Search results for: public policy information systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24097

Search results for: public policy information systems

18337 A Cost Effective Approach to Develop Mid-Size Enterprise Software Adopted the Waterfall Model

Authors: Mohammad Nehal Hasnine, Md Kamrul Hasan Chayon, Md Mobasswer Rahman

Abstract:

Organizational tendencies towards computer-based information processing have been observed noticeably in the third-world countries. Many enterprises are taking major initiatives towards computerized working environment because of massive benefits of computer-based information processing. However, designing and developing information resource management software for small and mid-size enterprises under budget costs and strict deadline is always challenging for software engineers. Therefore, we introduced an approach to design mid-size enterprise software by using the Waterfall model, which is one of the SDLC (Software Development Life Cycles), in a cost effective way. To fulfill research objectives, in this study, we developed mid-sized enterprise software named “BSK Management System” that assists enterprise software clients with information resource management and perform complex organizational tasks. Waterfall model phases have been applied to ensure that all functions, user requirements, strategic goals, and objectives are met. In addition, Rich Picture, Structured English, and Data Dictionary have been implemented and investigated properly in engineering manner. Furthermore, an assessment survey with 20 participants has been conducted to investigate the usability and performance of the proposed software. The survey results indicated that our system featured simple interfaces, easy operation and maintenance, quick processing, and reliable and accurate transactions.

Keywords: end-user application development, enterprise software design, information resource management, usability

Procedia PDF Downloads 423
18336 Modelling of Relocation and Battery Autonomy Problem on Electric Cars Sharing Dynamic by Using Discrete Event Simulation and Petri Net

Authors: Taha Benarbia, Kay W. Axhausen, Anugrah Ilahi

Abstract:

Electric car sharing system as ecologic transportation increasing in the world. The complexity of managing electric car sharing systems, especially one-way trips and battery autonomy have direct influence to on supply and demand of system. One must be able to precisely model the demand and supply of these systems to better operate electric car sharing and estimate its effect on mobility management and the accessibility that it provides in urban areas. In this context, our work focus to develop performances optimization model of the system based on discrete event simulation and stochastic Petri net. The objective is to search optimal decisions and management parameters of the system in order to fulfil at best demand while minimizing undesirable situations. In this paper, we present new model of electric cars sharing with relocation based on monitoring system. The proposed approach also help to precise the influence of battery charging level on the behaviour of system as important decision parameter of this complex and dynamical system.

Keywords: electric car-sharing systems, smart mobility, Petri nets modelling, discrete event simulation

Procedia PDF Downloads 165
18335 Impact of Increasing Distributed Solar PV Systems on Distribution Networks in South Africa

Authors: Aradhna Pandarum

Abstract:

South Africa is experiencing an exponential growth of distributed solar PV installations. This is due to various factors with the predominant one being increasing electricity tariffs along with decreasing installation costs, resulting in attractive business cases to some end-users. Despite there being a variety of economic and environmental advantages associated with the installation of PV, their potential impact on distribution grids has yet to be thoroughly investigated. This is especially true since the locations of these units cannot be controlled by Network Service Providers (NSPs) and their output power is stochastic and non-dispatchable. This report details two case studies that were completed to determine the possible voltage and technical losses impact of increasing PV penetration in the Northern Cape of South Africa. Some major impacts considered for the simulations were ramping of PV generation due to intermittency caused by moving clouds, the size and overall hosting capacity and the location of the systems. The main finding is that the technical impact is different on a constrained feeder vs a non-constrained feeder. The acceptable PV penetration level is much lower for a constrained feeder than a non-constrained feeder, depending on where the systems are located.

Keywords: medium voltage networks, power system losses, power system voltage, solar photovoltaic

Procedia PDF Downloads 134
18334 Consumer Cognitive Models of Vaccine Attitudes: Behavioral Informed Strategies Promoting Vaccination Policy in Greece

Authors: Halkiopoulos Constantinos, Koutsopoulou Ioanna, Gkintoni Evgenia, Antonopoulou Hera

Abstract:

Immunization appears to be an essential part of health care service in times of pandemics such as covid-19 and aims not only to protect the health of the population but also the health and sustainability of the economies of the countries affected. It is reported that more than 3.44 billion doses have been administered so far, which accounts for 45 doses for 100 people. Vaccination programs in various countries have been promoted and accepted by people differently and therefore they proceeded in different ways and speed; most countries directing them towards people with vulnerable chronic or recent health statuses. Large scale restriction measures or lockdown, personal protection measures such as masks and gloves and a decrease in leisure and sports activities were also implemented around the world as part of the protection health strategies against the covid-19 pandemic. This research aims to present an analysis based on variations on people’s attitudes towards vaccination based on demographic, social and epidemiological characteristics, and health status on the one hand and perception of health, health satisfaction, pain, and quality of life on the other hand. 1500 Greek e-consumers participated in the research, mainly through social media who took part in an online-based survey voluntarily. The questionnaires included demographic, social and medical characteristics of the participants, and questions asking people’s willingness to be vaccinated and their opinion on whether there should be a vaccine against covid-19. Other stressor factors were also reported in the questionnaires and participants’ loss of someone close due to covid-19, or staying at home quarantine due to being infected from covid-19. WHOQUOL-BREF and GLOBAL PSYCHOTRAUMA SCREEN- GPS were used with kind permission from WHO and from the International Society for Traumatic Stress Studies in this study. Attitudes towards vaccination varied significantly related to aging, level of education, health status and consumer behavior. Health professionals’ attitudes also varied in relation to age, level of education, profession, health status and consumer needs. Vaccines have been the most common technological aid of human civilization so far in the fight against viruses. The results of this study can be used for health managers and digital marketers of pharmaceutical companies and also other staff involved in vaccination programs and for designing health policy immunization strategies during pandemics in order to achieve positive attitudes towards vaccination and larger populations being vaccinated in shorter periods of time after the break out of pandemic. Health staff needs to be trained, aided and supervised to go through with vaccination programs and to be protected through vaccination programs themselves. Feedback in each country’s vaccination program, short backs, deficiencies and delays should be addressed and worked out.

