Search results for: coding rules
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1687

Search results for: coding rules

787 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 39
786 Symmetry Properties of Linear Algebraic Systems with Non-Canonical Scalar Multiplication

Authors: Krish Jhurani

Abstract:

The research paper presents an in-depth analysis of symmetry properties in linear algebraic systems under the operation of non-canonical scalar multiplication structures, specifically semirings, and near-rings. The objective is to unveil the profound alterations that occur in traditional linear algebraic structures when we replace conventional field multiplication with these non-canonical operations. In the methodology, we first establish the theoretical foundations of non-canonical scalar multiplication, followed by a meticulous investigation into the resulting symmetry properties, focusing on eigenvectors, eigenspaces, and invariant subspaces. The methodology involves a combination of rigorous mathematical proofs and derivations, supplemented by illustrative examples that exhibit these discovered symmetry properties in tangible mathematical scenarios. The core findings uncover unique symmetry attributes. For linear algebraic systems with semiring scalar multiplication, we reveal eigenvectors and eigenvalues. Systems operating under near-ring scalar multiplication disclose unique invariant subspaces. These discoveries drastically broaden the traditional landscape of symmetry properties in linear algebraic systems. With the application of these findings, potential practical implications span across various fields such as physics, coding theory, and cryptography. They could enhance error detection and correction codes, devise more secure cryptographic algorithms, and even influence theoretical physics. This expansion of applicability accentuates the significance of the presented research. The research paper thus contributes to the mathematical community by bringing forth perspectives on linear algebraic systems and their symmetry properties through the lens of non-canonical scalar multiplication, coupled with an exploration of practical applications.

Keywords: eigenspaces, eigenvectors, invariant subspaces, near-rings, non-canonical scalar multiplication, semirings, symmetry properties

Procedia PDF Downloads 122
785 Studying Second Language Development from a Complex Dynamic Systems Perspective

Authors: L. Freeborn

Abstract:

This paper discusses the application of complex dynamic system theory (DST) to the study of individual differences in second language development. This transdisciplinary framework allows researchers to view the trajectory of language development as a dynamic, non-linear process. A DST approach views language as multi-componential, consisting of multiple complex systems and nested layers. These multiple components and systems continuously interact and influence each other at both the macro- and micro-level. Dynamic systems theory aims to explain and describe the development of the language system, rather than make predictions about its trajectory. Such a holistic and ecological approach to second language development allows researchers to include various research methods from neurological, cognitive, and social perspectives. A DST perspective would involve in-depth analyses as well as mixed methods research. To illustrate, a neurobiological approach to second language development could include non-invasive neuroimaging techniques such as electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) to investigate areas of brain activation during language-related tasks. A cognitive framework would further include behavioural research methods to assess the influence of intelligence and personality traits, as well as individual differences in foreign language aptitude, such as phonetic coding ability and working memory capacity. Exploring second language development from a DST approach would also benefit from including perspectives from the field of applied linguistics, regarding the teaching context, second language input, and the role of affective factors such as motivation. In this way, applying mixed research methods from neurobiological, cognitive, and social approaches would enable researchers to have a more holistic view of the dynamic and complex processes of second language development.

Keywords: dynamic systems theory, mixed methods, research design, second language development

Procedia PDF Downloads 134
784 Preparation of Nano-Scaled linbo3 by Polyol Method

Authors: Gabriella Dravecz, László Péter, Zsolt Kis

Abstract:

Abstract— The growth of optical LiNbO3 single crystal and its physical and chemical properties are well known on the macroscopic scale. Nowadays the rare-earth doped single crystals became important for coherent quantum optical experiments: electromagnetically induced transparency, slow down of light pulses, coherent quantum memory. The expansion of applications is increasingly requiring the production of nano scaled LiNbO3 particles. For example, rare-earth doped nanoscaled particles of lithium niobate can be act like single photon source which can be the bases of a coding system of the quantum computer providing complete inaccessibility to strangers. The polyol method is a chemical synthesis where oxide formation occurs instead of hydroxide because of the high temperature. Moreover the polyol medium limits the growth and agglomeration of the grains producing particles with the diameter of 30-200 nm. In this work nano scaled LiNbO3 was prepared by the polyol method. The starting materials (niobium oxalate and LiOH) were diluted in H2O2. Then it was suspended in ethylene glycol and heated up to about the boiling point of the mixture with intensive stirring. After the thermal equilibrium was reached, the mixture was kept in this temperature for 4 hours. The suspension was cooled overnight. The mixture was centrifuged and the particles were filtered. Dynamic Light Scattering (DLS) measurement was carried out and the size of the particles were found to be 80-100 nms. This was confirmed by Scanning Electron Microscope (SEM) investigations. The element analysis of SEM showed large amount of Nb in the sample. The production of LiNbO3 nano particles were succesful by the polyol method. The agglomeration of the particles were avoided and the size of 80-100nm could be reached.

