Search results for: authorized
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 101

Search results for: authorized

71 Consensus, Federalism and Inter-State Water Disputes in India

Authors: Amrisha Pandey

Abstract:

Indian constitution has distributed the powers to govern and legislate between the centre and the state governments based on the list of subject-matter provided in the seventh schedule. By that schedule, the states are authorized to regulate the water resource within their territory. However, the centre/union government is authorized to regulate the inter-state water disputes. The powers entrusted to the union government mainly deals with the sharing of river water which flows through the territory of two or more states. For that purpose, a provision enumerated in Article 262 of the Constitution of India which empowers the parliament to resolve any such inter-state river water dispute. Therefore, the parliament has enacted the - ‘Inter-State River Water Dispute Tribunal, Act’, which allows the central/union government to constitute the tribunal for the adjudication of the disputes and expressly bars the jurisdiction of the judiciary in the concerned matter. This arrangement was intended to resolve the dispute using political or diplomatic means, without deliberately interfering with the sovereign power of the states to govern the water resource. The situation in present context is complicated and sensitive. Due to the change in climatic conditions; increasing demand for the limited resource; and the advanced understanding of the freshwater cycle, which is missing from the existing legal regime. The obsolete legal and political tools, the existing legislative mechanism and the institutional units do not seem to accommodate the rising challenge to regulate the resource. Therefore, resulting in the rise of the politicization of the inter-state water disputes. Against this background, this paper will investigate the inter-state river water dispute in India and will critically analyze the ability of the existing constitutional, and institutional units involved in the task. Moreover, the competence of the tribunal as the adjudicating body in present context will be analyzed using the long ongoing inter-state water dispute in India – The Cauvery Water Dispute, as the case study. To conduct the task undertaken in this paper the doctrinal methodology of the research is adopted. The disputes will also be investigated through the lens of sovereignty, which is accorded to the states using the theory of ‘separation of power’ and the ‘grant of internal sovereignty’, to its federal units of governance. The issue of sovereignty in this paper is discussed in two ways: 1) as the responsibility of the state - to govern the resource; and 2) as the obligation of the state - to govern the resource, arising from the sovereign power of the state. Furthermore, the duality of the sovereign power coexists in this analysis; the overall sovereign authority of the nation-state, and the internal sovereignty of the states as its federal units of governance. As a result, this investigation will propose institutional, legislative and judicial reforms. Additionally, it will suggest certain amendments to the existing constitutional provisions in order to avoid the contradictions in their scope and meaning in the light of the advanced hydrological understanding.

Keywords: constitution of India, federalism, inter-state river water dispute tribunal of India, sovereignty

Procedia PDF Downloads 154
70 Nature of Science in Physics Textbooks – Example of Quebec Province

Authors: Brahim El Fadil

Abstract:

The nature of science as a solution (NOS) to life problems is well established in school activities the world over. However, this study reveals the lack of representation of the NOS in science textbooks used in Quebec Province. A content analysis method was adopted to analyze the NOS in relation to optics knowledge and teaching-learning activities in Grade 9 science and technology textbooks and Grade 11 physics textbooks. The selected textbooks were approved and authorized by the Provincial Ministry of Education. Our analysis points out that most of these editions provided a poor representation of NOS. None of them indicates that scientific knowledge is subject to change, even though the history of optics reveals evolutionary and revolutionary changes. Moreover, the analysis shows that textbooks place little emphasis on the discussion of scientific laws and theories. Few of them argue that scientific inquiries are required to gain a deep understanding of scientific concepts. Moreover, they rarely present empirical evidence to support their arguments.