Keywords: consumer behavior, cognitive models, vaccination policy, pandemic, Covid-19, Greece

Procedia PDF Downloads 176
18333 Building Information Modelling Implementation in the Lifecycle of Sustainable Buildings

Authors: Scarlet Alejandra Romano, Joni Kareco

Abstract:

The three pillars of sustainability (social, economic and environmental) are relevant concepts to the Architecture, Engineering, and Construction (AEC) industry because of the increase of international agreements and guidelines related to this topic during the last years. Considering these three pillars, the AEC industry faces important challenges, for instance, to decrease the carbon emissions (environmental challenge), design sustainable spaces for people (social challenge), and improve the technology of this field to reduce costs and environmental problems (economic and environmental challenge). One alternative to overcome these challenges is Building Information Modelling program (BIM) because according to several authors, this technology improves the performance of the sustainable buildings in all their lifecycle phases. The main objective of this paper is to explore and analyse the current advantages and disadvantages of the BIM implementation in the life-cycle of sustainable buildings considering the three pillars of sustainability as analysis parameters. The methodology established to achieve this objective is exploratory-descriptive with the literature review technique. The partial results illustrate that despite the BIM disadvantages and the lack of information about its social sustainability advantages, this software represents a significant opportunity to improve the three sustainable pillars of the sustainable buildings.

Keywords: building information modelling, building lifecycle analysis, sustainability, sustainable buildings

Procedia PDF Downloads 166
18332 Preliminary Performance of a Liquid Oxygen-Liquid Methane Pintle Injector for Thrust Variations

Authors: Brunno Vasques

Abstract:

Due to the non-toxic nature and high performance in terms of vacuum specific impulse and density specific impulse, the combination of liquid oxygen and liquid methane have been identified as a promising option for future space vehicle systems. Applications requiring throttling capability include specific missions such as rendezvous, planetary landing and de-orbit as well as weapon systems. One key challenge in throttling liquid rocket engines is maintaining an adequate pressure drop across the injection elements, which is necessary to provide good propellant atomization and mixing as well as system stability. The potential scalability of pintle injectors, their great suitability to throttling and inherent combustion stability characteristics led to investigations using a variety of propellant combinations, including liquid oxygen and hydrogen and fluorine-oxygen and methane. Presented here are the preliminary performance and heat transfer information obtained during hot-fire testing of a pintle injector running on liquid oxygen and liquid methane propellants. The specific injector design selected for this purpose is a multi-configuration building block version with replaceable injection elements, providing flexibility to accommodate hardware modifications with minimum difficulty. On the basis of single point runs and the use of a copper/nickel segmented calorimetric combustion chamber and associated transient temperature measurement, the characteristic velocity efficiency, injector footprint and heat fluxes could be established for the first proposed pintle configuration as a function of injection velocity- and momentum-ratios. A description of the test-bench is presented as well as a discussion of irregularities encountered during testing, such as excessive heat flux into the pintle tip resulting from certain operating conditions.

Keywords: green propellants, hot-fire performance, rocket engine throttling, pintle injector

Procedia PDF Downloads 318
18331 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization

Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad

Abstract:

In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.

Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler

Procedia PDF Downloads 134
18330 User Selections on Social Network Applications

Authors: C. C. Liang

Abstract:

MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.

Keywords: consumer behavior, social media, technology acceptance model, flow experience

Procedia PDF Downloads 340
18329 Rabies Surveillance Data Analysis in Addis Ababa, Ethiopia during 2012/13: Retrospective Cross Sectional Study

Authors: Fantu Lombamo Untiso, Sylvia Murphy, Emily Pieracci

Abstract:

Background: Rabies is a highly fatal viral disease of all warm-blooded animals including human globally. However, effective rabies control program still remains to be a reality and needs to be strengthened. Objective: Reviewing of recorded data and analyzing it to generate information on the status of rabies in Addis Ababa in the year 2012/13. Methods: A retrospective data were used from the Ethiopian Public Health Institute rabies case record book registered in the year 2012/13. Results: Among 1357 suspected rabid animals clinically examined; only 8.84% were positive for rabies. Out of 216 animal brains investigated in the laboratory with Fluorescent Antibody Technique, 55.5% were confirmed rabies positive. Among the laboratory confirmed positive rabies cases, high percentage of the animals came from Yeka (20%) and lower number from Kirkos subcity (3.3%). Out of 1149 humans who came to the institute seeking anti-rabies post-exposure prophylaxis, 85.65% and 7.87% of them were exposed to suspected dogs and cats respectively. 3 human deaths due to rabies were reported in the year after exposure to dog bite of unknown vaccination status. Conclusion: The principal vector of rabies in Addis Ababa is dog. Effective rabies management and control based on confirmed cases and mass-immunization and control of stray dog populations is recommended.

