Search results for: state measures
10074 Automated Detection of Related Software Changes by Probabilistic Neural Networks Model
Authors: Yuan Huang, Xiangping Chen, Xiaonan Luo
Abstract:
Current software are continuously updating. The change between two versions usually involves multiple program entities (e.g., packages, classes, methods, attributes) with multiple purposes (e.g., changed requirements, bug fixing). It is hard for developers to understand which changes are made for the same purpose. Whether two changes are related is not decided by the relationship between this two entities in the program. In this paper, we summarized 4 coupling rules(16 instances) and 4 state-combination types at the class, method and attribute levels for software change. Related Change Vector (RCV) are defined based on coupling rules and state-combination types, and applied to classify related software changes by using Probabilistic Neural Network during a software updating.Keywords: PNN, related change, state-combination, logical coupling, software entity
Procedia PDF Downloads 43610073 Origin of Salinity Problems during Tsunami and Remedial Measures in Coastal Areas
Authors: N. K. Gupta, R. C. Bhattacharjee
Abstract:
In the aftermath of the tsunami in 2004 and terrible humanitarian disaster affecting thousands of kilometers of coastal south, the immediate priority is to begin the process of reconstruction of livelihoods including basic services. It is likely that many coastal wetlands would have been affected by the large inflow of salt-water and littoral sediments during the tsunami, with longer-term effects including changes in their hydrogeology caused by changes to coastlines and damage to sea-defenses. The reconstruction process is likely to provide opportunities to better integrate environmental protection and management with economic development in the region, including the opportunity to conserve and restore coastal habitats. Presented herein is a study pertaining to salinity problems encountered in coastal south during tsunami in 2004 and the consequent loss of fertility of agricultural land including remedial measures to revitalize economic growth in the region.Keywords: tsunami, salinity, costal area, reconstruction
Procedia PDF Downloads 37510072 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation
Authors: Natalia Kalinowska
Abstract:
The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach
Procedia PDF Downloads 25210071 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 6210070 Analysis of State Documents on Environmental Awareness Aspects in Kazakhstan
Authors: Y. A. Kumar
Abstract:
Environmental awareness issues in Kazakhstan are one of the most undermined topics both among the public community and in terms of state rhetoric. In the context of official state documents, so far only two official environmental codes and national programs called Zhasyl Kazakhstan were introduced in the country in 2021. While on the one hand the Environmental Code was introduced with the purpose to modernize, frame and enlist main legislative aspects on various sectors of environmental law in Kazakhstan, on the other hand, the Zhasyl Kazakhstan Program has been implemented as a state program to address with numerous environmental projects various environmental issues ranging from air pollution to waste management as well as aspects related to ecological education and low environmental awareness matters. In this regard, the main goal of this paper is to analyze critically the main content of both of these documents with a particular focus on sections related to environmental awareness-raising aspects. For that, this paper applied a subjective-based content analysis in order to identify interesting insights on regulatory legal aspects, future research streams, and uncovering of improved legislative frameworks in the context of an environmental awareness issue. Apart from that, five open-ended questions were sent out to the Ministry of Ecology, Geology and Natural Resources to obtain primary data on the state’s view in regards to current previous, recent and future aspects of environmental awareness issues in the country.Keywords: Kazakhstan, environmental awareness, environmental code, Zhasyl Kazakhstan, content analysis
Procedia PDF Downloads 9410069 Friction Stir Welding Process as a Solid State Joining -A Review
Authors: Mohd Anees Siddiqui, S. A. H. Jafri, Shahnawaz Alam
Abstract:
Through this paper an attempt is made to review a special welding technology of friction stir welding (FSW) which is a solid-state joining. Friction stir welding is used for joining of two plates which are applied compressive force by using fixtures over the work table. This is a non consumable type welding technique in which a rotating tool of cylindrical shape is used. Process parameters such as tool geometry, joint design and process speed are discussed in the paper. Comparative study of Friction stir welding with other welding techniques such as MIG, TIG & GMAW is also done. Some light is put on several major applications of friction stir welding in different industries. Quality and environmental aspects of friction stir welding is also discussed.Keywords: friction stir welding (FSW), process parameters, tool, solid state joining processes