Keywords: nature of science, history of optics, geometrical theory of optics, wave theory of optics

Procedia PDF Downloads 77
69 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
68 Geospatial Data Complexity in Electronic Airport Layout Plan

Authors: Shyam Parhi

Abstract:

Airports GIS program collects Airports data, validate and verify it, and stores it in specific database. Airports GIS allows authorized users to submit changes to airport data. The verified data is used to develop several engineering applications. One of these applications is electronic Airport Layout Plan (eALP) whose primary aim is to move from paper to digital form of ALP. The first phase of development of eALP was completed recently and it was tested for a few pilot program airports across different regions. We conducted gap analysis and noticed that a lot of development work is needed to fine tune at least six mandatory sheets of eALP. It is important to note that significant amount of programming is needed to move from out-of-box ArcGIS to a much customized ArcGIS which will be discussed. The ArcGIS viewer capability to display essential features like runway or taxiway or the perpendicular distance between them will be discussed. An enterprise level workflow which incorporates coordination process among different lines of business will be highlighted.

Keywords: geospatial data, geology, geographic information systems, aviation

Procedia PDF Downloads 416
67 Protection towards Investor: Enforcement of the Authorities of Indonesian Financial Services Authority (OJK) during Capital Market Integration

Authors: Muhammad Ilham Agus Salim, Muhammad Ikbal

Abstract:

The ASEAN Economic Community (AEC) was set up in 2003 with the objectives of creating a single market and production base, enhancing equitable economic development as well as facilitating the integration into the global economy. The AEC involves liberalization and facilitation of trade in goods, skilled labour, services, and investment, as well as protection and promotion of investment. The thesis outlines the AEC Blueprint actions in scope of globalization of investment and capital market. Free flows of investment and freer flows of capital market urge countries in South East Asia to coordinate and to collaborate in securing the interest of public, and this leads to the importance of financial services authorities in ASEAN to prepare the mechanism of guarding the flows of investment. There is no exception, especially for Indonesian Financial Services Authority (OJK) as one of the authorized body in capital market supervision, to enforce its authorities as supervisory body.

Keywords: AEC blueprint, OJK, capital market, integration

Procedia PDF Downloads 312
66 Generalized π-Armendariz Authentication Cryptosystem

Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol

Procedia PDF Downloads 217
65 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication

Authors: Aishwarya Shekhar, Himanshu Sharma

Abstract:

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.

Keywords: confidentiality, deduplication, data compression, hybridity of cloud

Procedia PDF Downloads 382
64 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption

Authors: Jerlin George, R. Chitra

Abstract:

The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.

Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security

Procedia PDF Downloads 15
63 Ethics in the Islamic Political System

Authors: Djehich Mohamed Yousri

Abstract:

This research deals with an important issue in Islamic political thought, which is the relationship of ethics to the Islamic political system. This is done by following the legal politics books and analyzing their texts in order to reach the moral values on which the political system in Islam is based, starting from the concept of politics to the political principles and conditions of the ruler and the reasons for his removal and the conditions of those authorized to choose him, and ending with the ruler’s relationship with his people, and the relationship of the Islamic state with other countries. The research concluded that moral values are the basis of the political system in Islam, and the reason for this is due to the fact that Islam is a religion and a global and realistic human system that embraces morals and higher values in order to preserve its lofty message and calls for brotherhood, love, and justice and does not harm human morals. And if the reality of politics in the Islamic world today is not related to the moral values and the lofty message of Islam, this research tries to show the origins of political theory in Islam, and the purpose of the Islamic political system, towards the morality of politics.

Keywords: moral, politics, islam, political system, islamic political system

Procedia PDF Downloads 104
62 Road Accidents in Urban and Rural Areas in Dar Es Salaam, Tanzania

Authors: Bruno Kinyaga

Abstract:

Motorcycles transport commonly known as (Boda boda) in Tanzania has been growing up in the recent years in both urban and rural areas. Since motorcycles have been authorized to carry passengers in Tanzania they have been associated with many accidents resulting in large number of deaths and injuries in the country. Most of the road traffic injury victims are passengers, motorcyclists and pedestrians. Males are over represented in all cases. Most of the deceased were 18-29 years old. The increase of motorcycles has been accompanied with the increase of motorcycle crashes causing deaths and injuries to passengers as well as riders. According to the data collected, the statistics shows that from January to December 2015, the total number of 4079 motorcycles was involved in accidents in the country, causing 1747 deaths and 4826 injuries. Compares to the report of January to December 2014 whereby the total number of motorcycles involved in accidents were 3710, causing 1423 deaths and 3622 injuries. This is according to the report provided by the Road safety Chief Commander in Tanzania.