Keywords: Addis Ababa, exposure, rabies, surveillance

Procedia PDF Downloads 159
18328 Multimodal Characterization of Emotion within Multimedia Space

Authors: Dayo Samuel Banjo, Connice Trimmingham, Niloofar Yousefi, Nitin Agarwal

Abstract:

Technological advancement and its omnipresent connection have pushed humans past the boundaries and limitations of a computer screen, physical state, or geographical location. It has provided a depth of avenues that facilitate human-computer interaction that was once inconceivable such as audio and body language detection. Given the complex modularities of emotions, it becomes vital to study human-computer interaction, as it is the commencement of a thorough understanding of the emotional state of users and, in the context of social networks, the producers of multimodal information. This study first acknowledges the accuracy of classification found within multimodal emotion detection systems compared to unimodal solutions. Second, it explores the characterization of multimedia content produced based on their emotions and the coherence of emotion in different modalities by utilizing deep learning models to classify emotion across different modalities.

Keywords: affective computing, deep learning, emotion recognition, multimodal

Procedia PDF Downloads 137
18327 Implementation of ISO 26262: Issues and Challenges

Authors: Won Jung, Azianti Ismail

Abstract:

Functional safety is about electrical, electronics, and programmable electronic safety-related system focuses on the potential risk of malfunction which may have a significant impact on the safety of humans and/or the environment based on IEC 61508. In November 2011, the automotive industry has been introduced to automotive functional safety ISO 26262 which addresses the complete safety installation from sensor to actuator with its technical as well as management issues. Nowadays, most of the modern automobiles are equipped with embedded electronic systems which include many Electronic Controller Units (ECUs), electronic sensors, signals, bus systems and coding. Due to upcoming more sophisticated systems installed in automobiles, the need to carry out detailed safety is very crucial. Assimilation of existing practices with this new standard is a major challenge for the automotive industry in reducing redundancy, time and resources. Therefore, this paper will analyze the research trends on pre and post introduction of ISO 26262 through publications as well as to take a glimpse in the activities for implementing this standard by the automotive manufacturers around the world. It is going to highlight issues and challenges which have been discussed among the experts in this field. Even though it will take some time for this standard to be fully implemented, the benefits from this implementation will raise the competitiveness in the global automotive market.

Keywords: ISO 26262, automotive, functional safety, implementation, standard, challenges

Procedia PDF Downloads 383
18326 The Extent of Virgin Olive-Oil Prices' Distribution Revealing the Behavior of Market Speculators

Authors: Fathi Abid, Bilel Kaffel

Abstract:

The olive tree, the olive harvest during winter season and the production of olive oil better known by professionals under the name of the crushing operation have interested institutional traders such as olive-oil offices and private companies such as food industry refining and extracting pomace olive oil as well as export-import public and private companies specializing in olive oil. The major problem facing producers of olive oil each winter campaign, contrary to what is expected, it is not whether the harvest will be good or not but whether the sale price will allow them to cover production costs and achieve a reasonable margin of profit or not. These questions are entirely legitimate if we judge by the importance of the issue and the heavy complexity of the uncertainty and competition made tougher by a high level of indebtedness and the experience and expertise of speculators and producers whose objectives are sometimes conflicting. The aim of this paper is to study the formation mechanism of olive oil prices in order to learn about speculators’ behavior and expectations in the market, how they contribute by their industry knowledge and their financial alliances and the size the financial challenge that may be involved for them to build private information hoses globally to take advantage. The methodology used in this paper is based on two stages, in the first stage we study econometrically the formation mechanisms of olive oil price in order to understand the market participant behavior by implementing ARMA, SARMA, GARCH and stochastic diffusion processes models, the second stage is devoted to prediction purposes, we use a combined wavelet- ANN approach. Our main findings indicate that olive oil market participants interact with each other in a way that they promote stylized facts formation. The unstable participant’s behaviors create the volatility clustering, non-linearity dependent and cyclicity phenomena. By imitating each other in some periods of the campaign, different participants contribute to the fat tails observed in the olive oil price distribution. The best prediction model for the olive oil price is based on a back propagation artificial neural network approach with input information based on wavelet decomposition and recent past history.