Procedia PDF Downloads 50210068 The Impact of Regulation on Corporate Social Responsibility Reporting Quality: UK Evidence
Authors: Ruba Hamed, Khaled Hussainey, Basiem Al-Shattarat, Wasim Al-Shattarat
Abstract:
This paper examines how the influence of mandating corporate social responsibility reporting (CSR) on subsequent financial performance through accounting-based measures and market-based measures. We provide evidence about the negative impact of reporting CSR voluntarily on the firm’s future performance due to the increased spending on and costs related to such activities. On the contrary, mandating CSR reporting enhances firms’ future performance by signalling to the market about the firm’s positive stance towards sustainability issues in the UK. Our findings are of interest to regulation setters and stakeholders with respect to mandatory CSR reporting and provide further insight and feedback into accounting and reporting practices.Keywords: accounting-based performance, mandatory CSR, mandatory regulation, market-based performance
Procedia PDF Downloads 12410067 Jewish Law in Israel: State, Law, and Religion
Authors: Yuval Sinai
Abstract:
As part of the historical, religious and cultural heritage of the Jewish people, Jewish law is part of the legal system in Israel, which is a Jewish and democratic state. The proper degree of use of Jewish law in judicial decisions is an issue that crops up in Israeli law from time to time. This was a burning question in the 1980s in the wake of the enactment of the Foundations of Law Act 1980, which declared Jewish heritage a supplementary legal method to Israeli law. The enactment of the Basic Law: Human Dignity and Liberty 1992, which decreed that the basic Israeli legal principles must be interpreted in light of the values of a Jewish and democratic state, marks a significant change in the impact of Judaism in the law created and applied by the courts. Both of these legislative developments revived the initiative to grant a central status to Jewish law within the state law. How should Jewish law be applied in Israel’s secular courts? This is not a simple question. It is not merely a question of identifying the relevant rule of Jewish law or tracing its development from the Talmud to modern times. Nor is it the same as asking how a rabbinic court would handle the issue. It is a matter of delicate judgment to distill out of the often conflicting Jewish law sources a rule that will fit into the existing framework of Israeli law so as to advance a policy that will best promote the interests of Israel’s society. We shall point out the occasional tensions between Jewish religious law and secular law, and introduce opinions as to how reconciliation of the two can best be achieved in light of Jewish legal tradition and in light of the reality in the modern State of Israel.Keywords: law and politics, law and religion, comparative law, law and society
Procedia PDF Downloads 7310066 State’s Responsibility of Space Debris
Authors: Athari Farhani
Abstract:
Abstract The existence of space debris is a direct implication of human activities in outer space. The amount of orbital debris resulting from human exploration and use of outer space has been steadily increasing in the history of human exploration and use of outer space, so that space debris in the responsibility of the launching state. Space debris not only hs a direct impact on environmentalpollution but can also harm and endanger the safety of human life. Despite the legal provisions governing the exploration and use of outer space, both international space law and liability convention, however, these legal provisions are only basic prinsiples, so that further thought or effort are needed, such as new international legal instruments to regulate the existence of space debris. The method used in this research is normative juridical with an approach to written legal regulation, especially international agreements related to space law.Keywords: state’s responsibility, space debris, outerspace, international law
Procedia PDF Downloads 10510065 Control of an Outbreak of Vancomycin-Resistant Enterococci in a Tunisian Teaching Hospital
Authors: Hela Ghali, Sihem Ben Fredj, Mohamed Ben Rejeb, Sawssen Layouni, Salwa Khefacha, Lamine Dhidah, Houyem Said Laatiri
Abstract:
Background: Antimicrobial resistance is a growing threat to public health and motivates to improve prevention and control programs both at international (WHO) and national levels. Despite their low pathogenicity, vancomycin-resistant enterococci (VRE) are common nosocomial pathogens in several countries. The high potential for transmission of VRE between patients and the threat to send its resistance genes to other bacteria such as staphylococcus aureus already resistant to meticilin, justify strict control measures. Indeed, in Europe, the proportion of Enterococcus faecium responsible for invasive infections, varies from 1% to 35% in 2011 and less than 5% were resistant to vancomycin. In addition, it represents the second cause of urinary tract and wound infections and the third cause of nosocomial bacteremia in the United States. The nosocomial outbreaks of VRE have been mainly described in intensive care services, hematology-oncology and haemodialysis. An epidemic of VRE has affected our hospital and the objective of this work is to describe the measures put in place. Materials/Methods: Following the alert given by the service of plastic surgery concerning a patient carrier of VRE, a team of the prevention and healthcare security service (doctor + technician) made an investigation. A review of files was conducted to draw the synoptic table and the table of cases. Results: By contacting the microbiology laboratory, we have identified four other cases of VRE and who were hospitalized in Medical resuscitation department (2 cases, one of them was transferred to the Physical rehabilitation department), and Nephrology department (2 cases). The visit has allowed to detect several malfunctions in professional practice. A crisis cell has allowed to validate, coordinate and implement control measures following the recommendations of the Technical Center of nosocomial infections. In fact, the process was to technically isolate cases in their sector of hospitalization, to restrict the use of antibiotics, to strength measures of basic hygiene, and to make a screening by rectal swab for both cases and contacts (other patients and health staff). These measures have helped to control the situation and no other case has been reported for a month. 2 new cases have been detected in the intensive care unit after a month. However, these are short-term strategies, and other measures in the medium and long term should be taken into account in order to face similar outbreaks. Conclusion: The efforts to control the outbreak were not efficient since 2 new cases have been reported after a month. Therefore, a continuous monitoring in order to detect new cases earlier is crucial to minimize the dissemination of VRE.Keywords: hospitals, nosocomial infection, outbreak, vancomycin-resistant enterococci
Procedia PDF Downloads 30110064 Detection of Pharmaceutical Personal Protective Equipment in Video Stream
Authors: Michael Leontiev, Danil Zhilikov, Dmitry Lobanov, Lenar Klimov, Vyacheslav Chertan, Daniel Bobrov, Vladislav Maslov, Vasilii Vologdin, Ksenia Balabaeva
Abstract:
Pharmaceutical manufacturing is a complex process, where each stage requires a high level of safety and sterility. Personal Protective Equipment (PPE) is used for this purpose. Despite all the measures of control, the human factor (improper PPE wearing) causes numerous losses to human health and material property. This research proposes a solid computer vision system for ensuring safety in pharmaceutical laboratories. For this, we have tested a wide range of state-of-the-art object detection methods. Composing previously obtained results in this sphere with our own approach to this problem, we have reached a high accuracy ([email protected]) ranging from 0.77 up to 0.98 in detecting all the elements of a common set of PPE used in pharmaceutical laboratories. Our system is a step towards safe medicine production.Keywords: sterility and safety in pharmaceutical development, personal protective equipment, computer vision, object detection, monitoring in pharmaceutical development, PPE
Procedia PDF Downloads 8710063 Recombination Rate Coefficients for NIII and OIV Ions
Authors: Shahin A. Abdel-Naby, Asad T. Hassan
Abstract:
Electron-ion recombination data are needed for plasma modeling. The recombination processes include radiative recombination (RR), dielectronic recombination (DR), and trielectronic recombination (TR). When a free electron is captured by an ion with simultaneous excitation of its core, a doubly-exited intermediate state may be formed. The doubly excited state relaxes either by electron emission (autoionization) or by radiative decay (photon emission). DR process takes place when the relaxation occurs to a bound state by photon emission. Reliable laboratory astrophysics data (theory and experiment) for DR rate coefficients are needed to determine the charge state distribution in photoionized sources such as X-ray binaries and active galactic nuclei. DR rate coefficients for NIII and OIV ions are calculated using state-of-the-art multi-configuration Breit-Pauli atomic structure AUTOSTRUCTURE collisional package within the generalized collisional-radiative framework. Level-resolved calculations for RR and DR rate coefficients from the ground and metastable initial states are produced in an intermediate coupling scheme associated with Δn = 0 (2→2) and Δn = 1 (2 →3) core-excitations. DR cross sections for these ions are convoluted with the experimental electron-cooler temperatures to produce DR rate coefficients. Good agreements are found between these rate coefficients and the experimental measurements performed at the CRYRING heavy-ion storage ring for both ions.Keywords: atomic data, atomic process, electron-ion collision, plasmas
