Search results for: transformation and security challenges
8952 Causal Estimation for the Left-Truncation Adjusted Time-Varying Covariates under the Semiparametric Transformation Models of a Survival Time
Authors: Yemane Hailu Fissuh, Zhongzhan Zhang
Abstract:
In biomedical researches and randomized clinical trials, the most commonly interested outcomes are time-to-event so-called survival data. The importance of robust models in this context is to compare the effect of randomly controlled experimental groups that have a sense of causality. Causal estimation is the scientific concept of comparing the pragmatic effect of treatments conditional to the given covariates rather than assessing the simple association of response and predictors. Hence, the causal effect based semiparametric transformation model was proposed to estimate the effect of treatment with the presence of possibly time-varying covariates. Due to its high flexibility and robustness, the semiparametric transformation model which shall be applied in this paper has been given much more attention for estimation of a causal effect in modeling left-truncated and right censored survival data. Despite its wide applications and popularity in estimating unknown parameters, the maximum likelihood estimation technique is quite complex and burdensome in estimating unknown parameters and unspecified transformation function in the presence of possibly time-varying covariates. Thus, to ease the complexity we proposed the modified estimating equations. After intuitive estimation procedures, the consistency and asymptotic properties of the estimators were derived and the characteristics of the estimators in the finite sample performance of the proposed model were illustrated via simulation studies and Stanford heart transplant real data example. To sum up the study, the bias of covariates was adjusted via estimating the density function for truncation variable which was also incorporated in the model as a covariate in order to relax the independence assumption of failure time and truncation time. Moreover, the expectation-maximization (EM) algorithm was described for the estimation of iterative unknown parameters and unspecified transformation function. In addition, the causal effect was derived by the ratio of the cumulative hazard function of active and passive experiments after adjusting for bias raised in the model due to the truncation variable.Keywords: causal estimation, EM algorithm, semiparametric transformation models, time-to-event outcomes, time-varying covariate
Procedia PDF Downloads 1258951 An Exploratory Study on Challenges of Public Private Partnership Projects in Oman
Authors: Omar Amoudi, Mariya Khalid
Abstract:
The limitation of the public funds for the infrastructure projects and with the deterioration of international oil prices and the negative consequences on the economies of oil producing and exporting countries, Oman has encouraged the partnership between the public and private sectors. As the private sector has a role in planning, financing, designing, operating and the maintenance of the public services. There is no doubt that, the adoption of Public Private Partnership (PPP) strategy faces many challenges which might affect the project seriously if it is not overcome in earlier time. These challenges depend on the level of understanding of the strategy, the roles and regulations and the availability of resources as well. This research aims at identifying the challenges facing the PPP infrastructure projects in Oman based on the similar previous studies supported by questionnaire survey and semi structured interviews. It also seeks to discuss the rationale for adoption in Oman and uncover the current status of PPP strategy. The identified challenges were ranked according to the importance index of each challenge. After analysis of data, it has observed that, the main challenges facing PPPs projects in Oman are high participation cost, high projects cost and regulation changes. The PPP strategy has to be adopted well and with a high level of experience in order to ensure a successful implementation of PPP projects in Oman.Keywords: public private partnership (PPP), challenges, infrastructure, Oman
Procedia PDF Downloads 3038950 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 2758949 Jurisprudential Terms of Istiḥālah (Transformation) in Cosmetic Products (An Analytical Study)
Authors: Hassan Sher
Abstract:
God has made this world with all of his essences and beautified it with his countless blessings. In Islam, no doubt, beauty is a very important characteristic but also an aspect of the body and the heart. In a world where the standards of beauty seem to change from year to year according to trends and norms. Moreover, in this world, many people want to look good and feel satisfied and will be willing to go through many ways for their ideal look. likewise, several products came into use for beautifying, cleansing, and promoting attractiveness. These products include components of cosmetics, they are utilized for health and beauty purposes. There are concerns regarding the existence of harmful or ḥarām chemicals, but With the advancement in (technology), it results in the transformation of unlawful and forbidden cosmetic products into permissible several new ingredients and products. The process of transforming certain items or