Search results for: things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 847

Search results for: things

337 Designing Supplier Partnership Success Factors in the Coal Mining Industry

Authors: Ahmad Afif, Teuku Yuri M. Zagloel

Abstract:

Sustainable supply chain management is a new pattern that has emerged recently in industry and companies. The procurement process is one of the key factors for efficiency in supply chain management practices. Partnership is one of the procurement strategies for strategic items. The success factors of the partnership must be determined to avoid things that endanger the financial and operational status of the company. The current supplier partnership research focuses on the selection of general criteria and sustainable supplier selection. Currently, there is still limited research on the success factors of supplier partnerships that focus on strategic items in the coal mining industry. Meanwhile, the procurement of coal mining has its own characteristics, and there are regulations related to the procurement of goods. Therefore, this research was conducted to determine the categories of goods that are included in the strategic items and to design the success factors of supplier partnerships. The main factors studied are general, financial, production, reputation, synergies, and sustainable. The research was conducted using the Kraljic method to determine the categories of goods that are included in the strategic items. To design a supplier partnership success factor using the Hybrid Multi Criteria Decision Making method. Integrated Fuzzy AHP-Fuzzy TOPSIS is used to determine the weight of the success factors of supplier partnerships and to rank suppliers on the factors used.

Keywords: supplier, partnership, strategic item, success factors, and coal mining industry

Procedia PDF Downloads 130
336 Artificial Intelligent-Based Approaches for Task ‎Offloading, ‎Resource ‎Allocation and Service ‎Placement of ‎Internet of Things ‎Applications: State of the Art

Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib‎

Abstract:

In order to support the continued growth, critical latency of ‎IoT ‎applications, and ‎various obstacles of traditional data centers, ‎mobile edge ‎computing (MEC) has ‎emerged as a promising solution that extends cloud data-processing and decision-making to edge devices. ‎By adopting a MEC structure, IoT applications could be executed ‎locally, on ‎an edge server, different fog nodes, or distant cloud ‎data centers. However, we are ‎often ‎faced with wanting to optimize conflicting criteria such as ‎minimizing energy ‎consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge ‎devices and trying to ‎keep ‎high performance (reducing ‎response time, increasing throughput and service availability) ‎at the same ‎time‎. Achieving one goal may affect the other, making task offloading (TO), ‎resource allocation (RA), and service placement (SP) complex ‎processes. ‎It is a nontrivial multi-objective optimization ‎problem ‎to study the trade-off between conflicting criteria. ‎The paper provides a survey on different TO, SP, and RA recent multi-‎objective optimization (MOO) approaches used in edge computing environments, particularly artificial intelligent (AI) ones, to satisfy various objectives, constraints, and dynamic conditions related to IoT applications‎.

Keywords: mobile edge computing, multi-objective optimization, artificial ‎intelligence ‎approaches, task offloading, resource allocation, ‎ service placement

Procedia PDF Downloads 115
335 Subject, Language, and Representation: Snyder's Poetics of Emptiness

Authors: Son Hyesook

Abstract:

This project explores the possibility of poetics of emptiness in the poetry of Gary Snyder, one of the most experimental American poets, interpreting his works as an expression of his Buddhist concept, emptiness. This philosophical term demonstrates the lack of intrinsic nature in all phenomena and the absence of an independent, perduring self. Snyder’s poetics of emptiness locates the extralinguistic reality, emptiness, within the contingent nexus of language itself instead of transcending or discarding it. Language, therefore, plays an important role in his poetry, a medium intentionally applied to the carrying out of this Buddhist telos. Snyder’s poetry is characterized by strangeness and disruptiveness of language as is often the case with Asian Zen discourses. The elision of a lyric ‘I’ and transitive verbs, for example, is his grammatic attempt to represent the illusory nature of the self. He replaces the solitary speaker with sparely modified, concrete but generic images to prevent any anthropocentric understanding of the world and to demonstrate human enactment into a harmonious interplay with other elements of life as a part of a vast web of interconnections, where everything is interrelated to every other thing. In many of his poems, Snyder employs grammatical and structural ellipses and paratactical construction to avoid a facile discursive relation and to help the reader illogically imagine the inexpressible, the void. Through various uses of typographical and semantical space, his poetry forces the reader to experience the ‘thought-pause’ and intuitively perceive things-as-they-are. Snyder enacts in his Poetics an alternative to postmodern perspectives on the subject, language, and representation, and revitalizes their skeptical look at any account of human agency and the possibility of language.