Procedia PDF Downloads 15010062 Analyzing of Speed Disparity in Mixed Vehicle Technologies on Horizontal Curves
Authors: Tahmina Sultana, Yasser Hassan
Abstract:
Vehicle technologies rapidly evolving due to their multifaceted advantages. Adapted different vehicle technologies like connectivity and automation on the same roads with conventional vehicles controlled by human drivers may increase speed disparity in mixed vehicle technologies. Identifying relationships between speed distribution measures of different vehicles and road geometry can be an indicator of speed disparity in mixed technologies. Previous studies proved that speed disparity measures and traffic accidents are inextricably related. Horizontal curves from three geographic areas were selected based on relevant criteria, and speed data were collected at the midpoint of the preceding tangent and starting, ending, and middle point of the curve. Multiple linear mixed effect models (LME) were developed using the instantaneous speed measures representing the speed of vehicles at different points of horizontal curves to recognize relationships between speed variance (standard deviation) and road geometry. A simulation-based framework (Monte Carlo) was introduced to check the speed disparity on horizontal curves in mixed vehicle technologies when consideration is given to the interactions among connected vehicles (CVs), autonomous vehicles (AVs), and non-connected vehicles (NCVs) on horizontal curves. The Monte Carlo method was used in the simulation to randomly sample values for the various parameters from their respective distributions. Theresults show that NCVs had higher speed variation than CVs and AVs. In addition, AVs and CVs contributed to reduce speed disparity in the mixed vehicle technologies in any penetration rates.Keywords: autonomous vehicles, connected vehicles, non-connected vehicles, speed variance
Procedia PDF Downloads 14510061 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information
Authors: A. Preetha Priyadharshini, S. B. M. Priya
Abstract:
In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information
Procedia PDF Downloads 81310060 Reduction of Impulsive Noise in OFDM System using Adaptive Algorithm
Authors: Alina Mirza, Sumrin M. Kabir, Shahzad A. Sheikh
Abstract:
The Orthogonal Frequency Division Multiplexing (OFDM) with high data rate, high spectral efficiency and its ability to mitigate the effects of multipath makes them most suitable in wireless application. Impulsive noise distorts the OFDM transmission and therefore methods must be investigated to suppress this noise. In this paper, a State Space Recursive Least Square (SSRLS) algorithm based adaptive impulsive noise suppressor for OFDM communication system is proposed. And a comparison with another adaptive algorithm is conducted. The state space model-dependent recursive parameters of proposed scheme enables to achieve steady state mean squared error (MSE), low bit error rate (BER), and faster convergence than that of some of existing algorithm.Keywords: OFDM, impulsive noise, SSRLS, BER
Procedia PDF Downloads 45710059 Ensuring Continuity in Subcutaneous Depot Medroxy Progesterone Acetate (DMPA-SC) Contraception Service Provision Using Effective Commodity Management Practices
Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu
Abstract:
Background: The Delivering Innovations in Selfcare (DISC) project aims to increase access to self-care options for women of reproductive age, starting with self-inject subcutaneous depot medroxyprogesterone acetate (DMPA-SC) contraception services. However, the project has faced challenges in ensuring the continuous availability of the commodity in health facilities. Although most states in the country rely on the federal ministry of Health for supplies, some are gradually funding the procurement of Family Planning (FP) commodities. This attempt is, however, often accompanied by procurement delays and purchases inadequate to meet demand. This dilemma was further exacerbated by the commencement of demand generation activities by the project in supported states which geometrically increased commodity utilization rates and resulted in receding stock and occasional service disruptions. Strategies: The project deployed various strategies were implemented to ensure the continuous availability of commodities. These include facilitating inter-facility transfer, monthly tracking of commodity utilization, and alerting relevant authorities when stock levels reach a minimum. And supporting state-level procurement of DMPA-SC commodities through catalytic interventions. Results: Effective