativity from three dimensions: structural access, and relational and cognitive mechanisms. We categorize network ties into strong and weak in terms of tie strength. With less structural constraints, weak ties allow diverse and heterogeneous knowledge to prosper, further facilitating individuals to build up connections among diverse even distant ideas. On the other hand, strong ties with the relational mechanism of cooperation and trust may benefit the accumulation of psychological capital, ultimately to motivate and sustain creativity. We suggest that differential ties play different roles for individual creativity: Weak ties deliver informational benefit directly rifling individual creativity from informational resource aspect; strong ties offer solidarity benefits to reinforce psychological capital, which further inspires individual creativity engagement from a psychological viewpoint. Social capital embedded in network ties influence individuals’ informational acquisition, motivation, as well as cognitive ability to be creative. Besides, we also consider the moderating effects constraining the relatedness between network ties and creativity, such as knowledge articulability. We hypothesize that when the extent of knowledge articulability is low, that is, with low knowledge codifiability, and high dependency and ambiguity, weak ties previous serving as knowledge reservoir will not become ineffective on individual creativity. Two-wave survey will be employed in Mainland China to empirically test mentioned propositions.

Keywords: network ties, social capital, psychological capital, knowledge articulability, individual creativity

Procedia PDF Downloads 404
263 Jelly and Beans: Appropriate Use of Ultrasound in Acute Kidney Injury

Authors: Raja Ezman Raja Shariff

Abstract:

Acute kidney injury (AKI) is commonly seen in inpatients, and places a great cost on the NHS and patients. Timely and appropriate management is both nephron sparing and potentially life-saving. Ultrasound scanning (USS) is a well-recognised method for stratifying patients. Subsequently, the NICE AKI guidance has defined groups in whom scanning is recommended within 6 hours of request (pyonephrosis), within 24 hours (obstruction/cause unknown), and in whom routine scanning isn't recommended (cause for AKI identified). The audit looks into whether Stockport NHS Trust USS practice was in line with such recommendations. The audit evaluated 92 patients with AKI who had USS, between 01/01/14 to 30/04/14. Data collection was divided into 2 parts. Firstly, radiology request cards and the online imaging software (PACS) were evaluated. Then, the electronic case notes (ADVANTIS) was evaluated further. Based on request cards, 10% of requests were for pyonephrosis. Only 33% were scanned within 6hours and a further 33% within 24hours. 75% were requested for possible obstructions and unknown cause collectively. Of those due to possible obstruction, 71% of patients were scanned within 24 hours. Of those with unknown cause, 50% were scanned within 24 hours. 15% of requests had a cause declared and so potentially did not require scanning. Evaluation of the patients’ notes suggested further interesting findings. Firstly, potentially 39% of patients had a known cause for AKI, therefore, did not need USS. Subsequently, the cohort of unknown cause and possible obstruction was collectively reduced to 45%. Alarmingly the patient cohort with possible pyonephrosis went up to 16%, suggesting an under-recognition of this life-threatening condition. We plan to highlight these findings within our institution and make changes to encourage more appropriate requesting and timely scanning. Time will tell if we manage to save or increase our costs in this cost-conscious NHS. Patient benefits, though, seem to be guaranteed.

Keywords: AKI, ARF, kidney, renal

Procedia PDF Downloads 399
262 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security

Authors: Shanshan Zhu, Mohammad Nasim

Abstract:

Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.

Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection

Procedia PDF Downloads 41
261 Person-Led Organizations Nurture Bullying Behavior: A Qualitative Study

Authors: Shreya Mishra, Manosi Chaudhuri, Ajoy K. Dey

Abstract:

Workplace bullying is a social phenomenon which has proved to be hazardous not only for employees’ well-being but also organizations. Despite being prevalent across geographical boundaries, Indian organizations have failed to acknowledge its vices. This paper aims to understand targets’ perception on what makes bullying nurture in organizations. The paper suggests that person-led Indian work settings give birth to bullying behavior as it lacks professional acumen and systems. An analysis of 13 in-depth interviews of employees from the organized sector suggests that organizations, where decision making lies with single individual, may be a hub of hostile behavior due to the culture which promotes ‘yesmanship’, ‘authoritarianism’ and/or blind belief of leaders on certain set of employees. The study used constructivist grounded theory approach, and the data was analyzed using R Based Qualitative Data Analysis (RQDA) software. Respondents reported that bullying behavior is taken lightly by the management with 'just ignore it' attitude. According to the respondents, the behavior prolong as the perpetrator have a direct approach to the top authority. The study concludes that person-led organizations may create a family-like environment which is favored by employees; however, authoritative leaders are unable to gain the trust of employees. Also, employees who are close to the leader may either be a perpetrator or a target of bullying. It is recommended that leaders in such organizations need to acknowledge the presence of bullying which affects an employees’ commitment towards their job and/or organization. They need to have an assertive check on individuals who hide behind ‘yesman’ attitude. This may help employees feel safe in such work settings.

Keywords: constructivist grounded theory, person-led organization, RQDA, workplace bullying

Procedia PDF Downloads 205
260 A Modified Nonlinear Conjugate Gradient Algorithm for Large Scale Unconstrained Optimization Problems

Authors: Tsegay Giday Woldu, Haibin Zhang, Xin Zhang, Yemane Hailu Fissuh

Abstract:

It is well known that nonlinear conjugate gradient method is one of the widely used first order methods to solve large scale unconstrained smooth optimization problems. Because of the low memory requirement, attractive theoretical features, practical computational efficiency and nice convergence properties, nonlinear conjugate gradient methods have a special role for solving large scale unconstrained optimization problems. Large scale optimization problems are with important applications in practical and scientific world. However, nonlinear conjugate gradient methods have restricted information about the curvature of the objective function and they are likely less efficient and robust compared to some second order algorithms. To overcome these drawbacks, the new modified nonlinear conjugate gradient method is presented. The noticeable features of our work are that the new search direction possesses the sufficient descent property independent of any line search and it belongs to a trust region. Under mild assumptions and standard Wolfe line search technique, the global convergence property of the proposed algorithm is established. Furthermore, to test the practical computational performance of our new algorithm, numerical experiments are provided and implemented on the set of some large dimensional unconstrained problems. The numerical results show that the proposed algorithm is an efficient and robust compared with other similar algorithms.

Keywords: conjugate gradient method, global convergence, large scale optimization, sufficient descent property

Procedia PDF Downloads 205