Keywords: subject, language, representation, poetics of emptiness

Procedia PDF Downloads 197
334 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 200
333 Assessing the Gap between the Policies and Existing Living Conditions of Migrant Construction Workers: A Case Study of Vijayawada

Authors: Ayushi Mishra

Abstract:

Migrant construction workers or construction labors are one of the majority of the working population in our urban and rural areas. Even after being the majority, their involvement in the upbringing of the economy is hardly ever documented or recognized. Non-permanent or migrant workers face loads of exploitations and susceptibilities than other informal sector workers in India which in turn has affected the productivity of the labors. The relation of their employment and migration and the links of these dynamics to their housing and other basic needs in the city are mostly unstated. Even the urban planning and housing policies do not make thoughtful provision for them, they forcing them to live in extremely wretched conditions. And even if the policies are made, it frequently happens that they are not implemented. As the issue is very much prevalent in today’s time in India with so many large-scale and labor extensive projects going on, this study focuses on the assessment of the gap between the existing government policies and the current scenario of the construction workers in ongoing projects of Vijayawada, Andhra Pradesh. A few of the policies for construction workers conditions a lot of things, out of which only a few are functional which makes this study to assess the reason behind the unorganized living condition and poor physical, the social and mental health of construction workers of Vijayawada. In present, the dignity of construction labors is compromised every day on construction sites, in terms of work and basic rights which leads to many other problems in future. So to work for the betterment of this community, knowledge on the differences is very much required and hence this study is a little effort to replenish the difference and compare the policies with the existing conditions of construction labors in Vijayawada.

Keywords: construction, labours, policy, productivity

Procedia PDF Downloads 330
332 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
331 A Study of Faculty Development Programs in India to Assist Pedagogy and Curriculum Development

Authors: Chhavi Rana, Sanjay K Jain

Abstract:

All sides of every education debate agree that quality learning happens when knowledgeable, caring teachers use sound pedagogy. Many deliberations of pedagogy make the fault of considering it as principally being about teaching. There has been lot of research about how to build a positive climate for learning, improve student curiosity, and enhance classroom association. However, these things can only be facilitated when teachers are equipped with better teaching techniques that use sound and accurate pedagogy. Pedagogy is the science and art of education. Its aims range from the full development of the human being to skills acquisition. In India, a project named Mission 10 x has been started by an esteemed IT Corporation Wipro as a faculty development programme (FDP) that particularly focus on elements that facilitated teachers in developing curriculum and new pedagogies that can lead to improvement in student engagement. This paper presents a study of these FDPs and examines (1) the parameters that help teachers in building new pedagogies (2) the extent to which appropriate usage of pedagogy is improved after the conduct of Mission 10 x FDPs, and (3) whether institutions differ in terms of their ability to convert usage of improved pedagogy into academic performance via these FDPs. The sample consisted of 2,236 students at 6 four-year engineering colleges and universities that completed several FDPs during 2012-2014. Many measures of usage of better pedagogy were linked positively with such FDPs, although some of the relationships were weak in strength. The results suggest that the usage of pedagogy were more benefited after conducting these FDPs and application of novel approaches in conducting classes.

Keywords: student engagement, critical thinking; achievement, student learning, pedagogy

Procedia PDF Downloads 421
330 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors

Authors: João Filipe Papel, Tatsuji Munaka

Abstract:

With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.

Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living

Procedia PDF Downloads 104
329 Happiness and Its Political Consequences: A Proposal for a Socially Constructed Object

Authors: Luciano E. Sewaybricker

Abstract:

Psychology has faced many challenges in order to claim its right to study happiness. Probably the major issue has been to present a clear definition of happiness, which has a long history outside the scientific field and has been used imprecisely in the daily life. Even after years of great improvement, different meanings of happiness still have been seen in academic studies. This scenario allows to question if any definition is consistent enough to sustain the recent findings of the psychological processes behind happiness. Moreover, does it make sense to seek a single definition of happiness? By investigating the history of happiness and the theoretical foundations of Positive Psychology, it can be advocated that it’s proper for happiness to be polysemic. Since Ancient Greece most attempts to outline happiness consists of an appreciation of the "best way to live" and consequently requires a delineation of the most important things in life. Besides this generic definition, it’s hard to find consensus about happiness. In fact, what and how much something will be considered important to happiness depend on social influence. This compels happiness to vary between groups, historical periods, and even for the same person over time. Therefore, the same psychological processes will not necessarily be behind all forms of happiness. Consequently, three assumptions should be considered when studying happiness: it’s intrinsic of happiness to be transitory and socially influenced; happiness refers not only to what is possible in the present, but also to an ideal future; when someone (including a scientist) talks about happiness they describe and prescribe a better way to live. Because any attempt to define happiness will be limited in space and time, it's more suitable to study its variations than its universalities. This may have considerable consequences to political agenda on happiness evaluation and maximization, like Gross National Happiness and utilitarian initiatives. Happiness policies should be understood as an arbitrary choice amongst all kinds of happiness and as prescriptive of what “the best way to live” should be.

Keywords: happiness, politics, positive psychology, well-being

Procedia PDF Downloads 258
328 Effect of Rural Entrepreneurship in Rural Development in Nigeria: A Study of Selected Entrepreneurs in Ikwuano Local Government Area, Abia State, Nigeria

Authors: Ifeanyi Charles Otuokere, Victoria Nneoma Nnochiri

Abstract:

Entrepreneurship generally and specifically within the rural communities in Nigeria is a fast means of bringing development within the communities. This is made possible by utmost maximization and management of available local resources to develop rural areas through good management of these local resources. This study anchors on the rural development paradigm and the integrated rural development theories to understudy the knowledge of rural entrepreneurs on rural economic development. The research study made use of surveys and descriptive analysis. The assessable population for the study, which was randomly selected, is 100 rural entrepreneurs from ten rural communities within the Ikwuano Local Government Area of Abia State. The study made use of both primary and secondary as a source of data collection with much emphasis on a primary source, although secondary data such as journals, textbooks electronic sources were also utilised. A carefully structured questionnaire drafted to extract raw data was administered to selected entrepreneurs. The findings of the study showed that developments within rural communities can only be achieved through rural entrepreneurship. This is evidenced in increased output, job creation, and most importantly, reduction of rural to urban migration, among other things. Recommendations were also made based on these findings; the researchers recommended that infrastructural developments should be made available in the rural communities and government policies should create enabling environments along with other assistance to help these rural entrepreneurs achieve their sole aim.

Keywords: economic developments, rural communities, rural development, rural entrepreneurship

Procedia PDF Downloads 231
327 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 81
326 An Appraisal of the Relationship between Socio-Economic Status and Mental Toughness of Cricketers

Authors: Punam Shaw

Abstract:

Relationship often refers to the acquaintance or association between two or more things, which are interrelated and interdependent. The socio-economic status is obviously a blending of two states, would, therefore, be a ranking of an individual by the society he or she lives in, and in terms of his/her material belonging, cultural possessions along with the degree of respect, power and influence wield. Hence, education, income and occupation of an individual play a significant role in society. Positive mental attitude leads to achieve the set goal, and improve performance particularly in team cohesiveness, which may be determined by various interrelated aspects, which can predict the future assessment in their respective field accordingly. The study intended to examine and explore the relationship between Socio-economic Status and Mental Toughness of cricketers. For the present study descriptive survey research method was used and selected 40 (male=20 female=20) U-17 years registered players under Cricket Association of Bengal (CAB), as the sample population. Modified Socio-Economic Status Scale was used to collect the data regarding players, socioeconomic Status and to assess the mental toughness; Scott Barry Kaufman questionnaire was used. The data had been analysed through applying Pearson’s Correlation Coefficient and t-test as statistical techniques. The findings of the study showed that there is a positive correlation between socioeconomic Status and Mental Toughness among cricketers, it was found that significant difference was presented between male and female SES group. It was further revealed that there is no significant difference between male and female cricketers and in their different socioeconomic class with respect to their mental toughness.