Keywords: lithium-niobate, nanoparticles, polyol, SEM

Procedia PDF Downloads 132
783 Experimental Investigation on the Mechanical Behaviour of Three-Leaf Masonry Walls under In-Plane Loading

Authors: Osama Amer, Yaser Abdel-Aty, Mohamed Abd El Hady

Abstract:

The present paper illustrates an experimental approach to provide understanding of the mechanical behavior and failure mechanisms of different typologies of unreinforced three-leaf masonry walls of historical Islamic architectural heritage in Egypt. The main objective of this study is to investigate the propagation of possible cracking, ultimate load, deformations and failure mechanisms. Experimental data on interface-shear and compression tests on large scale three-leaf masonry wallets are provided. The wallets were built basically of Egyptian limestone and modified lime mortar. External wallets were built of stone blocks while the inner leaf was built of rubble limestone. Different loading conditions and dimensions of core layer for two types of collar joints (with and without shear keys) are considered in the tests. Mechanical properties of the constituent materials of masonry were tested and a database of characteristic properties was created. The results of the experiments will highlight the properties, force-displacement curves, stress distribution of multiple-leaf masonry walls contributing to the derivation of rational design rules and validation of numerical models.

Keywords: masonry, three-leaf walls, mechanical behavior, testing, architectural heritage

Procedia PDF Downloads 289
782 Tracing the History of Indian Legal System Vis-A-Vis the Code of Hammurabi

Authors: Vandana Kumari

Abstract:

One of the most ancient and detailed legal codes proclaimed the Babylonian King Hammurabi during his reign in the erstwhile Mesopotamian society, provides a fascinating account of the social and justice system of Babylon. The 282 laws intricately carved on eight feet black stone stela serve as an important source of contemporary commercial, family and criminals laws. This paper attempts an inquiry into the contemporary relevance of this legal code to our current legal system. An exhaustive study of one of ancient legal system based on a series of practical experiences rather than being founded on mere theoretical ideologies can be assumed pertinent to the promulgation of practically viable laws in our country. The first chapter of the paper focuses on law seven which established the rules of commerce and the role of government in overseeing justice and honesty regarding the law of property. The second chapter deals with the laws of family, marriages, divorce and adoption prevailing in the Babylonian era. The third chapter traces the earliest known history of criminal jurisprudence which impregnated the principle of an eye for an eye. The paper is not merely a theoretical account of the Mesopotamian way of living but a novice attempt to discover the roots of Indian laws in the ruins of the courtrooms of the Hammurabi Empire.

Keywords: Babylonian legal system, Contemporary relevance, criminal jurisprudence, Hammurabi Code

Procedia PDF Downloads 305
781 A Morphological Analysis of Swardspeak in the Philippines

Authors: Carlo Gadingan

Abstract:

Swardspeak, as a language, highlights the exclusive identity of the Filipino gay men and the oppression they are confronted in the society. This paper presents a morphological analysis of swardspeak in the Philippines. Specifically, it aims to find out the common morphological processes involved in the construction of codes that may unmask the nature of swardspeak as a language. 30 purposively selected expert users of swardspeak from Luzon, Visayas, and Mindanao were asked to codify 30 natural words through the Facebook Messenger application. The results of the structural analysis affirm that swardspeak follows no specific rules revealing complicated combinations of clipping/stylized clipping, borrowing, connotation through images, connotation through actions, connotation through sounds, affixation, repetition, substitution, and simple reversal. Moreover, it was also found out that most of these word formation processes occur in all word classes which indicate that swardspeak is very unpredictable. Although different codes are used for the same words, there are still codes that are really common to all homosexuals and these are Chaka (ugly), Crayola (cry), and Aida (referring to a person with AIDS). Hence, the prevailing word formation processes explored may be termed as observed time-specific patterns because the codes documented in this study may turn obsolete and may be replaced with novel ones in a matter of weeks to month, knowing the creativity of homosexuals and the multiplicity of societal resources which can be used to make the codes more opaque and more confusing for non-homosexuals.

Keywords: codes, homosexuals, morphological processes, swardspeak

Procedia PDF Downloads 178
780 An Examination of Criminology and Cyber Crime in Contemporary Society

Authors: Uche A. Nnawulezi

Abstract:

The evolving global environment has as of late seen formative difficulties bordering on cyber crime and its attendant effects. This paper looks at what constitutes an offense of cyber crime under the tenets of International Law as no nation can lay bona-fide claim in managing cyber crime as a criminal phenomenon. Therefore, there has been a plethora of ideological, conceptual and mental propositions of policies aimed at domesticating cyber crimes – an international crime. These policies were as a result of parochial consideration and social foundations which negate the spirit of internationally accepted procedures. The study also noted that the non-domestication of cyber crime laws by most countries has led to an increase in cyber crimes and its attendant effects have remained unabated. The author has pointed out emerging international rules as a panacea for a sustainable cyber crime-free society. The paper relied on documentary evidence and hence scooped much of the data from secondary sources such as text books, journals, articles and periodicals and more so, opinion papers, emanating from international criminal court. It concludes that the necessary recommendations made in this paper, if fully adopted, shall go a long way in maintaining a cyber crime-free society. Ultimately, the domestic and international law mechanisms capable of dealing with cyber crime offenses should be expanded and be made proactive in order to deal with the demands of modern day challenges.