Keywords: accidents, road, safety, Tanzania

Procedia PDF Downloads 167
61 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 120
60 A Study on Vulnerability of Alahsa Governorate to Generate Urban Heat Islands

Authors: Ilham S. M. Elsayed

Abstract:

The purpose of this study is to investigate Alahsa Governorate status and its vulnerability to generate urban heat islands. Alahsa Governorate is a famous oasis in the Arabic Peninsula including several oil centers. Extensive literature review was done to collect previous relative data on the urban heat island of Alahsa Governorate. Data used for the purpose of this research were collected from authorized bodies who control weather station networks over Alahsa Governorate, Eastern Province, Saudi Arabia. Although, the number of weather station networks within the region is very limited and the analysis using GIS software and its techniques is difficult and limited, the data analyzed confirm an increase in temperature for more than 2 °C from 2004 to 2014. Such increase is considerable whenever human health and comfort are the concern. The increase of temperature within one decade confirms the availability of urban heat islands. The study concludes that, Alahsa Governorate is vulnerable to create urban heat islands and more attention should be drawn to strategic planning of the governorate that is developing with a high pace and considerable increasing levels of urbanization.

Keywords: Alahsa Governorate, population density, Urban Heat Island, weather station

Procedia PDF Downloads 250
59 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 256
58 Current Situation of Maritime Transport and Logistics in Myanmar

Authors: S. N. S. Thein, H. L. Yang, Z. B. Liu

Abstract:

There are many modes of transport. Among them, maritime transport is a major transportation mode of international trade. In the Republic of the Union of Myanmar (Burma), water transportation served as one of the most important modes of transport for country's exports and imports. Getting the accurate information and data-gathering activity are the most important aspects for any study field. Therefore, in this research, a historical review of the development of ports in Myanmar and how they have changed had been carried out. All the relevant literature and documents have also been reviewed, studied, and organized. The sources of collected data are from reports, journals, internet, as well as from the publications of authorized organizations and international associations. To get better understanding about real situation of maritime transport and logistics in Myanmar; current condition of existing ports, expansion and on-going projects, and future port development plans are described successively. Hence, the main purpose of this study is to build up a comprehensive picture of maritime transport and logistics, in addition to border trade within ASEAN and Myanmar. It will help for academic researchers, decision makers, and stakeholders for national planning as well as for the local and foreign investors to recognize current situation of maritime transport and logistics in Myanmar.

Keywords: ASEAN, border trade, logistics, maritime transport, ports of Myanmar

Procedia PDF Downloads 219
57 Comparative Analysis of Patent Protection between Health System and Enterprises in Shanghai, China

Authors: Na Li, Yunwei Zhang, Yuhong Niu

Abstract:

The study discussed the patent protections of health system and enterprises in Shanghai. The comparisons of technical distribution and scopes of patent protections between Shanghai health system and enterprises were used by the methods of IPC classification, co-words analysis and visual social network. Results reflected a decreasing order within IPC A61 area, namely A61B, A61K, A61M, and A61F. A61B required to be further investigated. The highest authorized patents A61B17 of A61B of IPC A61 area was found. Within A61B17, fracture fixation, ligament reconstruction, cardiac surgery, and biopsy detection were regarded as common concerned fields by Shanghai health system and enterprises. However, compared with cardiac closure which Shanghai enterprises paid attention to, Shanghai health system was more inclined to blockages and hemostatic tools. The results also revealed that the scopes of patent protections of Shanghai enterprises were relatively centralized. Shanghai enterprises had a series of comprehensive strategies for protecting core patents. In contrast, Shanghai health system was considered to be lack of strategic patent protections for core patents.