Keywords: cricketers, mental toughness, relationship, socio-economic status

Procedia PDF Downloads 125
325 The Higher Education System in Jordan: Philosophy and Premises Preparation

Authors: Ihsan Orsan Oglah Elrabbaei

Abstract:

This research stems from the philosophy of education notion, as it is a fundamental pillar within or component of the philosophy of education. It is the general framework that society takes towards the future in order to build its integrated educational system amid the variables that surround it, in order to prepare its members in all aspects of cognitive, skill, and behavioral life, so that there is a clear concept of the system of productive values, according to the vision of philosophy that defines its future roles, which can be found in the system of productive values. With the resignation, everything changes. As a result, the philosophy of education is anticipated to evolve in response to perceived changes in society in terms of the nature of its human and material resources. The study will answer the following questions: Has the philosophy of education changed to accommodate this change? Alternatively, is the change that occurs because of natural growth without education having a role in directing this change and being aware of it in order to fit with national, regional, and global changes? Were the national educational goals and curricula and their programs viewed through the lenses of interest? On the other hand, do things happen without realizing that the philosophy of education has changed and that it proceeds according to the natural rolling of the invisible impulse? The study concluded that we must reconsider the philosophy of education and redefine who is an educated person. In addition, to recognize all the values of the roles that the individual can play in his society, according to his abilities, and with respect. Moreover, building a new philosophy of education based on what society can look at and what it wants from a flexible future takes the concept of changing life values, their contents, diversity, and the roles of each individual in them.

Keywords: higher education system, jordan, philosophy, premises preparation.

Procedia PDF Downloads 97
324 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 86
323 Intelligence Failures and Infiltration: The Case of the Ethiopian Army 1977-1991

Authors: Fantahun Ibrahim

Abstract:

The Ethiopian army was one of the largest and most heavily armed ground forces in Africa between 1974 and 1991. It scored a decisive victory over Somalia’s armed forces in March 1978. It, however, failed to withstand the combined onslaught of the northern insurgents from Tigray and Eritrea and finally collapsed in 1991. At the heart of the problem was the army’s huge intelligence failure. The northern insurgents, on the other hand, had a cutting edge in intelligence gathering. Among other things they infiltrated the army high command and managed to get top secrets about the army. Commanders who had fallen into the hands of the insurgents in several battles were told to send letters to their colleagues in the command structure and persuade them to work secretly for the insurgents. Some commanders did work for the insurgents and played a great role in the undoing of military operations. Insurgent commanders were able to warn their fighters about air strikes before jet fighters took off from airfields in the northern theatre. It was not uncommon for leaders of insurgents to get the full details of military operations days before their implementation. Such intelligence failures led to major military disasters like the fall of Afabet (March, 1988), Enda Sellase (February, 1989), Massawa and Debre Tabor (February, 1990), Karra Mishig, Meragna and Alem Ketema (June, 1990). This paper, therefore, seeks to investigate the army’s intelligence failures using untapped archival documents kept at the Ministry of National Defence in Addis Ababa and interviewing key former commanders of the army and ex-leaders of the insurgents.

Keywords: Ethiopian army, intelligence, infiltration, insurgents

Procedia PDF Downloads 307
322 Challenges for Adopting Circular Economy Toward Business Innovation and Supply Chain

Authors: Kapil Khanna, Swee Kuik, Joowon Ban

Abstract:

The current linear economic system is unsustainable due to its dependence on the uncontrolled exploitation of diminishing natural resources. The integration of business innovation and supply chain management has brought about the redesign of business processes through the implementation of a closed-loop approach. The circular economy (CE) offers a sustainable solution to improve business opportunities in the near future by following the principles of rejuvenation and reuse inspired by nature. Those business owners start to rethink and consider using waste as raw material to make new products for consumers. The implementation of CE helps organisations to incorporate new strategic plans for decreasing the use of virgin materials and nature resources. Supply chain partners that are geographically dispersed rely heavily on innovative approaches to support supply chain management. Presently, numerous studies have attempted to establish the concept of supply chain management (SCM) by integrating CE principles, which are commonly denoted as circular SCM. While many scholars have recognised the challenges of transitioning to CE, there is still a lack of consensus on business best practices that can facilitate companies in embracing CE across the supply chain. Hence, this paper strives to scrutinize the SCM practices utilised for CE, identify the obstacles, and recommend best practices that can enhance a company's ability to incorporate CE principles toward business innovation and supply chain performance. Further, the paper proposes future research in the field of using specific technologies such as artificial intelligence, Internet of Things, and blockchain as business innovation tools for supply chain management and CE adoption.