Keywords: criminology, cyber crime, domestic law, international law

Procedia PDF Downloads 192
779 Interplay of Imaginary, Symbolic and Real In Shakespeare's Hamlet, Disturbance of Nature

Authors: Mahnaz Poorshahidi

Abstract:

This article is a psychological reading of Shakespeare’s Hamlet applying Lacan’s ideas to work with a new look. Lacan entitled Hamlet ‘tragedy of desire’. He believes that Hamlet is caught up in the desire of his mother. So he is the universal symbol of all human beings, regardless of their sex, who desire their mother, but based on the rules of Nature and Father, this unity is impossible. Hamlet hesitates in fulfilling the task of revenge and the text says nothing about the reasons and motives behind it. However, this essay tries to answer the question and justify Hamlet’s hesitation. There is one question for the readers, which is why Hamlet appears to delay in killing his uncle, despite the fact that this is precisely what he seems to want to do. In 1958-59 Lacan delivered a series of lectures on Hamlet entitled ‘Desire and Its Interpretations’ and called it ‘tragedy of desire’. However, this article will have a new representation of Hamlet’s decision not to take revenge. The research demonstrates that Hamlet has passed through imaginary, symbolic and real stages, which are the natural process of life. Eliminating father means disturbing this natural process. This essay is going to conclude that killing Claudius can break the natural order of life. On the other hand, Claudius has also disturbed nature and is regretful about his deed. Hamlet’s ever-present speech ‘To be or not to be’ reflects his mental turmoil and disturbance of the natural life cycle: Nature.

Keywords: desire, father figure, lacan, nature

Procedia PDF Downloads 232
778 Grassroots Feminist Organizing in the Shadow of State Feminism in Ethiopia

Authors: Tina Beyene

Abstract:

In this paper examines the state of grassroots feminist activism in the backdrop of state feminism in Ethiopia. Specifically, I examine the impact of the Charities and Societies Proclamation (aka CSO law), a 2009 law that banned so-called foreign NGOs—i.e., those receiving more than 10% of its operating budget from non-local sources— from working in the areas of human rights, democracy, governance, and gender equality. Viewed as government retribution for the NGO opposition to the government in the 2005 elections, the law aimed to halt the work groups such as the Ethiopian Women Lawyers Association (EWLA), who were defined as a “foreign” NGO. Based on interviews with prominent Ethiopian women’s rights leaders in Addis Ababa, Ethiopia, I assess how grassroots feminist organizing adapts to state suppression on the one hand, and the aggressive entry of the state into women’s rights work on the other hand. While the 2009 law has slowed down the work of women’s rights activism, displaced feminists view feminist advocacy as cyclical and the state as neither fully adversarial nor an ally but rather as an instable entity that at times provides political openings to push ambitious feminist agendas. Grassroots activists are regrouping and developing new political responses strategies such as coding rights issues to fit state mandate; dissembling rights work in permissible social provision language; rechanneling political work into informal spaces and unregistered social clubs; innovating new funding partnerships, and reassembling as privately held research and advocacy companies. my study reveals how grassroots feminist politics operates in the shadow of a hostile state and within the confines of local politics.

Keywords: grassroots feminism, ethiopian feminism, civil society and gender, state feminism

Procedia PDF Downloads 169
777 Dogmatic Instrumant in Financing Micro Project

Authors: Adel Fatima Zohra, Guendouz Abdelkader

Abstract:

The solitary sector seems to appear nowadays as a third sector along the private and public ones, because of their ineptitude to take in charge the social exigency of the society regarding the lack in their local assets and the weakness of their financial institutions. The role of this sector is promoting a set of activities in the field of the charity, without aiming neither the individual profit nor a power practice. With the rise in the need of domestic resources, it is possible to count on the Zakat funding to realize some investment projects in order to develop the local society in many sectors as health, agriculture … etc. In the Islamic financial system, the Zakat is likely one of the most important instruments in financing the local development with the respect of the “Charia” rules: the amount of the Zakat is 2.5% of a wealth equivalent of each 85 gr of gold possessed since one year at least. In Algeria a fund of Zakat, was created since 2003 as an alternative to the public finding of development. This fund is a religious and social institution under the supervision of the ministry of religious affairs. This supervision covers two tasks: the first is traditional witch concern the distribution and the forwarding of the zakat to the poor people, and the second is modern concerning the financing of microcredits in the aim to enhance social and economic development. In this paper, we try to highlight the main role of the Zakat fund and its impact on the both social and economic development in Algeria.