products from one form to another, Muslim jurists tend to use terms like Istiḥālah (transformation).Istiḥālah is an Islamic principle unknown to many Muslims. LinguisticallyIstiḥālah carries the meaning of a transformation or a change in the nature of a thing into something else.According to the religious contact, Istiḥālah signifies a turning of a matter from a state of impurity or inedibility into a matter of different nature, name, properties, and characteristics (colour, taste, and smell) (Zuhayli, 1997). This principle, which is unanimously accepted by Muslim scholars, are breaths of fresh air to Muslims suffering from the suffocation of excessive prohibition. This will allow the invention to be utilized fully. This research tends to highlight the different ideological concepts of Istiḥālah from the perspective of Islamic Shariah and jurisprudence and its application in cosmetic products. However, the study focuses on the issues related to alcohol and pig ingredients in beauty products.Keywords: istiḥālah. harām, jurisprudence, cosmetic, pig
Procedia PDF Downloads 1338948 Challenges and Solutions to Human Capital Development in Thailand
Authors: Nhabhat Chaimongkol
Abstract:
Human capital is one of the factors that are vital for economic growth. This is especially true as humans will face increasingly more forms of disruptive technology in the near future. Therefore, there is a need to develop human capital in order to overcome the current uncertainty in the global economy and the future of jobs. In recent years, Thailand has increasingly devoted more attention to developing its human capital. The Thai government has raised this issue in its national agenda, which is part of its 20-year national strategy. Currently, there are multiple challenges and solutions regarding this issue. This study aims to find out what are the challenges and solutions to human capital development in Thailand. The research in this study uses mixed methods consisting of quantitative and qualitative research methods. The results show that while Thailand has many plans to develop human capital, it is still lacking the necessary actions and integrations that are required to achieve its goals. Finally, the challenges and solutions will be discussed in detail.Keywords: challenges, human capital, solutions, Thailand
Procedia PDF Downloads 1728947 Evaluation of Opposite Type Heterologous MAT Genes Transfer in the Filamentous Fungi Neofusicoccum mediterraneum and Verticillium dahliae
Authors: Stavros Palavouzis, Alexandra Triantafyllopoulou, Aliki Tzima, Epaminondas Paplomatas
Abstract:
Mating-type genes are present in most filamentous fungi, even though teleomorphs for all species have not been recorded. Our study tries to explore the effect of different growth conditions on the expression of MAT genes in Neofusicoccum mediterraneum. As such, selected isolates were grown in potato dextrose broth or in water agar supplemented with pine needles under a 12 h photoperiod, as well as in constant darkness. Mycelia and spores were collected at different time points, and RNA extraction was performed, with the extracted product being used for cDNA synthesis. New primers for MAT gene expression were designed while qPCR results are underway. The second part of the study involved the isolation and cloning in a selected pGEM-T vector of the Botryosphaeria dothidea MAT1 1 1 and MAT1 2 1 mating genes, including flanking regions. As a next step, the genes were amplified using newly designed primers with engineered restriction sites. Amplicons were excised and subsequently sub-cloned in appropriate binary vectors. The constructs were afterward inserted into Agrobacterium tumefaciens and utilized for Agrobacterium-mediated transformation (ATMT) of Neofusicoccum mediterraneum. At the same time, the transformation of a Verticillium dahliae tomato race 1 strain (70V) was performed as a control. While the procedure was successful in regards to V. dahliae, transformed strains of N. mediterraneum could not be obtained. At present, a new transformation protocol, which utilizes a combination of protoplast and Agro transformation, is being evaluated.Keywords: anamorph, heterothallism, perithecia, pycnidia, sexual stage
Procedia PDF Downloads 1808946 Innovative Technology to Sustain Food Security in Qatar
Authors: Sana Abusin
Abstract:
Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.Keywords: food security, innovative technology, sustainability, food waste, Qatar
Procedia PDF Downloads 1228945 Innovation Strategies and Challenges in Emerging Economies: The Case of Research and Technology Organizations in Turkey
Authors: F. Demir
Abstract:
Innovation is highly critical for every company, especially for technology-based organizations looking to sustain their competitive advantage. However, this is not an easy task. Regardless of the size of the enterprise, market and location, all organizations face numerous challenges. Even though huge barriers to innovation exist in different countries, firm- and industry-specific challenges can be distinguished. This paper examines innovation strategies and obstacles to innovation in research and technology organizations (RTO) of Turkey. From the most important to the least, nine different challenges are ranked according the results of this survey. The findings reveal that to take the lead in innovation, financial constraint is the biggest challenge, which is consistent with the related literature. It ranked number one in this study. Beyond that, based on a sample of 40 RTOs, regional challenges such as underdeveloped regional innovation ecosystem plays a significant role in hampering innovation. Most of the organizations (55%) embrace an incremental approach to innovation, while only few pursue radical shifts. About 40% of the RTOs focus on product innovation, and 27.5% of them concentrate on technological innovation, while a very limited number aim for operational excellence and customer engagement as the focus of their strategic innovation efforts.Keywords: innovation strategies, innovation challenges, emerging economies, research and technology organizations
Procedia PDF Downloads 4158944 Public Relations Challenges in Georgia: Marketing Communications and Strategies
Authors: Marine Kobalava
Abstract:
Modern forms of public relations function in an integrated manner together with marketing communication in business companies. This ensures continuity of communication, elimination of duplication in activities, reduction of costs, and strengthening and efficient use of communication means. There exist a number of challenges in implementing integrated forms of public relations in Georgia, especially in terms of marketing communications and strategies. Objectives: The goal of the study is to reveal public relations challenges in Georgian business companies and to develop recommendations along with perfecting marketing communications and strategies. Methodologies: Bibliographic and empirical research has been conducted. Analysis, induction, synthesis, and other methods have been used. Contributions: The challenges of Public relations in Georgia are identified; the perception of different population groups on integrated forms of PR is determined; effective forms of marketing communication are defined; mechanisms for developing marketing strategies are proposed.Keywords: public relations, challenges, marketing communication, strategy
Procedia PDF Downloads 928943 Development of Educational Institutions in Afghanistan and Especially in the Region of “Herat” Opportunities and Challenges
Authors: Sayed Jamal Ud Din Heravi
Abstract:
The development of educational institutions has an important role in the progress and advancement of the state, in the stability and security of the state and its exposure, in the flourishing of minds, in devoting the role of science, developing society, and meeting people’s desires and needs. Afghanistan is a Muslim country located in Central Asia on the borders of Pakistan, Iran, Tajikistan, and Uzbekistan, and it also borders China's Xing yang. Unfortunately, these oppressed people have been living in wars that have been going on for four decades, in which educational institutions, schools and institutes have not developed. Rather, the war destroyed the infrastructure of this country, and no city or village remained in it but tasted the bloody wars. Now with the new government, we see that many government educational institutions are closed in this country, even if the state promises that it will open them quickly. As for universities and private institutions, they work in Afghanistan diligently and diligently, and among them, there is sharp competition in the use of professors and taking advantage of the available means for the sake of knowledge. It laid the building blocks for a bright dawn in which it seeks to keep pace with the procession of development and prosperity in the world.Keywords: Afghanistan, higher education, Herat province, opportunities, challenges
Procedia PDF Downloads 1198942 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 1168941 Advanced Analytical Competency Is Necessary for Strategic Leadership to Achieve High-Quality Decision-Making
Authors: Amal Mohammed Alqahatni
Abstract:
This paper is a non-empirical analysis of existing literature on digital leadership competency, data-driven organizations, and dealing with AI technology (big data). This paper will provide insights into the importance of developing the leader’s analytical skills and style to be more effective for high-quality decision-making in a data-driven organization and achieve creativity during the organization's transformation to be digitalized. Despite the enormous potential that big data has, there are not enough experts in the field. Many organizations faced an issue with leadership style, which was considered an obstacle to organizational improvement. It investigates the obstacles to leadership style in this context and the challenges leaders face in coaching and development. The leader's lack of analytical skill with AI technology, such as big data tools, was noticed, as was the lack of understanding of the value of that data, resulting in poor communication with others, especially in meetings when the decision should be made. By acknowledging the different dynamics of work competency and organizational structure and culture, organizations can make the necessary adjustments to best support their leaders. This paper reviews prior research studies and applies what is known to assist with current obstacles. This paper addresses how analytical leadership will assist in overcoming challenges in a data-driven organization's work environment.Keywords: digital leadership, big data, leadership style, digital leadership challenge