Keywords: business innovation, challenges, circular supply chain, supply chain management, technology

Procedia PDF Downloads 98
321 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 215
320 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 139
319 ePLANETe Idea and Functionalities: Agricultural Sustainability Assessment, Biodiversity, and Stakeholder Involvement

Authors: S. K. Ashiquer Rahman

Abstract:

A cutting-edge online knowledge mediation system called "ePLANETe" provides a framework for building knowledge, tools and methods for all education, research and sustainable practices and elsewhere, as well as the deliberative assessment support of sustainability, biodiversity, and stakeholder involvement issues of the territorial development sector, e.g., agriculture.The purpose is to present, as sectorial and institutional perception, the 'ePLANETe' concept and functionalities as an experimental online platform for contributing the sustainability assessment, biodiversity, and stakeholder involvement. In the upshot, the concept of 'ePLANETe'isan investigation of the challenges of "online things, technology and application". The new digital technologies are exploited to facilitate collaborative technology and application to territorial development issues, e.g., agriculture. In order to investigate the dealing capacity (Qualitative and Quantitative) of sustainability, biodiversity, and stakeholder involvement of the agriculture sector through the stakeholder-based integrated assessment "Deliberation Support Tools (DST) and INTEGRAAL method" of collective resources. Specifically, this paper focuses on integrating system methodologies with deliberation tools for collective assessment and decision-making in implementing regional plans of agriculture. The aim of this report is to identify effective knowledge and tools and to enable deliberation methodologies regarding practices on the sustainability of agriculture and biodiversity issues, societal responsibilities, and regional planning that will create the scope for qualitative and quantitative assessments of sustainability as a new landmark of the agriculture sector.

Keywords: sustainability, biodiversity, stakeholder, dst, integraal

Procedia PDF Downloads 116
318 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective

Authors: Mike Omilusi

Abstract:

Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.

Keywords: corruption, rule of law, human rights, prosecution, commonwealth

Procedia PDF Downloads 203
317 A Case Study on the Census of Technological Capacities in Health Care in Rural Sanitary Institutions in South Cameroon

Authors: Doriane Micaela Andeme Bikoro, Samuel Fosso Wamba, Jean Robert Kala Kamdjoug

Abstract:

Currently one of the leading fields in the market of technological innovation is digital health. In developed countries, this booming innovation is experiencing an exponential speed. We understand that in developed countries, e-health could also revolutionize the practice of medicine and therefore fill the many failures observed in medical care. Everything leads to believe that future technology is oriented towards the medical sector. The aim of this work is to explore at the same time the technological resources and the potential of health care based on new technologies; it is a case study in a rural area of Southern Cameroon. Among other things, we will make a census of the shortcomings and problems encountered, and we will propose various appropriate solutions. The work methodology used here is essentially qualitative. We used two qualitative data collection techniques, direct observation, and interviews. In fact, we spent two weeks in the field observing and conducting some semi-directive interviews with some of those responsible for these health structures. This study was conducted in three health facilities in the south of the country; including two health centers and a rural hospital. Many technological failures have been identified in the day-to-day management of these health facilities and especially in the administration of health care to patients. We note major problems such as the digital divide, the lack of qualified personnel, the state of isolation of this area. This is why various proposals are made to improve the health sector in Cameroon both technologically and medically.

Keywords: Cameroon, capacities, census, digital health, qualitative method, rural area

Procedia PDF Downloads 144
316 Site Analysis’ Importance as a Valid Factor in Building Design

Authors: Mekwa Eme, Anya chukwuma

Abstract:

The act of evaluating a particular site physically and socially in order to create a good design solution that will address the physical and interior environment of the location is known as architectural site analysis. This essay will describe site analysis as a useful design component. According to the introduction and supporting research, site evaluation and analysis are crucial to good design in terms of topography, orientation, site size, accessibility, rainfall, wind direction, and times of sunrise and sunset. Methodology: Both quantitative and qualitative analyses are used in this paper. The primary and secondary types of data collection are as follows. This information was gathered via the case study approach, already published literature, journals, the internet, a local poll, oral interviews, inquiries, and in-person interviews. The purpose of this is to clarify the benefits of site analysis for the design process and its implications for the working or building stage. Results: Each site's criteria are unique in terms of things like soil, plants, trees, accessibility, topography, and security. This will make it easier for the architect and environmentalist to decide on the idea, shape, and supporting structures of the design. It is crucial because before any design work is done, the nature of the target location will be determined through site visits and research. The location, contours, site features, and accessibility are just a few of the topics included in this site study. In order for students and working architects to understand the nature of the site they will be working on, site analysis is a key component of architectural education. The building's orientation, the site's circulation, and the sustainability of the site may all be determined with thorough research of the site's features.

Keywords: analysis, climate, statistics, design

Procedia PDF Downloads 249
315 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 43
314 Extraction and Characterization of Ethiopian Hibiscus macranthus Bast Fiber

Authors: Solomon Tilahun Desisa, Muktar Seid Hussen

Abstract:

Hibiscus macranthus is one of family Malvaceae and genus Hibiscus plant which grows mainly in western part of Ethiopia. Hibiscus macranthus is the most adaptable and abundant plant in the nation, which are used as an ornamental plant often a hedge or fence plant, and used as a firewood after harvesting the stem together with the bark, and used also as a fiber for trying different kinds of things by forming the rope. However, Hibiscus macranthus plant fibre has not been commercially exploited and extracted properly. This study of work describes the possibility of mechanical and retting methods of Hibiscus macranthus fibre extraction and characterization. Hibiscus macranthus fibre is a bast fibre which obtained naturally from the stem or stalks of the dicotyledonous plant since it is a natural cellulose plant fiber. And the fibre characterized by studying its physical and chemical properties. The physical characteristics were investigated as follows, including the length of 100-190mm, fineness of 1.0-1.2Tex, diameter under X100 microscopic view 16-21 microns, the moisture content of 12.46% and dry tenacity of 48-57cN/Tex along with breaking extension of 0.9-1.6%. Hibiscus macranthus fiber productivity was observed that 12-18% of the stem out of which more than 65% is primary long fibers. The fiber separation methods prove to decrease of non-cellulose ingredients in the order of mechanical, water and chemical methods. The color measurement also shows the raw Hibiscus macranthus fiber has a natural golden color according to YID1925 and paler look under both retting methods than mechanical separation. Finally, it is suggested that Hibiscus macranthus fibre can be used for manufacturing of natural and organic crop and coffee packages as well as super absorbent, fine and high tenacity textile products.

Keywords: Hibiscus macranthus, bast fiber, extraction, characterization

Procedia PDF Downloads 210
313 Analyzing the Usage of Social Media: A Study on Elderly in Malaysia

Authors: Chan Eang Teng, Tang Mui Joo

Abstract:

In the beginning of the prevalence of social media, it would be an obvious trend that the young adult age group has the highest population among the users on social media. However, apart from the age group of the users are becoming younger and younger, the elderly group has become a new force on social media, and this age group has increased rapidly. On top of that, the influence of social media towards the elderly is becoming more significant and it is even trending among them. This is because basic computer knowledge is not instilled into their life when they were young. This age group tends to be engrossed more than the young as this is something new for them, and they have the mindset that it is a new platform to approach things, and they tend to be more engrossed when they start getting in touch with the social media. Generally, most of the social media has been accepted and accessed by teenagers and young adult, but it is reasonable to believe that the social media is not really accepted among the elderly. Surprisingly, the elderlies are more addicted to the social media than the teenagers. Therefore, this study is to determine and understand the relationship between the elderly and social media, and how they employ social media in their lives. An online survey on 200 elderly aged 45-80 and an interview with a media expert are conducted to answer the main questions in the research paper. Uses and Gratification Approach is employed in theoretical framework. Finding revealed that majority of the respondents use social media to connect with family, friends, and for leisure purposes. The finding concluded that the elderly use social media differently according to their needs and wants which is in par with the highlight of Uses and Gratification theory. Considering the significantly large role social media plays in our culture and daily life today, the finding will shed some light on the effect of social media on the elderly or senior citizens who are usually relegated into a minority group in today’s age where the internet and social media are of great importance to our society and humanity in general. This may also serve to be useful in understanding behavioral patterns and preference in terms of social media usage among the elderly.