monitoring of commodity inventory at the facility level and strategic engagement with federal and state-level logistics units have proven successful in mitigating stock-out of commodities. It has helped secure up to 13,000 units of DMPA-SC commodities from federal logistics units and enabled state units to prioritize supported sites. This has ensured the continuity of DMPA-SC services and an increasing trend in the practice of self-injection. Conclusion: A functional supply chain is crucial to achieving commodity security, and without it, health programs cannot succeed. Stakeholder engagement, stock management and catalytic interventions have provided both short- and long-term measures to mitigate stock-outs and ensured a consistent supply of commodities to clients.Keywords: family planning, contraception, DMPA-SC, self-care, self-injection, commodities, stock-out
Procedia PDF Downloads 8910058 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 12610057 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations
Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson
Abstract:
Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.Keywords: oblivious transfer, quantum protocol, cryptography, XOR
Procedia PDF Downloads 12610056 State Budget Accounting: Factors Affected and Basic Orientation to Vietnamese Public Sector Entities
Authors: Pham Quang Huy
Abstract:
State budget is considered as an effective tool for controlling, adjusting and regulating the market economy of any countries. To ensure that the activities of the state in the fields of politics, economy and society has been efficiency, it requires major sources of certain budget. These financial funds are formed from tax revenues and tax revenues beyond. Therefore, the Governments need to have an accounting regime to manage the receipt, expenditure which are suitable for recording a full range of items. From that, it can help to increase the transparency and accountability in budget system. One of the main requirements in Vietnamese policies is to improve that accounting system of revenues and expenditures which can provide many reports to meet the information required of government and users, as well as directions to the trends of international standards requirements. By using quantitative research methods and analytical models to exploring factors, the main purpose of this article is to identify the factors affecting budget accounting and providing some direction for Vietnamese public sector in the future. The results indicated that Vietnam budget accounting has been impacted by seven factors and aims to implement three main orientations in the public sector units.Keywords: state budget, accounting, IPSAS, budget management, government, public sector
Procedia PDF Downloads 27010055 Financing Energy Efficiency: Innovative Options
Authors: Rahul Ravindranathan, R. P. Gokul
Abstract:
India, in its efforts towards economic and social development, is currently experiencing a heavy demand for energy. Due to the lack of sufficient domestic energy reserves, the country is highly dependent on energy imports which has increased rapidly at a rate of about 12 % per annum since 2005. Hence, India is currently focusing its efforts to manage this energy supply and demand gap and eventually achieve energy security. One of the most cost effective means to reduce this gap is by adopting Energy efficiency measures in the country. Initial assessments have shown that Energy efficiency measures have an energy conservation potential of about 23%. For an estimated investment potential of USD 8 Billion, the annual energy savings was estimated to be about 180 Billion Units per annum. In order to explore this huge energy conservation potential, many critical factors need to be considered to achieve practical energy savings. Financing options for these investments is one such major factor. Not only has India come out with various policy level as well as technology level drives to promote Energy efficiency but it has also developed various financing schemes to promote investment in Energy Efficiency projects. The Public sector has already come out with certain financing schemes such as the Partial Risk Guarantee Fund (PRGF), Venture Capital Fund (VCF), Partial Risk Sharing Fund (PRSF) etc., and various sectors are gradually utilizing these schemes to implement energy saving measures. However, additional financing options are required in order to explore the untouched energy conservation potential in the country. Hence, there is a need to develop some innovative financing options for India which would motivate the private sectors as well as financing institutions to invest in these energy saving measures. This paper shall review the existing financing schemes launched by the Government of India and highlight the key benefits as well as challenges with respect to these schemes. In addition to this, the paper would also review new and innovative financing schemes for India and how the same could be adopted in other parts of the globe especially in South and South East Asia. This review would provide an insight to the various Governments as well as Financial Institutions in coming out with new financing schemes for their country.Keywords: energy, efficiency, financing, India