Procedia PDF Downloads 698940 Extraction of Urban Land Features from TM Landsat Image Using the Land Features Index and Tasseled Cap Transformation
Authors: R. Bouhennache, T. Bouden, A. A. Taleb, A. Chaddad
Abstract:
In this paper we propose a method to map the urban areas. The method uses an arithmetic calculation processed from the land features indexes and Tasseled cap transformation TC of multi spectral Thematic Mapper Landsat TM image. For this purpose the derived indexes image from the original image such SAVI the soil adjusted vegetation index, UI the urban Index, and EBBI the enhanced built up and bareness index were staked to form a new image and the bands were uncorrelated, also the Spectral Angle Mapper (SAM) and Spectral Information Divergence (SID) supervised classification approaches were first applied on the new image TM data using the reference spectra of the spectral library and subsequently the four urban, vegetation, water and soil land cover categories were extracted with their accuracy assessment.The urban features were represented using a logic calculation applied to the brightness, UI-SAVI, NDBI-greenness and EBBI- brightness data sets. The study applied to Blida and mentioned that the urban features can be mapped with an accuracy ranging from 92 % to 95%.Keywords: EBBI, SAVI, Tasseled Cap Transformation, UI
Procedia PDF Downloads 4828939 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 4778938 Cloud Monitoring and Performance Optimization Ensuring High Availability
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy
Procedia PDF Downloads 608937 Morphology Feature of Nanostructure Bainitic Steel after Tempering Treatment
Authors: Chih Yuan Chen, Chien Chon Chen, Jin-Shyong Lin
Abstract:
The microstructure characterization of tempered nanocrystalline bainitic steel is investigated in the present study. It is found that two types of plastic relaxation, dislocation debris and nanotwin, occurs in the displacive transformation due to relatively low transformation temperature and high carbon content. Because most carbon atoms trap in the dislocation, high dislocation density can be sustained during the tempering process. More carbides only can be found in the high tempered temperature due to intense recovery progression.Keywords: nanostructure bainitic steel, tempered, TEM, nano-twin, dislocation debris, accommodation
Procedia PDF Downloads 5368936 Implications of Internationalization for Management and Practice in Higher Education
Authors: Naziema B. Jappie
Abstract:
Internationalization is very complex and multifaceted and has implications for the entire university sector, and the larger community which it serves. Higher education strategic plans require sustainability on all levels of academic engagement and internationalization contributes to the sustainability because of the global competition but, at the same time, ensures diversity on campuses. Universities all over the world are increasingly recognizing the challenges of globalization and the pressures towards internationalization. The past 25 years of internationalization has faded away, and new challenges have emerged. Although internationalization remains a central strategic objective for all universities, for many leaders and education practitioners it has remained a confused concept. It has various interpretations, and it intersects with numerous other national agendas in higher education domain; it often builds upon narrow notions limited to one of its facets –attracting international student fees for financial sustainability or for ensuring a diverse campus culture. It is essential to have clear institutional views, but it is imperative that everyone reflects on the values and beliefs that underpin the internationalization of higher education and have a global focus. This paper draws together the international experience locally and globally to explore the emerging patterns of strategy and practice in internationalizing higher education. This will highlight some critical notions of how the concepts of internationalization and globalization in the context of higher education is understood by those who lead universities and what new challenges are being created as universities seek to become more international. Institutions cannot simply have bullet points in the strategic plan about recruitment of international students; there has to be a complete commitment to an international strategy of inclusivity. This paper will further examine the leadership styles that ensure transformation together with the goals set out for internationalization. The interviews with the senior leadership are in-depth semi-structured recorded interviews of approximately one-hour to learn about their institutional experiences, promotion, and enhancement of the value of internationalisation to the tertiary education sector and initiating discussions around adding the international relations dimension to the curriculum. This paper will address the issues relevant to the cross-border delivery of higher education. To ensure anonymity throughout this study, the interviewees are identified only by their institutions.Keywords: challenges, globalization, higher education, internationalization, strategic focus
Procedia PDF Downloads 1198935 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s
Authors: Zunjarrao Kadam, Vikas Minchekar
Abstract:
The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.Keywords: experimentally induced stress, facial recognition, cognition, security personnel
Procedia PDF Downloads 2618934 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry
Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim
Abstract:
Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain
Procedia PDF Downloads 918933 International Relations and the Transformation of Political Regimes in Post-Soviet States
Authors: Sergey Chirun
Abstract:
Using of a combination of institutional analysis and network access has allowed the author to identify the characteristics of the informal institutions of regional political power and political regimes. According to the author, ‘field’ of activity of post-Soviet regimes, formed under the influence of informal institutions, often contradicts democratic institutional regional changes which are aimed at creating of a legal-rational type of political domination and balanced model of separation of powers. This leads to the gap between the formal structure of institutions and the real nature of power, predetermining the specific character of the existing political regimes.Keywords: authoritarianism, institutions, political regime, social networks, transformation
Procedia PDF Downloads 4918932 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean
Authors: Jessica Kate Simonds
Abstract:
The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies
Procedia PDF Downloads 1858931 Solution to Riemann Hypothesis Critical Strip Zone Using Non-Linear Complex Variable Functions
Authors: Manojkumar Sabanayagam
Abstract:
The Riemann hypothesis is an unsolved millennium problem and the search for a solution to the Riemann hypothesis is to study the pattern of prime number distribution. The scope of this paper is to identify the solution for the critical strip and the critical line axis, which has the non-trivial zero solutions using complex plane functions. The Riemann graphical plot is constructed using a linear complex variable function (X+iY) and is applicable only when X>1. But the investigation shows that complex variable behavior has two zones. The first zone is the transformation zone, where the definition of the complex plane should be a non-linear variable which is the critical strip zone in the graph (X=0 to 1). The second zone is the transformed zone (X>1) defined using linear variables conventionally. This paper deals with the Non-linear function in the transformation zone derived using cosine and sinusoidal time lag w.r.t imaginary number ‘i’. The alternate complex variable (Cosθ+i Sinθ) is used to understand the variables in the critical strip zone. It is concluded that the non-trivial zeros present in the Real part 0.5 are because the linear function is not the correct approach in the critical strip. This paper provides the solution to Reimann's hypothesis.Keywords: Reimann hypothesis, critical strip, complex plane, transformation zone
Procedia PDF Downloads 2088930 Detection of Transgenes in Cotton (Gossypium hirsutum L.) by using Biotechnology/Molecular Biological Techniques
Authors: Ahmad Ali Shahid, M Shakil Shaukat
Abstract:
Agriculture is the backbone of economy of Pakistan and Cotton is the major agricultural export and supreme source of raw fiber for our textile industry. To combat against the developing resistance in the target insects and combating these challenges wholesomely, a novel combination of pyramided/stacked genes was conceptualized and later realized, through the means of biotechnology i.e., transformation of three genes namely, Cry1Ac, Cry2A, and EPSP synthase (glyphosate tolerant) genes in the locally cultivated cotton variety. The progenies of the transformed plants were successfully raised and screened under the tunnel conditions for two generations and the present study focused on the screening of plants which were confirmed for containing all of these three genes and their expressions. Initially, the screening was done through glyphosate spray assay and the plants which were healthy and showed no damage on leaves were selected after 07 days of spray. In the laboratory, the DNA of these plants were isolated and subjected to amplification of the three genes. Thus, seventeen out of twenty were confirmed positive for Cry1Ac gene and ten out of twenty were positive for Cry2A gene and all twenty were positive for presence of EPSP synthase gene. Then, the ten plant samples which were confirmed with presence of all three genes were subjected to expression analysis of these proteins through ELISA. The results showed that eight out of ten plants were actively expressing the three transgenes. Real-time PCR was also done to quantify the expression levels of the EPSP synthase gene. Finally, eight plants were confirmed for the presence and active expression of all three genes in T3 generation of the triple gene transformed cotton. These plants may be subjected to T4 generation to develop a new stable variety in due course of time.Keywords: agriculture, cotton, transformation, cry genes, ELISA, PCR
Procedia PDF Downloads 3948929 Secure Watermarking not at the Cost of Low Robustness
Authors: Jian Cao
Abstract:
This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)
Procedia PDF Downloads 3858928 Transformation of Bangladesh Society: The Role of Religion
Authors: Abdul Wohab
Abstract:
Context: The role of religion in the transformation of Bangladesh society has been significant since 1975. There has been a rise in religious presence, particularly Islam, in both private and public spheres supported by the state apparatuses. In 2009, a 'secular' political party came into power for the second time since independence and initiated the modernization of religious education systems. This research focuses on the transformation observed among the educated middle class who now prefer their children to attend modern, English medium madrasas that offer both religion-based and secular education. Research Aim: This research aims to investigate two main questions: a) what motivates the educated middle class to send their children to madrasa education? b) To what extent can it be argued that Bangladeshi society is transforming from its secular nature to being more religious?Methodology: The research applies a combination of primary and secondary methods. Case studies serve as the primary method, allowing for an in-depth exploration of the motivations of the educated middle class. The secondary method involves analyzing published news articles, op-eds, and websites related to madrasa education, as well as studying the reading syllabus of Aliya and Qwami madrasas in Bangladesh. Findings: Preliminary findings indicate that the educated middle class chooses madrasa education for reasons such as remembering and praying for their departed relatives, keeping their children away from substance abuse, fostering moral and ethical values, and instilling respect for seniors and relatives. The research also reveals that religious education is believed to help children remain morally correct according to the Quran and Hadith. Additionally, the establishment of madrasas in Bangladesh is attributed to economic factors, with demand and supply mechanisms playing a significant role. Furthermore, the findings suggest that government-run primary education institutions in rural areas face more challenges in enrollment compared to religious educational institutions like madrasas. Theoretical Importance: This research contributes to the understanding of societal transformation and the role of religion in this process. By examining the case of Bangladesh, it provides insights into how religion influences education choices and societal values. Data Collection and Analysis Procedures: Data for this research is collected through case studies, including interviews and observations of educated middle-class families who send their children to madrasas. In addition, analysis is conducted on relevant published materials such as news articles, op-eds, and websites. The reading syllabus of Aliya and Qwami madrasas is also analyzed to gain a comprehensive understanding of the education system. Questions Addressed: The research addresses two questions: a) what motivates the educated middle class to choose madrasa education for their children? b) To what extent can it be argued that Bangladeshi society is transforming from its secular nature to being more religious?Conclusion: The preliminary findings of this research highlight the motivations of the educated middle class in opting for madrasa education, including the desire to maintain religious traditions, promote moral values, and provide a strong foundation for their children. It also suggests that Bangladeshi society is experiencing a transformation towards a more religious orientation. This research contributes to the understanding of societal changes and the role of religion within Bangladesh, shedding light on the complex dynamics between religion and education.Keywords: madrasa education, transformation, Bangladesh, religion and society, education
Procedia PDF Downloads 648927 The Principle of Methodological Rationality and Security of Organisations
Authors: Jan Franciszek Jacko
Abstract:
This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics
Procedia PDF Downloads 1398926 The Leadership Criterion: Challenges in Pursuing Excellence in the Jordanian Public Sector
Authors: Shaker Aladwan, Paul Forrester
Abstract:
This paper explores the challenges that face leaders when implementing business excellence programmes in the Jordanian public sector. The study adopted a content analysis approach to analyse the excellence assessment reports that have been produced by the King Abdullah II Centre for Excellence (KACE). The sample comprises ten public organisations which have participated in the King Abdullah Award for Excellence (KAA) more than once and acknowledge in their reports that they have failed to achieve satisfactory results. The key challenges to the implementation of leadership criteria in the public sector in Jordan were found to be poor strategic planning, lack of employee empowerment, weaknesses in benchmarking performance, a lack of financial resources, poor integration and coordination, and poor measurement system: This study proposes a conceptual model for the as assessment of challenges that face managers when seeking to implement excellence in leadership in the Jordanian public sector. Theoretically, this paper fills context gaps in the excellence literature in general and organisational excellence in the public sector in particular. Leadership challenges in the public sector are generally widely studied, but it is important to gain a better understanding of how these challenges can be overcome. In comparison to many existing studies, this research has provided specific and detailed insights these organisational excellence challenges in the public sector and provides a conceptual model for use by other researchers into the future.Keywords: leadership criterion, organisational excellence, challenges, quality awards, public sector, Jordan