Keywords: olive oil price, stylized facts, ARMA model, SARMA model, GARCH model, combined wavelet-artificial neural network, continuous-time stochastic volatility mode

Procedia PDF Downloads 323
18325 Health Burden of Disease Assessment for Minimizing Aflatoxin Exposure in Peanuts

Authors: Min-Pei Ling

Abstract:

Aflatoxin is a fungal secondary metabolite with high toxicity capable of contaminating various types of food crops. It has been identified as a Group 1 human carcinogen by the International Agency for Research on Cancer. Chronic aflatoxin exposure has caused a worldwide public food safety concern. Peanuts and peanut products are the major sources of aflatoxin exposure. Therefore, some reduction interventions have been developed to minimize contamination through the peanut production chain. The purpose of this study is to estimate the efficacy of interventions in reducing the health impact of hepatocellular carcinoma caused by aflatoxin contamination in peanuts. The estimated total disability-adjusted life-years (DALYs) was calculated using FDA-iRISK online software. Six aflatoxin reduction strategies were evaluated, including good agricultural practice (GAP), biocontrol, Purdue Improved Crop Storage packaging, basic processing, ozonolysis, and ultraviolet irradiation. The results indicated that basic processing could prevent huge public health loss of 4,079.7–21,833 total DALYs per year, which accounted for 39.6% of all decreased total DALYs. GAP and biocontrol were both effective strategies in the farm field, while the other three interventions were limited in reducing total DALYs. In conclusion, this study could help farmers, processing plants, and government policymakers to alleviate aflatoxin contamination issues in the peanut production chain.

Keywords: aflatoxin, health burden, disability-adjusted life-years, peanuts

Procedia PDF Downloads 113
18324 Rewriting the 'Sick Man' History: Imagining Chinese Masculinity in the Contemporary Military Action Genre

Authors: Yongde Dai

Abstract:

The recent Chinese military action blockbusters, notably known as, Wolf Warrior/Zhan Lang (2015), Operation Mekong/Mei gong he xing dong (2016), Warrior 2/Zhan Lang 2 (2017) and Operation Red Sea/Hong hai xing dong (2018), have achieved phenomenal box-office successes and in particular, Wolf Warrior 2 became China’s highest-grossing film of all time. However, their yearly presence tends to show a paradigmic shift from China’s primacy of wen manliness (soft) to wu masculinity (hard). With the increasing cinematic exposure of a more muscular image manifesting in both the Chinese heroic soldiers and China itself as a rising global power, the backlash of the Chinese public against the proliferation of the feminized masculinity influenced by the ‘pretty-boy’ pop-culture and China’s harder approach to the current Sino-US tensions have correspondingly emerged and continued to brew. Chinese masculinity imagined in these films is one of the key factors that enable a gendered interpretation of the correlation between the Chinese on-screen fantasy and off-screen reality, that is, China’s public and official discourse about the hegemonic masculinity and non-hegemonic masculinity as well as China’s international profile on cinematic appearance and in today’s Sino-US relation. By reading closely at the four megahits as visual-audio texts with Chinese masculinity studies by Kam Louie and Geng Song, this paper attempts to examine the Chinese construction of manliness with historical accounts and argue why and how the recurrent emphasis of hard/military masculinity (wu) on screen are viewed as China’s contemporary rewriting of the ‘sick-man’ history in the film form. Through this investigation, the paper finds that the rewriting of the ‘sick-man’ history in the cinematic world through heroic brawny soldiers comes to resonate a collective anxiety of China in countering the real-life increasing feminized masculinity on the public appearance, particularly on the male celebrities. In addition, the superpower fantasy about China illuminates a hypermasculine imaginary of China as a global rising power and this coincidently echoes China’s current tougher diplomatic strategy tackling the Sino-US trade war, South China sea dispute and Huawei-US lawsuits.

Keywords: Chinese masculinity, Chinese military action film, feminized masculinity, manhood and nationhood, sick man of Asia

Procedia PDF Downloads 129
18323 Shaping and Improving the Human Resource Management in Small and Medium Enterprises in Poland

Authors: Małgorzata Smolarek

Abstract:

One of the barriers to the development of small and medium-sized enterprises (SME) are difficulties connected with management of human resources. The first part of article defines the specifics of staff management in small and medium enterprises. The practical part presents results of own studies in the area of diagnosis of the state of the human resources management in small and medium-sized enterprises in Poland. It takes into account its impact on the functioning of SME in a variable environment. This part presents findings of empirical studies, which enabled verification of the hypotheses and formulation of conclusions. The findings presented in this paper were obtained during the implementation of the project entitled 'Tendencies and challenges in strategic managing SME in Silesian Voivodeship.' The aim of the studies was to diagnose the state of strategic management and human resources management taking into account its impact on the functioning of small and medium enterprises operating in Silesian Voivodeship in Poland and to indicate improvement areas of the model under diagnosis. One of the specific objectives of the studies was to diagnose the state of the process of strategic management of human resources and to identify fundamental problems. In this area, the main hypothesis was formulated: The enterprises analysed do not have comprehensive strategies for management of human resources. The survey was conducted by questionnaire. Main Research Results: Human resource management in SMEs is characterized by simplicity of procedures, and the lack of sophisticated tools and its specificity depends on the size of the company. The process of human resources management in SME has to be adjusted to the structure of an organisation, result from its objectives, so that an organisation can fully implement its strategic plans and achieve success and competitive advantage on the market. A guarantee of success is an accurately developed policy of human resources management based on earlier analyses of the existing procedures and possessed human resources.