Keywords: co-words analysis, IPC classification, patent protection, technical distribution

Procedia PDF Downloads 134
56 The Use and Safety of Leave from an Acute Inpatient Psychiatry Unit: A Retrospective Review of Pass Outcomes Over Four Years Abstract

Authors: Vasilis C. Hristidis, Ricardo Caceda, Ji Soo Kim, Brian Bronson, Emily A. Hill

Abstract:

Objective: Leave passes to provide authorized leave for hospitalized patients from a psychiatric inpatient unit. Though providing day passes was once a relatively common practice, there is relatively little data describing their safety and efficacy. Methods: This descriptive study examines the use of leave passes in an adult inpatient unit at a university hospital between 2017 and 2021, with attention to reasons for granting the day pass, duration, and outcome of the pass. Results: During the study period, ten patients with primary psychotic or mood disorders received 12 passes for either housing coordination, COVID-19 vaccination, or major family events. There were no fatalities or elopements. One patient experienced severe agitation and engaged in non-suicidal self-injurious behavior. A second patient showed mild, redirectable psychomotor agitation upon return to the unit. The remaining 10 passes were uneventful. Conclusions: Our findings support the view that patients with diverse diagnoses can safely be provided leave from an inpatient setting with adequate planning and support, yielding a low incidence of adverse events.

Keywords: passes, inpatient, psychiatry, inpatient leave, outcome

Procedia PDF Downloads 199
55 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 393
54 Health Monitoring of Primates in a Conservation Unit in Brazil

Authors: Elisângela de Albuquerque Sobreira Borovoski, Ricardo Willian Borovoski

Abstract:

Microbiological infections acquired by animals pose a risk to public health. In public health, monitoring the health of primates is linked to the risk of transmission of zoonoses through scratches, bites and contact with biological samples. The project was approved by the Ethics Committee on the Use of Animals Protocol No. 170/2019. It was authorized by ICMBio Protocol No. 52117-1. The study was carried out in the period 2019-2022 in the municipality of Anápolis. Iron and galvanized wire traps were used and the animals were anesthetized with 4.4mg/kg zolethyl intramuscularly and saliva was collected through swabs. Fifty-three capuchin monkeys were captured from the Onofre Quinan Environmental Park in Anápolis-Goiás for health monitoring purposes. In the laboratory, the samples were deposited on the agar surface and seeded by exhaustion to obtain isolated colonies. These colonies were analyzed according to morphocolonial characteristics. Morphometric characterization and biochemical tests for bacterial identification were performed. A total of 861 bacterial samples were isolated, nine of which were strict anaerobic bacteria of the genus Peptostreptococcus. Previous and constant knowledge of the prevalence of pathogenic agents in biological samples is essential to be prepared to act in pandemic situations.

Keywords: Brazil, microbiology, monkeys, public health

Procedia PDF Downloads 76
53 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 299
52 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 384
51 Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)

Authors: Ilija Musa

Abstract:

Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media.

Keywords: children, media, legislation, privacy protection, Bosnia Herzegovina

Procedia PDF Downloads 492
50 Recycling in Bogotá: A SWOT Analysis of Three Associations to Evaluate the Integrating the Informal Sector into Solid Waste Management

Authors: Clara Inés Pardo Martínez

Abstract:

In emerging economies, recycling is an opportunity for the cities to increase the lifespan of sanitary landfills, reduce the costs of the solid waste management, decrease the environmental problems of the waste treatment through reincorporate waste in the productive cycle and protect and develop people’s livelihoods of informal waste pickers. However, few studies have analysed the possibilities and strategies to integrate formal and informal sectors in the solid waste management for the benefit of both. This study seek to make a strength, weakness, opportunity, and threat (SWOT) analysis in three recycling associations of Bogotá with the aim to understand and determine the situation of recycling from perspective of informal sector in its transition to enter as authorized waste providers. Data used in the analysis are derived from multiple strategies such as literature review, the Bogota’s recycling database, focus group meetings, governmental reports, national laws and regulations and specific interviews with key stakeholders. Results of this study show as the main stakeholders of formal and informal sector of waste management can identify the internal and internal conditions of recycling in Bogotá. Several strategies were designed based on the SWOTs determined, could be useful for Bogotá to advance and promote recycling as a key strategy for integrated sustainable waste management in the city.

Keywords: Bogotá, recycling, solid waste management, SWOT analysis

Procedia PDF Downloads 403
49 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 118
48 Resource Sharing Issues of Distributed Systems Influences on Healthcare Sector Concurrent Environment

Authors: Soo Hong Da, Ng Zheng Yao, Burra Venkata Durga Kumar

Abstract:

The Healthcare sector is a business that consists of providing medical services, manufacturing medical equipment and drugs as well as providing medical insurance to the public. Most of the time, the data stored in the healthcare database is to be related to patient’s information which is required to be accurate when it is accessed by authorized stakeholders. In distributed systems, one important issue is concurrency in the system as it ensures the shared resources to be synchronized and remains consistent through multiple read and write operations by multiple clients. The problems of concurrency in the healthcare sector are who gets the access and how the shared data is synchronized and remains consistent when there are two or more stakeholders attempting to the shared data simultaneously. In this paper, a framework that is beneficial to distributed healthcare sector concurrent environment is proposed. In the proposed framework, four different level nodes of the database, which are national center, regional center, referral center, and local center are explained. Moreover, the frame synchronization is not symmetrical. There are two synchronization techniques, which are complete and partial synchronization operation are explained. Furthermore, when there are multiple clients accessed at the same time, synchronization types are also discussed with cases at different levels and priorities to ensure data is synchronized throughout the processes.

Keywords: resources, healthcare, concurrency, synchronization, stakeholders, database

Procedia PDF Downloads 149
47 AHP and TOPSIS Methods for Supplier Selection Problem in Medical Devices Company

Authors: Sevde D. Karayel, Ediz Atmaca

Abstract:

Supplier selection subject is vital because of development competitiveness and performance of firms which have right, rapid and with low cost procurement. Considering the fact that competition between firms is no longer on their supply chains, hence it is very clear that performance of the firms’ not only depend on their own success but also success of all departments in supply chain. For this purpose, firms want to work with suppliers which are cost effective, flexible in terms of demand and high quality level for customer satisfaction. However, diversification and redundancy of their expectations from suppliers, supplier selection problems need to be solved as a hard problem. In this study, supplier selection problem is discussed for critical piece, which is using almost all production of products in and has troubles with lead time from supplier, in a firm that produces medical devices. Analyzing policy in the current situation of the firm in the supplier selection indicates that supplier selection is made based on the purchasing department experience and other authorized persons’ general judgments. Because selection do not make based on the analytical methods, it is caused disruptions in production, lateness and extra cost. To solve the problem, AHP and TOPSIS which are multi-criteria decision making techniques, which are effective, easy to implement and can analyze many criteria simultaneously, are used to make a selection among alternative suppliers.