Procedia PDF Downloads 34010054 Balancing Aesthetics, Sustainability, and Safety in Handmade Fabric Face Masks: A Testimony of Creativity and Adaptability
Authors: Anne Mastamet-Mason, Oluwatosin Onakoya, Karla Tissiman
Abstract:
The COVID-19 pandemic that ravaged the world in 2020 brought about the need for handmade fabric face masks in South Africa and beyond. These masks showcased individuality and environmental responsibility and effectively aided our battle against the virus. These practical masks held significant meaning, representing human creativity, resilience, and commitment to sustainability in adversity. This paper examines how aesthetics, sustainability, and safety were achieved in the Handmade Fabric Face Masks. It analyses how their integration signified human agility and resilience to the pandemic while promoting dignity and environmental welfare. The research conducted a qualitative analysis to choose handmade fabric face masks and assess their aesthetic, sustainable, and safety features. The study involved interviewing a group of mask designers and users who evaluated the masks' efficacy in providing protection, aesthetics, and environmental sustainability. Although the designers demonstrated a high level of knowledge in the design aspects, the results indicated a need for more information regarding the functional safety measures and some environmental factors in mask selection and production. The mask analysis also revealed that the masks available in the market combined aesthetics and environmental protection but had limited safety measures. Despite the lack of balance of aesthetics, sustainability, and safety among the designers and the users of hand-fabric masks, functional aspects of fabrics and sustainability literacy are essentialKeywords: sustainable fashion, fabric mask, aesthetics, safety measures
Procedia PDF Downloads 6410053 Quantifying Parallelism of Vectors Is the Quantification of Distributed N-Party Entanglement
Authors: Shreya Banerjee, Prasanta K. Panigrahi
Abstract:
The three-way distributive entanglement is shown to be related to the parallelism of vectors. Using a measurement-based approach a set of 2−dimensional vectors is formed, representing the post-measurement states of one of the parties. These vectors originate at the same point and have an angular distance between them. The area spanned by a pair of such vectors is a measure of the entanglement of formation. This leads to a geometrical manifestation of the 3−tangle in 2−dimensions, from inequality in the area which generalizes for n− qubits to reveal that the n− tangle also has a planar structure. Quantifying the genuine n−party entanglement in every 1|(n − 1) bi-partition it is shown that the genuine n−way entanglement does not manifest in n− tangle. A new quantity geometrically similar to 3−tangle is then introduced that represents the genuine n− way entanglement. Extending the formalism to 3− qutrits, the nonlocality without entanglement can be seen to arise from a condition under which the post-measurement state vectors of a separable state show parallelism. A connection to nontrivial sum uncertainty relation analogous to Maccone and Pati uncertainty relation is then presented using decomposition of post-measurement state vectors along parallel and perpendicular direction of the pre-measurement state vectors. This study opens a novel way to understand multiparty entanglement in qubit and qudit systems.Keywords: Geometry of quantum entanglement, Multipartite and distributive entanglement, Parallelism of vectors , Tangle
Procedia PDF Downloads 15310052 Automatic Seizure Detection Using Weighted Permutation Entropy and Support Vector Machine
Authors: Noha Seddik, Sherine Youssef, Mohamed Kholeif
Abstract:
The automated epileptic seizure detection research field has emerged in the recent years; this involves analyzing the Electroencephalogram (EEG) signals instead of the traditional visual inspection performed by expert neurologists. In this study, a Support Vector Machine (SVM) that uses Weighted Permutation Entropy (WPE) as the input feature is proposed for classifying normal and seizure EEG records. WPE is a modified statistical parameter of the permutation entropy (PE) that measures the complexity and irregularity of a time series. It incorporates both the mapped ordinal pattern of the time series and the information contained in the amplitude of its sample points. The proposed system utilizes the fact that entropy based measures for the EEG segments during epileptic seizure are lower than in normal EEG.Keywords: electroencephalogram (EEG), epileptic seizure detection, weighted permutation entropy (WPE), support vector machine (SVM)