Keywords: human resources management, human resources policy, personnel strategy, small and medium enterprises

Procedia PDF Downloads 225
18322 Spatio-Temporal Variation of Gaseous Pollutants and the Contribution of Particulate Matters in Chao Phraya River Basin, Thailand

Authors: Samart Porncharoen, Nisa Pakvilai

Abstract:

The elevated levels of air pollutants in regional atmospheric environments is a significant problem that affects human health in Thailand, particularly in the Chao Phraya River Basin. Of concern are issues surrounding ambient air pollution such as particulate matter, gaseous pollutants and more specifically concerning air pollution along the river. Therefore, the spatio-temporal study of air pollution in this real environment can gain more accurate air quality data for making formalized environmental policy in river basins. In order to inform such a policy, a study was conducted over a period of January –December, 2015 to continually collect measurements of various pollutants in both urban and regional locations in the Chao Phraya River Basin. This study investigated the air pollutants in many diverse environments along the Chao Phraya River Basin, Thailand in 2015. Multivariate Analysis Techniques such as Principle Component Analysis (PCA) and Path analysis were utilised to classify air pollution in the surveyed location. Measurements were collected in both urban and rural areas to see if significant differences existed between the two locations in terms of air pollution levels. The meteorological parameters of various particulates were collected continually from a Thai pollution control department monitoring station over a period of January –December, 2015. Of interest to this study were the readings of SO2, CO, NOx, O3, and PM10. Results showed a daily arithmetic mean concentration of SO2, CO, NOx, O3, PM10 reading at 3±1 ppb, 0.5± 0.5 ppm, 30±21 ppb, 19±16 ppb, and 40±20 ug/m3 in urban locations (Bangkok). During the same time period, the readings for the same measurements in rural areas, Ayutthaya (were 1±0.5 ppb, 0.1± 0.05 ppm, 25±17 ppb, 30±21 ppb, and 35±10 ug/m3respectively. This show that Bangkok were located in highly polluted environments that are dominated source emitted from vehicles. Further, results were analysed to ascertain if significant seasonal variation existed in the measurements. It was found that levels of both gaseous pollutants and particle matter in dry season were higher than the wet season. More broadly, the results show that levels of pollutants were measured highest in locations along the Chao Phraya. River Basin known to have a large number of vehicles and biomass burning. This correlation suggests that the principle pollutants were from these anthropogenic sources. This study contributes to the body of knowledge surrounding ambient air pollution such as particulate matter, gaseous pollutants and more specifically concerning air pollution along the Chao Phraya River Basin. Further, this study is one of the first to utilise continuous mobile monitoring along a river in order to gain accurate measurements during a data collection period. Overall, the results of this study can be used for making formalized environmental policy in river basins in order to reduce the physical effects on human health.

Keywords: air pollution, Chao Phraya river basin, meteorology, seasonal variation, principal component analysis

Procedia PDF Downloads 269
18321 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 469
18320 An Assessment of Adverse Events Following Immunization Reporting Pattern of Selected Vaccines in VigiAccess

Authors: Peter Yamoah, Frasia Oosthuizen

Abstract:

Introduction: Reporting of Adverse Events Following Immunization continues to be a challenge. Pharmacovigilance centers throughout the world are mandated by the WHO to submit AEFI reports from various countries to a large pool of adverse drug reaction electronic database called Vigibase. Despite the relevant information of AEFI in Vigibase, it is unavailable to the general public. However, the WHO has an alternative website called VigiAccess which is an open access website serving as a repository of reported adverse drug reactions and AEFIs. The aim of the study was to ascertain the reporting pattern of a number of commonly used vaccines in VigiAccess. Methods: VigiAccess was thoroughly searched on the 5th of February 2018 for AEFI reports of measles vaccine, oral polio vaccine (OPV), yellow fever vaccine, pneumococcal vaccine, rotavirus vaccine, meningococcal vaccine, tetanus vaccine and tuberculosis (BCG) vaccine. These were reports from all pharmacovigilance centers in the world from the time they joined the WHO drug monitoring program. Results: After a thorough search in VigiAccess, there were 9,062 measles vaccine AEFIs, 185,829 OPV AEFIs, 24,577 yellow fever vaccine AEFIs, 317,208 pneumococcal vaccine AEFIs, 73,513 rotavirus vaccine AEFIs, 145,447 meningococcal vaccine AEFIs, 22,781 tetanus vaccine AEFIs and 35,556 BCG vaccine AEFIs. Conclusion: The study revealed that out of the eight vaccines studied, pneumococcal vaccines are associated with the highest number of AEFIs whilst measles vaccines were associated with the least AEFIs.