Keywords: AHP-TOPSIS methods, multi-criteria decision making, supplier selection problem, supply chain management

Procedia PDF Downloads 264
46 Assessment of Microbiological Status of Branded and Street Vended Ice-Cream Offered for Public Consumption: A Comparative Study in Tangail Municipality, Bangladesh

Authors: Afroza Khatun, Masuma, Md. Younus Mia, Kamal Kanta Das

Abstract:

Analysis of the microbial status and physicochemical parameters of some branded and street vended ice cream showed that total viable bacteria in branded ice cream ranged from 4.8×10³ to 1.10×10⁵ cfu/ml, and in street vended ice-cream ranged from 7.5×10⁴ to 1.6×10⁸ cfu/ml. Total coliform bacteria present up to 9.20×10³ cfu/ml in branded ice cream and 5.3×10³ to 9.6×10⁶ cfu/ml observed in street vended ice cream. Total E. coli were found to be present within a range from 0 to 4.5×10³ cfu/ml in branded and 4.1×10² to 7.5×10⁴ cfu/ml in street ice cream. The ranges of Staphylococcus aureus count were 1.8×10² to 2.9×10⁴ cfu/ml (branded) and 3.9×10⁴ to 7.9×10⁶ cfu/ml (street). The pH of both types of ice cream showed acidic to neutral conditions where the concentration of pH for branded ice cream was 5.5 to 6.9, as well as the value of pH in street ice cream, was 6.2 to 7.0. The range of Total soluble solids in several branded ice creams was 26 to 29%, and the value of TSS obtained in street-vended ice-creams ranged from 5 to 10%. The overall results of this research demonstrated that the microbial quality in all street ice creams exceeded the BSTI standard and exhibited lower quality than the industrially produced branded ice creams due to comparatively faulty manufacturing processes and poor hygiene practices. The presence of pathogenic microbes was also observed in branded ice creams which was quite alarming for public health. So it is suggested that the government authorized organization should conduct the proper monitoring system to ensure that both branded and street vended ice-creams are microbiologically safe to prevent public health hazards.

Keywords: food safety, microbiological analysis, physicochemical, ice-cream, E. coli, Staphylococcus aureus

Procedia PDF Downloads 82
45 New Technologies in Corporate Finance Management in the Digital Economy: Case of Kyrgyzstan

Authors: Marat Kozhomberdiev

Abstract:

The research will investigate the modern corporate finance management technologies currently used in the era of digitalization of the global economy and the degree to which financial institutions are utilizing these new technologies in the field of corporate finance management in Kyrgyzstan. The main purpose of the research is to reveal the role of financial management technologies as joint service centers, intercompany banks, specialized payment centers in the third-world country. Particularly, the analysis of the implacability of automated corporate finance management systems such as enterprise resource planning system (ERP) and treasury management system (TMS) will be carried out. Moreover, the research will investigate the role of cloud accounting systems in corporate finance management in Kyrgyz banks and whether it has any impact on the field of improving corporate finance management. The study will utilize a data collection process via surveying 3 banks in Kyrgyzstan, namely Mol-Bulak, RSK, and KICB. The banks were chosen based on their ownerships, such as state banks, private banks with local authorized capital, and private bank with international capital. The regression analysis will be utilized to reveal the correlation between the ownership of the bank and the use of new financial management technologies. The research will provide policy recommendations to both private and state banks on developing strategies for switching and utilizing modern corporate finance management technologies in their daily operations.

Keywords: digital economy, corporate finance, digital environment, digital technologies, cloud technologies, financial management

Procedia PDF Downloads 70
44 Virtual Conciliation in Colombia: Evaluation of Maturity Level within the Framework of E-Government

Authors: Jenny Paola Forero Pachón, Sonia Cristina Gamboa Sarmiento, Luis Carlos Gómez Flórez

Abstract:

The Colombian government has defined an e-government strategy to take advantage of Information Technologies (IT) in order to contribute to the building of a more efficient, transparent and participative State that provides better services to citizens and businesses. In this regard, the Justice sector is one of the government sectors where IT has generated more expectation considering that the country has a judicial processes backlog. This situation has led to the search for alternative forms of access to justice that speed up the process while providing a low cost for citizens. To this end, the Colombian government has authorized the use of Alternative Dispute Resolution methods (ADR), a remedy where disputes can be resolved more quickly compared to judicial processes while facilitating greater communication between the parties, without recourse to judicial authority. One of these methods is conciliation, which includes a special modality that takes advantage of IT for the development of itself known as virtual conciliation. With this option the conciliation is supported by information systems, applications or platforms and communications are provided through it. This paper evaluates the level of maturity in how the service of virtual conciliation is under the framework of this strategy. This evaluation is carried out considering Shahkooh's 5-phase model for e-government. As a result, it is evident that in the context of conciliation, maturity does not reach the necessary level in the model so that it can be considered as virtual conciliation; therefore, it is necessary to define strategies to maximize the potential of IT in this context.