Procedia PDF Downloads 3908925 The Crisis in Ukraine and the End of the Post Cold War Security Delusions in Europe
Authors: Georgios Siachamis
Abstract:
The main objective of this paper is to examine how the crisis in Ukraine can change our perception and understanding of the strategic challenges in Europe. It will try also to address the main factors behind the beginning of the conflict in Ukraine, the miscalculations and mistakes that lead towards the escalation of the crisis and what constructive initiatives are needed to be taken in order to avoid further instability in the region. Furthermore, measures in order to develop a more stable relation with Russia are also going to be presented. Finally the implementation of a new strategic outlook for the EU is also going to be analysed.Keywords: crisis management, European grand strategy, crisis in Ukraine, Russian policy
Procedia PDF Downloads 3698924 An Interdisciplinary Maturity Model for Accompanying Sustainable Digital Transformation Processes in a Smart Residential Quarter
Authors: Wesley Preßler, Lucie Schmidt
Abstract:
Digital transformation is playing an increasingly important role in the development of smart residential quarters. In order to accompany and steer this process and ultimately make the success of the transformation efforts measurable, it is helpful to use an appropriate maturity model. However, conventional maturity models for digital transformation focus primarily on the evaluation of processes and neglect the information and power imbalances between the stakeholders, which affects the validity of the results. The Multi-Generation Smart Community (mGeSCo) research project is developing an interdisciplinary maturity model that integrates the dimensions of digital literacy, interpretive patterns, and technology acceptance to address this gap. As part of the mGeSCo project, the technological development of selected dimensions in the Smart Quarter Jena-Lobeda (Germany) is being investigated. A specific maturity model, based on Cohen's Smart Cities Wheel, evaluates the central dimensions Working, Living, Housing and Caring. To improve the reliability and relevance of the maturity assessment, the factors Digital Literacy, Interpretive Patterns and Technology Acceptance are integrated into the developed model. The digital literacy dimension examines stakeholders' skills in using digital technologies, which influence their perception and assessment of technological maturity. Digital literacy is measured by means of surveys, interviews, and participant observation, using the European Commission's Digital Literacy Framework (DigComp) as a basis. Interpretations of digital technologies provide information about how individuals perceive technologies and ascribe meaning to them. However, these are not mere assessments, prejudices, or stereotyped perceptions but collective patterns, rules, attributions of meaning and the cultural repertoire that leads to these opinions and attitudes. Understanding these interpretations helps in assessing the overarching readiness of stakeholders to digitally transform a/their neighborhood. This involves examining people's attitudes, beliefs, and values about technology adoption, as well as their perceptions of the benefits and risks associated with digital tools. These insights provide important data for a holistic view and inform the steps needed to prepare individuals in the neighborhood for a digital transformation. Technology acceptance is another crucial factor for successful digital transformation to examine the willingness of individuals to adopt and use new technologies. Surveys or questionnaires based on Davis' Technology Acceptance Model can be used to complement interpretive patterns to measure neighborhood acceptance of digital technologies. Integrating the dimensions of digital literacy, interpretive patterns and technology acceptance enables the development of a roadmap with clear prerequisites for initiating a digital transformation process in the neighborhood. During the process, maturity is measured at different points in time and compared with changes in the aforementioned dimensions to ensure sustainable transformation. Participation, co-creation, and co-production are essential concepts for a successful and inclusive digital transformation in the neighborhood context. This interdisciplinary maturity model helps to improve the assessment and monitoring of sustainable digital transformation processes in smart residential quarters. It enables a more comprehensive recording of the factors that influence the success of such processes and supports the development of targeted measures to promote digital transformation in the neighborhood context.Keywords: digital transformation, interdisciplinary, maturity model, neighborhood
Procedia PDF Downloads 778923 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics
Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan
Abstract:
The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning
Procedia PDF Downloads 150