Keywords: vaccines, adverse reactions, VigiAccess, adverse event reporting

Procedia PDF Downloads 137
18319 A Method for Multimedia User Interface Design for Mobile Learning

Authors: Shimaa Nagro, Russell Campion

Abstract:

Mobile devices are becoming ever more widely available, with growing functionality, and are increasingly used as an enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material user interfaces for mobile devices is beset by many unresolved research issues such as those arising from emphasising the information concepts then mapping this information to appropriate media (modelling information then mapping media effectively). This report describes a multimedia user interface design method for mobile learning. The method covers specification of user requirements and information architecture, media selection to represent the information content, design for directing attention to important information, and interaction design to enhance user engagement based on Human-Computer Interaction design strategies (HCI). The method will be evaluated by three different case studies to prove the method is suitable for application to different areas / applications, these are; an application to teach about major computer networking concepts, an application to deliver a history-based topic; (after these case studies have been completed, the method will be revised to remove deficiencies and then used to develop a third case study), an application to teach mathematical principles. At this point, the method will again be revised into its final format. A usability evaluation will be carried out to measure the usefulness and effectiveness of the method. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the MDMLM method. The researcher has successfully produced the method at this point which is now under validation and testing procedures. From this point forward in the report, the researcher will refer to the method using the MDMLM abbreviation which means Multimedia Design Mobile Learning Method.

Keywords: human-computer interaction, interface design, mobile learning, education

Procedia PDF Downloads 230
18318 Teaching 'Sustainable Architecture' to Pre-School Children by School Building for a Clean Future

Authors: Cimen Ozburak

Abstract:

Pollution and the consumption of natural resources are significant global concerns. These problems have to be resolved in order to create a cleaner environment for the world. It is believed that sustainable building designs may reduce environmental problems throughout the world. It is known that if children receive environmental education in early childhood, they will be more likely to construct sustainable living systems and environment when they are older. School buildings can be used as educational material for teaching the natural and artificial environment in environmental education. In this study, the effect of school buildings on environmental education is examined by using the literature review method along with various examples. The selected examples in the study were analyzed according to 4 main criteria of LEED green building certification systems. These are the use of sustainable utilization of land, efficient utilization of water, efficient utilization of energy and efficient utilization of materials. According to the literature review, children who are educated in buildings designed according to these criteria, they will be environmentally sensitive individuals when they are older.

Keywords: clean future, educational sustainable pre-schools, environmental education, sustainable systems

Procedia PDF Downloads 237
18317 Moving Oman’s Economy to Knowledge-Based Economy: A Study on the Role of SMEs from the Perspective of Experts

Authors: Hanin Suleiman Alqam

Abstract:

The knowledge-based economy, as its name implies relies on knowledge, information and high levels of skills made available for all economic agents. Delving a bit more deeply, the concept of a knowledge-based economy is showcasing four main pillars, which are: Education and Training, Information and Communication Technology, Economic incentives and Institutional regimes, and Research and Development (R&D) and Innovation system. A good number of researches are showing its positive contribution to economic diversification underpinning sustainable development and growth. The present paper aimed at assessing the role of SMEs in moving Oman’s economy from a traditional economy to a knowledge-based economy. To lay down a groundwork that should lead to future studies, the methodology selected is based on exploratory research. Hence, the interview was conducted as a data collection tool. Based on a purposive sampling technique, seven handpicked experts have partaken in the study as they are working in different key organizations considered to be directly or indirectly the backbone of the Omani national economy. A thematic approach is employed for the purpose of data analysis. Results of the study showed that SMEs are not really contributing in the knowledge-based economy due to a lack of awareness about its importance to the country and to the enterprise within SMEs in Oman. However, it was shown that SMEs owners are interested in innovation and are trying to support innovative individuals by attracting them to their enterprises. On the other hand, the results revealed that SMEs' performance in e-solution is still not up to the level as 32% of SMEs only are using e-solutions in their internal processes and procedures like accounting systems. It is recommended to SMEs owners to use new and modern technologies in marketing and customer relation, encourage creativity, research and development, and allow the youth to have opportunities and facilitate the procedure in terms of innovation so that their role in contributing to the knowledge-based economy could be improved.

Keywords: knowledge-based economy, SMEs, ICT pillars, research and innovation

Procedia PDF Downloads 135
18316 Impact of U.S. Insurance Reimbursement Policy on Healthcare Business and Entrepreneurship

Authors: Iris Xiaohong Quan, Sharon Qi, Kelly Tianqin Shi

Abstract:

This study focuses on the critical role of insurance policies in a world grappling with increasing mental health challenges, as they significantly influence the dynamics of healthcare businesses and entrepreneurial ventures. The paper utilizes the mental health sector as a case to examine the impact of insurance policies on healthcare service providers, entrepreneurs, and individuals seeking mental health support. This paper addressed the following research questions: To what extent do changes in insurance reimbursement policies affect the accessibility and affordability of mental health services for patients, and how does this impact the overall demand for such services? What are the barriers and opportunities that mental health entrepreneurs face and what strategies and adaptations do mental health businesses employ when navigating the evolving landscape of insurance reimbursement policies? How do changes in insurance reimbursement policies, specifically related to mental health services, influence the financial viability and sustainability of mental health clinics and private practices? Employing a self-designed survey aimed at autism spectrum disorder (ASD) treatment companies, alongside two in-depth case studies and an analysis of pertinent insurance policies and documents, this research aims to elucidate the multifaceted influence of insurance policies on the mental health industry. The findings from this study reveal how insurance policies shape the landscape of mental health businesses and their operations. A total of 821 autism treatment organizations or offices were contacted by telephone between November 1, 2019, and January 31, 2020. About half of the offices (53.33%) were established in the past five years, and 80% were established in the past 15 years. There is a significant increase in the establishment of ABA service centers in the recent two decades as a result of autism insurance reform, the increasing social awareness of ASD, and the redefinition of autism. In addition, almost half of the ABA service providers we surveyed had a patient size ranging from 20 to 50 in the year when the residence state passed the legislation for autism insurance coverage. On average, an ABA service provider works with 5.3 insurance companies. This research find that insurance is the main source of revenue for most ABA service providers. However, our survey reveals that clients’ out of pocket payment has been the second main revenue sources. Despite the changes of regulations and insurance policies in all states, clients still have to pay a fraction of, if not all, the ABA treatment service fees out of pocket. This research shows that some ABA service providers seek federal and government funds and grants to support their services and businesses. Our further analysis with the in-depth case studies and other secondary data also indicate the rise of entrepreneurial startups in the mental health industry. Overall, this research sheds light on both the challenges and opportunities presented by insurance policies in the mental health sector, offering insights into the new industry landscape.