Keywords: alternative dispute resolution, e-government, evaluation of maturity, Shahkooh model, virtual conciliation

Procedia PDF Downloads 253
43 Reducing Stigma and Discrimination among Islamic Religious Officers Towards People Living with HIV/AIDS in Malaysia

Authors: Hazlin Kadir Shahar, Razaleigh Muhamat Kawangit, Badlihisham Mohd Nasir, Rosmawati Mohamad Rasit

Abstract:

Stigma and discrimination have become the main topic of discussion when dealing with HIV/AIDS issues. They affect the daily life of People Living With HIV(PLHIV), families, friends and people around them indirectly. This paper discusses the potential measurement in helping to reduce stigma and discrimination existence among Islamic Religious Officers towards PLHIV in Malaysia. These people have been trained with special programmes to tackle the HIV/AIDS issues by using a manual, namely as ‘The Manual of Islam and HIV/AIDS’, specifically designed by the Islamic Development Department of Malaysia (JAKIM). The objectives of the training programmes are to give the accurate information about HIV/AIDS and to suggest ways on how to handle the PLHIV issues in Islamic perspective. This research used quantitative methodology by survey. A pilot test had been done over thirty (30) trained Islamic Religious Officers in Malaysia. The findings have shown that the trainings have given a positive impact for them as they managed to acquire the knowledge of HIV/AIDS from both primer and authorized sources such as medical practitioners, Muslim chaplains and social workers. The knowledge they have acquired from the trainings has guided them in changing their perception, thus helping to reduce their own stigma and discrimination towards PLHIV. The training programmes have given them opportunities to practice what they have learned through several outreach sessions as they have had the opportunities to approach PLHIV directly.

Keywords: Islamic religious officers, people with HIV, stigma and discrimination, training programmes

Procedia PDF Downloads 505
42 Production Value, Constraints, and Opportunities in East African Freshwater Fisheries: Systematic Review

Authors: Alamrew Eyayu, Abebe Getahun, James Last Keyombe

Abstract:

Demand for fish continued to grow worldwide while production from capture fisheries has decreased. In the Eastern African Region (EAR), the open-access nature of capture fisheries has resulted in illegal fishing. Within communities engaged in fishing, small-scale fisheries support food security strategies and sustain livelihoods. Despite the role of fisheries in EAR, inland fisheries are vulnerable to loss, and management solutions authorized for inland fisheries are inadequate. This review investigates production potential, challenges, opportunities, and management of inland fisheries in the EAR. It is therefore expected that in aquaculture promising areas, the EAR will turn to depend more on aquaculture to meet the extended needs and supply gaps created as a result of capture fisheries shortfalls. However, aquaculture is still in its infant stage in the region, and there exists no adequate aquaculture policy framework and funds in some EAR (e.g., Ethiopia, Somalia). Stakeholders at all levels should entertain the importance of fishery-based activities for food security in EAR. As a result, easily implemented and community-oriented fisheries legislative documents need to be prepared for advancing sustainable fisheries management. Legislative documents might consider techniques of continual catch statistics (consider small water bodies as much as possible) of inland fisheries and enforcing existing laws to manage illegal fishing activities to accustom sustainable development of inland capture fisheries.

Keywords: aquaculture, capture fisheries, East Africa, fisheries management

Procedia PDF Downloads 25