Procedia PDF Downloads 37010051 Assessing the Impact of Social Media on Tourism Industry: Setting Proposition for State Government of India
Authors: Utkrash Sarkar, Vineet Tiwari, Shailendra Singh
Abstract:
The development of social media has brought about a tremendous change in the marketing scenario for every industry. It has become a new hybrid element of the promotional mix in the marketing segment. This paper tries to show some light on the fact that in today’s scenario social media is a platform that everyone should take in consideration for any type of marketing campaign. In this paper, we have formulated a questionnaire, and through it, we have tried to gather information from the respondents that how social media is influencing their decision when they choose their travel destinations for tourism purpose, does it help in creating any awareness about places which they don’t have an idea? As a result, guiding the state government and providing them with a marketing strategy that how they can use social media in a better manner so that they could help increase their revenue and can make people aware about the places of the state which the target audience can plan to go for their next vacation.Keywords: social media, marketing, information, decision making
Procedia PDF Downloads 18310050 On the PTC Thermistor Model with a Hyperbolic Tangent Electrical Conductivity
Authors: M. O. Durojaye, J. T. Agee
Abstract:
This paper is on the one-dimensional, positive temperature coefficient (PTC) thermistor model with a hyperbolic tangent function approximation for the electrical conductivity. The method of asymptotic expansion was adopted to obtain the steady state solution and the unsteady-state response was obtained using the method of lines (MOL) which is a well-established numerical technique. The approach is to reduce the partial differential equation to a vector system of ordinary differential equations and solve numerically. Our analysis shows that the hyperbolic tangent approximation introduced is well suitable for the electrical conductivity. Numerical solutions obtained also exhibit correct physical characteristics of the thermistor and are in good agreement with the exact steady state solutions.Keywords: electrical conductivity, hyperbolic tangent function, PTC thermistor, method of lines
Procedia PDF Downloads 32210049 Optimal Mitigation of Slopes by Probabilistic Methods
Authors: D. De-León-Escobedo, D. J. Delgado-Hernández, S. Pérez
Abstract:
A probabilistic formulation to assess the slopes safety under the hazard of strong storms is presented and illustrated through a slope in Mexico. The formulation is based on the classical safety factor (SF) used in practice to appraise the slope stability, but it is introduced the treatment of uncertainties, and the slope failure probability is calculated as the probability that SF<1. As the main hazard is the rainfall on the area, statistics of rainfall intensity and duration are considered and modeled with an exponential distribution. The expected life-cycle cost is assessed by considering a monetary value on the slope failure consequences. Alternative mitigation measures are simulated, and the formulation is used to get the measures driving to the optimal one (minimum life-cycle costs). For the example, the optimal mitigation measure is the reduction on the slope inclination angle.Keywords: expected life-cycle cost, failure probability, slopes failure, storms
Procedia PDF Downloads 16010048 Effectiveness of a Traits Cooperative Learning on Developing Writing Achievement and Composition among Teacher Candidates
Authors: Abdelaziz Hussien
Abstract:
This article reports investigations of a study into the effectiveness of a traits cooperative learning (TCL) on teacher candidates’ writing achievement, composition, and attitudes towards traits of writing approach and small group learning. Mixed methodologies were used with the participants in a repeated measures quasi-experimental design. Forty-two class teacher candidates, enrolled in the Bahrain Teachers College, completed the pre and post author-developed measures. The results suggest that TCL has a positive effect on the participants’ writing achievement, composition, and attitudes towards traits of writing approach, but not on the attitudes towards small group learning. Further implications to teacher education are presented.Keywords: trait-based language education, cooperative learning, writing achievement, writing composition, traits of writing, teacher education
Procedia PDF Downloads 16910047 Managers' Awareness of Employees' Mental Health in Small- and Medium-Sized Enterprises in Underpopulated Mountainous Areas
Authors: Susumu Fukita, Hiromi Kawasaki, Satoko Yamasaki, Kotomi Yamashita, Tomoko Iki
Abstract:
The increase in the number of workers with mental health problems has become an issue. Many workers work in small- and medium-sized enterprises, which often support local employment and economy, especially in underpopulated mountainous areas. It is important for managers to take mental health measures for employees since there is no budget to hire health staff in small- and medium-sized enterprises. It is necessary to understand the manager's attitude toward the mental health of employees and to publicly support the manager in promoting mental health measures for employees. The purpose of this study was to study the awareness of managers of small- and medium-sized enterprises regarding the mental health of employees and to consider support for managers to take measures for the mental health of employees. Semi-structured interviews were conducted with six managers of small- and medium-sized enterprises in underpopulated mountainous areas in November 2019. Managers were asked about their awareness of the mental health of their employees. Qualitative descriptive analysis was used, and subcategories and categories were extracted. Four categories emerged. Regarding the mental health of employees, the managers acknowledged that if the appearance and behavior of the employees do not interfere with their lives, the manager judges that the employees’ mental health is normal. It was also found that the managers acknowledged that there is a comfortable working environment due to the characteristics of the underpopulated mountainous area. On the other hand, the managers acknowledged that employees are dissatisfied with salaries and management systems. In addition, it was found the manager acknowledged that some employees retire due to mental health problems. Although managers recognized that employees may be dissatisfied with salaries, they also recognized that there was a comfortable working environment due to the characteristics of the areas, with good interpersonal relationships. Economic challenges are difficult to solve in underpopulated mountainous areas. It is useful to consider measures that take advantage of the characteristics of the areas where it is easy to work because of good relations with each other, for example, to create a family-like workplace culture where managers and employees can engage in daily conversation. The managers judged that the employees were in good health if there was no interference with their lives. However, it is too late to take measures at the stage when it becomes an obstacle to life. Therefore, it is necessary to provide training for managers to learn observation techniques by which they quickly notice changes in the situation of employees and give appropriate responses; and to set up a contact point for managers to consult. Local governments should actively provide public support such as training for managers and establishing consultation desks to maintain valuable employment and local economics in underpopulated mountainous areas.Keywords: employer, mental health, small- and medium- sized enterprises, underpopulated areas
Procedia PDF Downloads 14410046 Inferring Cognitive Skill in Concept Space
Authors: Rania A. Aboalela, Javed I. Khan
Abstract:
This research presents a learning assessment theory of Cognitive Skill in Concept Space (CS2) to measure the assessed knowledge in terms of cognitive skill levels of the concepts. The cognitive skill levels refer to levels such as if a student has acquired the state at the level of understanding, or applying, or analyzing, etc. The theory is comprised of three constructions: Graph paradigm of a semantic/ ontological scheme, the concept states of the theory and the assessment analytics which is the process to estimate the sets of concept state at a certain skill level. Concept state means if a student has already learned, or is ready to learn, or is not ready to learn a certain skill level. The experiment is conducted to prove the validation of the theory CS2.Keywords: cognitive skill levels, concept states, concept space, knowledge assessment theory
Procedia PDF Downloads 32210045 Heilong-Amur River: From Disputed Border to Brigde of Cooperation
Abstract:
With the international river playing an increasingly important role in international relations, the border river between China and Russia has attracted more attention. During the history of Sino-Russian relations, Heilong-Amur River used to be a disputed border. The Sino-Russian transboundary water cooperation regarding the Heilong-Amur River started in 1950s and has obtained rapid improvement. In the 21st century, this cooperation has made substantial progress, which is worthy of a further study. However, this cooperation is facing with obstacles in aspects of economy, policy, implementation and mutual understandings. Under this circumstance, from the perspective of China, it is of necessity to realize these problems and take appropriate measures to promote the cooperation. The current Sino-Russian relations is conducive to transboundary water resources cooperation regarding the Heilong-Amur River and some measures adopted by China are already ongoing.Keywords: China, cooperation, Heilong-Amur River, Russia
Procedia PDF Downloads 377