Keywords: entrepreneurship, healthcare policy, insurance policy, mental health industry

Procedia PDF Downloads 47
18315 Effect of Green Manuring Jantar (Sesbania acculata. L.) on the Growth and Yield of Crops Grown in Wheat-Based Cropping Systems

Authors: Javed Kamal

Abstract:

A proposed field study of wheat-based cropping systems was conducted at Faisalabad (Post-Graduate Research Station). We used 7 treatments and Jantar as a green manuring crop to increase the fertility status of soil; after the vegetative phases of wheat, rice, sorghum, and mungbean, the agronomic parameters of these crops were recorded. Hopefully, all increased with jantar treatment when compared with controls. The benefit: cost ratio and physicochemical characteristics of the soil before and after the crop harvest were also calculated.

Keywords: benifit cost ratio, jantar, sunflower, rice, wheat

Procedia PDF Downloads 381
18314 The Copyright Eligibility of Sports Events and Performances

Authors: Emre Bayamlıoğlu

Abstract:

Apart from being the subject of neighboring rights when broadcasted on TV or of cinematographic work when fixed to a tangible medium including a hard drive, the copyright eligibility of a sports performance, and eventually the sporting event has once again given rise to controversy following the CJEU judgment in the Murphy case. Most of the arguments which deny copyright protection for sports performances focus on the fact that unlike movies, plays, television programs, or operas, athletic events are competitive and have no underlying script. The first part of the paper aims to explain that such rhetoric is rather weak simply for the fact that, several types of performances such as improvised musical or dramatic shows are still protected by copyright despite the fact that they are not based on a script. The second part argues that the core reason for the denial copyright protection was the functionality aiming certain practical results such as winning the game, scoring, eliminating an opponent, obstructing a shot and etc., but no scientific or artistic expression in whatsoever form. The paper further argues that expanding copyright protection to functional performances would give rise to unintended copyright claims by the athletes on tackles, shoots, passes, crosses etc. resulting with further restrictions on reporting and photographing of sporting events. The final part provides a policy analysis of the trend to broaden the scope of copyright to cover sports performances. It is argued that such expansion will clearly undermine the ratio legis of copyright laws since it will give rise to excessive commodification of information beyond the needs of a viable market economy. Therefore, remedies other than copyright protection such as unfair competition and unjust enrichment provides sufficient redress for the damages to be sustained by the investors of sporting events.

Keywords: copyright eligibility, idea-expression dichotomy, sports performance

Procedia PDF Downloads 461
18313 Bituminous Geomembranes: Sustainable Products for Road Construction and Maintenance

Authors: Ines Antunes, Andrea Massari, Concetta Bartucca

Abstract:

Greenhouse gasses (GHG) role in the atmosphere has been well known since the 19th century; however, researchers have begun to relate them to climate changes only in the second half of the following century. From this moment, scientists started to correlate the presence of GHG such as CO₂ with the global warming phenomena. This has raised the awareness not only of those who were experts in this field but also of public opinion, which is becoming more and more sensitive to environmental pollution and sustainability issues. Nowadays the reduction of GHG emissions is one of the principal objectives of EU nations. The target is an 80% reduction of emissions in 2050 and to reach the important goal of carbon neutrality. Road sector is responsible for an important amount of those emissions (about 20%). The most part is due to traffic, but a good contribution is also given directly or indirectly from road construction and maintenance. Raw material choice and reuse of post-consumer plastic rather than a cleverer design of roads have an important contribution to reducing carbon footprint. Bituminous membranes can be successfully used as reinforcement systems in asphalt layers to improve road pavement performance against cracking. Composite materials coupling membranes with grids and/or fabrics should be able to combine improved tensile properties of the reinforcement with stress absorbing and waterproofing effects of membranes. Polyglass, with its brand dedicated to road construction and maintenance called Polystrada, has done more than this. The company's target was not only to focus sustainability on the final application but also to implement a greener mentality from the cradle to the grave. Starting from production, Polyglass has made important improvements finalized to increase efficiency and minimize waste. The installation of a trigeneration plant and the usage of selected production scraps inside the products as well as the reduction of emissions into the environment, are one of the main efforts of the company to reduce impact during final product build-up. Moreover, the benefit given by installing Polystrada products brings a significant improvement in road lifetime. This has an impact not only on the number of maintenance or renewal that needs to be done (build less) but also on traffic density due to works and road deviation in case of operations. During the end of the life of a road, Polystrada products can be 100% recycled and milled with classical systems used without changing the normal maintenance procedures. In this work, all these contributions were quantified in terms of CO₂ emission thanks to an LCA analysis. The data obtained were compared with a classical system or a standard production of a membrane. What it is possible to see is that the usage of Polyglass products for street maintenance and building gives a significant reduction of emissions in case of membrane installation under the road wearing course.