Keywords: elderly, Facebook, Malaysia, social media

Procedia PDF Downloads 365
312 Bluetooth Communication Protocol Study for Multi-Sensor Applications

Authors: Joao Garretto, R. J. Yarwood, Vamsi Borra, Frank Li

Abstract:

Bluetooth Low Energy (BLE) has emerged as one of the main wireless communication technologies used in low-power electronics, such as wearables, beacons, and Internet of Things (IoT) devices. BLE’s energy efficiency characteristic, smart mobiles interoperability, and Over the Air (OTA) capabilities are essential features for ultralow-power devices, which are usually designed with size and cost constraints. Most current research regarding the power analysis of BLE devices focuses on the theoretical aspects of the advertising and scanning cycles, with most results being presented in the form of mathematical models and computer software simulations. Such computer modeling and simulations are important for the comprehension of the technology, but hardware measurement is essential for the understanding of how BLE devices behave in real operation. In addition, recent literature focuses mostly on the BLE technology, leaving possible applications and its analysis out of scope. In this paper, a coin cell battery-powered BLE Data Acquisition Device, with a 4-in-1 sensor and one accelerometer, is proposed and evaluated with respect to its Power Consumption. First, evaluations of the device in advertising mode with the sensors turned off completely, followed by the power analysis when each of the sensors is individually turned on and data is being transmitted, and concluding with the power consumption evaluation when both sensors are on and respectively broadcasting the data to a mobile phone. The results presented in this paper are real-time measurements of the electrical current consumption of the BLE device, where the energy levels that are demonstrated are matched to the BLE behavior and sensor activity.

Keywords: bluetooth low energy, power analysis, BLE advertising cycle, wireless sensor node

Procedia PDF Downloads 91
311 An Interactive Voice Response Storytelling Model for Learning Entrepreneurial Mindsets in Media Dark Zones

Authors: Vineesh Amin, Ananya Agrawal

Abstract:

In a prolonged period of uncertainty and disruptions in the pre-said normal order, non-cognitive skills, especially entrepreneurial mindsets, have become a pillar that can reform the educational models to inform the economy. Dreamverse Learning Lab’s IVR-based storytelling program -Call-a-Kahaani- is an evolving experiment with an aim to kindle entrepreneurial mindsets in the remotest locations of India in an accessible and engaging manner. At the heart of this experiment is the belief that at every phase in our life’s story, we have a choice which brings us closer to achieving our true potential. This interactive program is thus designed using real-time storytelling principles to empower learners, ages 24 and below, to make choices and take decisions as they become more self-aware, practice grit, try new things through stories, guided activities, and interactions, simply over a phone call. This research paper highlights the framework behind an ongoing scalable, data-oriented, low-tech program to kindle entrepreneurial mindsets in media dark zones supported by iterative design and prototyping to reach 13700+ unique learners who made 59000+ calls for 183900+min listening duration to listen to content pieces of around 3 to 4 min, with the last monitored (March 2022) record of 34% serious listenership, within one and a half years of its inception. The paper provides an in-depth account of the technical development, content creation, learning, and assessment frameworks, as well as mobilization models which have been leveraged to build this end-to-end system.

Keywords: non-cognitive skills, entrepreneurial mindsets, speech interface, remote learning, storytelling

Procedia PDF Downloads 209
310 Assessment of the Implementation of Recommended Teaching and Evaluation Methods of NCE Arabic Language Curriculum in Colleges of Education in North Western Nigeria

Authors: Hamzat Shittu Atunnise

Abstract:

This study on Assessment of the Implementation of Recommended Teaching and Evaluation Methods of the Nigeria Certificate in Education (NCE) Arabic Language Curriculum in Colleges of Education in North Western Nigeria was conducted with four objectives, four research questions and four null hypotheses. Descriptive survey design was used and the multistage sampling procedure adopted. Frequency count and percentage were used to answer research questions and chi-square was used to test all the null hypotheses at an Alpha 0.05 level of significance. Two hundred and ninety one subjects were drawn as sample. Questionnaires were used for data collection. The Context, Input, Process and Product (CIPP) model of evaluation was employed. The study findings indicated that: there were no significant difference in the perceptions of lecturers and students from Federal and State Colleges of Education on the following: extent of which lecturers employ appropriate methods in teaching the language and extent of which recommended evaluation methods are utilized for the implementation of Arabic Curriculum. Based on these findings, it was recommended among other things that: lecturers should adopt teaching methodologies that promote interactive learning; Governments should ensure that information and communication technology facilities are made available and usable in all Colleges of Education; Lecturers should vary their evaluation methods because other methods of evaluation can meet and surpass the level of learning and understanding which essay type questions are believed to create and that language labs should be used in teaching Arabic in Colleges of Education because comprehensive language learning is possible through both classroom and language lab teaching.

Keywords: assessment, arabic language, curriculum, methods of teaching, evaluation methods, NCE

Procedia PDF Downloads 58
309 Inequality of Opportunities in the Health of the Adult Population of Russia

Authors: Marina Kartseva, Polina Kuznetsova

Abstract:

In our work, we estimate the contribution of inequality of opportunity to inequality in the health of the Russian population aged 25 to 74 years. The empirical basis of the study is the nationally representative data of the RLMS for 2018. Individual health is measured using a self-reported status on five-point scale. The startconditions are characterized by parental education and place of birth (country, type of settlement). Personal efforts to maintain health include the level of education, smoking status, and physical activity. To understand how start opportunities affect an individual's health, we use the methodology proposed in (Trannoy et al., 2010), which takes into account both direct and indirect (through the influence on efforts) effects. Regression analysis shows that all other things being equal, the starting capabilities of individuals have a significant impact on their health. In particular, parental education has a positive effect on self-reported health. Birth in another country, in another settlement, and in an urban area, on the contrary, reduceself-reported health. This allows to conclude that there exists an unfair inequality in health, namely inequality caused by factors that are independent of a person's own efforts. We estimate the contribution of inequality of opportunity to inequality in health using a nonparametric approach (Checchi, Peragine, 2010; Lazar, 2013). According to the obtained results, the contribution of unfair inequality as 72-74% for the population as a whole, being slightly higher for women (62-74% and 60-69% for men and women, respectively) and for older age (59- 62% and 67-75% for groups 25-44 years old and 45-74 years old, respectively). The obtained estimates are comparable with the results for other countries and indicate the importance of the problem of inequality of opportunities in health in Russia.

Keywords: inequality of opportunity, inequality in health, self-reported health, efforts, health-related lifestyle, Russia, RLMS

Procedia PDF Downloads 184
308 Austrian Standard German Struggling between Language Change, Loyalty to Its Variants and Norms: A Study on Linguistic Identity of Austrian Teachers and Students

Authors: Jutta Ransmayr

Abstract:

The German language is known to be one of the most varied and diverse languages in Europe. This variance in the standard language can be conceptualized using the pluricentric concept, which has been useful for describing the German language for more than three decades. Up to now, there have hardly been any well-founded studies of how Austrian teachers and pupils conceptualize the German language and how they view the varieties of German and especially Austrian German. The language attitudes and norms of German teachers are of particular interest in the normative, educational language-oriented school context. The teachers’ attitudes are, in turn, formative for the attitudes of the students, especially since Austrian German is an important element in the construction of Austrian national identity. The project 'Austrian German as a Language of Instruction and Education' dealt, among other things, with the attitude of language laypeople (pupils, n = 1253) and language experts (teachers, n = 164) towards the Austrian standard variety. It also aimed to find out to what extent external factors such as regional origin, age, education, or media use to influence these attitudes. It was examined whether language change phenomena can be determined and to what extent language change is in conflict with loyalty to variants. The study also focused on what norms prevail among German teachers, how they deal with standard language variation from a normative point of view, and to what extent they correct exonorm-oriented, as claimed in the literature. Methodologically, both quantitative (questionnaire survey) and qualitative methods were used (interviews with 21 teachers, 2 group discussions, and participatory observation of lessons in 7 school classes). The data were evaluated in terms of inference statistics and discourse analysis. This paper reports on the results of this project.

Keywords: Austrian German, language attitudes and linguistic identity, linguistic loyalty, teachers and students

Procedia PDF Downloads 117