Keywords: CO₂ emission, LCA, maintenance, sustainability

Procedia PDF Downloads 49
18312 Battle of Narratives: Georgia between Dialogue and Confrontation

Authors: Ketevan Epadze

Abstract:

The paper aims to examine conflicting historical narratives proposed by the Georgian and Abkhazian scholars on the territorial affiliation of Abkhazia in the 1950s, explain how these narratives were connected to the Soviet nationalities policy after WW II and demonstrate the dynamic of the narratives’ battle in the last years of the Soviet system, which was followed by military conflict in the post-Soviet era. Abkhazia –a breakaway region of Georgia- self-declared its independence in 1992. Historical dispute on the territorial rights of Abkhazia emerged long before the military conflict began and was connected to the theory of Abkhazian ethnogenesis written by the Georgian literary scholar Pavle Ingorokva. He argued that medieval Abkhazians were Georgians, while modern Abkhazians are newcomers in Abkhazia. After the de-Stalinization, Abkhazian historians developed historical narrative opposed to Ingorokva’s theory. In the 1980s, Georgian dissidents who strove for Georgia’s independence used Ingorokva’s thesis to oppose Abkhazians desire for self-determination and sovereignty. Abkhazian political actors in their turn employed opposite historical arguments to legitimate their rights over autonomy. Ingorokva’s theory is one of the principal issues, discussed during the Georgian-Abkhazian dialogue; it often confuses Georgians and gives the reasons to Abkhazians for complaining about the Georgian discrimination in the Soviet past. The study is based on the different kind of sources: archival materials of the 1950s (Communist Party Archive of Georgia, Soviet Journal ‘Mnatobi’), the book by Pavle Ingorokva ‘Giorgi Merchule’ (1947-1954) and Zurab Anchabadze’s responsive work to Ingorokva’s book – ‘From the medieval history of Abkhazia’ (1956-1959), political speeches of the Georgian and Abkhazian political actors in the 1980s, secondary sources on the Soviet nationalities policy from the 1950s to the 1990s.

Keywords: Soviet, history, ethnicity, nationalism, politics, post-Soviet, conflict

Procedia PDF Downloads 155
18311 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 386
18310 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 457
18309 Implementation of International Standards in the Field of Higher Secondary Education in Kerala

Authors: Bernard Morais Joosa

Abstract:

Kerala, the southern state of India, is known for its accomplishments in universal education and enrollments. Through this mission, the Government proposes comprehensive educational reforms including 1000 Government schools into international standards during the first phase. The idea is not only to improve the infrastructural facilities but also to reform the teaching and learning process to the present day needs by introducing ICT enabled learning and providing smart classrooms. There will be focus on creating educational programmes which are useful for differently abled students. It is also meant to reinforce the teaching–learning process by providing ample opportunities to each student to construct their own knowledge using modern technology tools. The mission will redefine the existing classroom learning process, coordinate resource mobilization efforts and develop ‘Janakeeya Vidyabhyasa Mathruka.' Special packages to support schools which are in existence for over 100 years will also be attempted. The implementation will enlist full involvement and partnership of the Parent Teacher Association. Kerala was the first state in the country to attain 100 percent literacy more than two and a half decades ago. Since then the State has not rested on its laurels. It has moved forward in leaps and bounds conquering targets that no other State could achieve. Now the government of Kerala is taking off towards new goal of comprehensive educational reforms. And it focuses on Betterment of educational surroundings, use of technology in education, renewal of learning method and 1000 schools will be uplifted as Smart Schools. Need to upgrade 1000 schools into international standards and turning classrooms from standard 9 to 12 in high schools and higher secondary into high-tech classrooms and a special unique package for the renovation of schools, which have completed 50 and 100 years. The government intends to focus on developing standards first to eighth standards in tune with the times by engaging the teachers, parents, and alumni to recapture the relevance of public schools. English learning will be encouraged in schools. The idea is not only to improve the infrastructure facilities but also reform the curriculum to the present day needs. Keeping in view the differently-abled friendly approach of the government, there will be focus on creating educational program which is useful for differently abled students. The idea is to address the infrastructural deficiencies being faced by such schools. There will be special emphasis on ensuring internet connectivity to promote IT-friendly existence. A task-force and a full-time chief executive will be in charge of managing the day to day affairs of the mission. Secretary of the Public Education Department will serve as the Mission Secretary and the Chairperson of Task Force. As the Task Force will stress on teacher training and the use of information technology, experts in the field, as well as Directors of SCERT, IT School, SSA, and RMSA, will also be a part of it.

Keywords: educational standards, methodology, pedagogy, technology

Procedia PDF Downloads 119
18308 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 429