Keywords: dogmatic instrument, solidary sector, zakat fund, micro project

Procedia PDF Downloads 273
776 Changing Landscape of International Law of Governance: ‘One Belt One Road Initiative’ as a Case Study

Authors: Tikumporn Rodkhunmuang

Abstract:

The importance of ‘international law of governance’ is the means and end to deal with international affairs. This research paper seeks to first study the historical development of international law of governance from the classical period of the international legal framework of global governance until the contemporary period of its framework. Second, the international law of governance is extremely turning into the crucial point in its long history because of the changing of China's foreign policies towards ‘One Belt One Road Initiative’. Third, the proposing model of the existing international law of governance within Chinese characteristics will be the new rules and modalities of modern diplomacy and governed international affairs. Methodologically speaking, this research paper is conducting under mixed methods research, which are also included numerical analysis and theoretical considerations. As a result, this research paper is the critical point of the international legal framework of global governance that changing the diplomatic paradigm as well as turning China into a great-power in international politics. So, this research paper is useful for international legal scholars and diplomats for slightly changing their understanding of the rapidly changing their norms from western norms to the eastern norms of international law. Therefore, the outcome of the research is the modern model of China to make a diplomatic relationship with other countries in the global society.

Keywords: global governance, international law, landscape, one belt one road

Procedia PDF Downloads 186
775 Improving Research by the Integration of a Collaborative Dimension in an Information Retrieval (IR) System

Authors: Amel Hannech, Mehdi Adda, Hamid Mcheick

Abstract:

In computer science, the purpose of finding useful information is still one of the most active and important research topics. The most popular application of information retrieval (IR) are Search Engines, they meet users' specific needs and aim to locate the effective information in the web. However, these search engines have some limitations related to the relevancy of the results and the ease to explore those results. In this context, we proposed in previous works a Multi-Space Search Engine model that is based on a multidimensional interpretation universe. In the present paper, we integrate an additional dimension that allows to offer users new research experiences. The added component is based on creating user profiles and calculating the similarity between them that then allow the use of collaborative filtering in retrieving search results. To evaluate the effectiveness of the proposed model, a prototype is developed. The experiments showed that the additional dimension has improved the relevancy of results by predicting the interesting items of users based on their experiences and the experiences of other similar users. The offered personalization service allows users to approve the pertinent items, which allows to enrich their profiles and further improve research.

Keywords: information retrieval, v-facets, user behavior analysis, user profiles, topical ontology, association rules, data personalization

Procedia PDF Downloads 258
774 Importance of Access to Public Information on Modern Slavery for Brazil's Livestock Sector

Authors: Juliana Brandao, Holly Gibbs, Lisa Naughton, Lisa Rausch

Abstract:

The Brazilian Amazon continues to be plagued by modern day slave labor, specifically within the cattle production industry. In response to this issue, modern day anti-slavery activists have implemented additional regulations designed to combat slave labor associated with cattle. These regulations have been incorporated into existing agreements designed to control deforestation. The goal of these rules is to prevent the trade of beef contaminated with modern slave labor between supplier farms and slaughterhouses. In this study, we identify farms that make use of modern slave labor, and we use cattle transaction data to track the sale of cattle between farms and slaughterhouses. Our analysis reveals that slaughterhouses, which have signed cattle agreements that include requirements to refuse cattle associated with modern slave labor, have avoided buying cattle from suppliers that were on the dirty list. This trend is especially evident when the "dirty lists" that identify modern-day slave labor users are made publicly accessible online. We conclude that the "dirty list" of modern-day slave labor users should be maintained on publicly available websites to allow slaughterhouses, retailers, and consumers to send powerful market signals that discourage the use of modern-day slave labor.

Keywords: cattle ranchers, modern slave labor, deforestation, brazilian amazon

Procedia PDF Downloads 115
773 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice

Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese

Abstract:

Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.

Keywords: documentation, knowledge, patient care, patient’s information, training

Procedia PDF Downloads 188
772 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 756
771 Corporate Governance and Business Ethical Values in Organisation: AStudyof Unilag Holdings

Authors: Mr. Aribisala Oluwadamilare Olufolarin

Abstract:

The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things.

Keywords: business ethics, business ethical values, corporate governance, organization

Procedia PDF Downloads 4
770 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 224
769 An Automated Business Process Management for Smart Medical Records

Authors: K. Malak, A. Nourah, S.Liyakathunisa

Abstract:

Nowadays, healthcare services are facing many challenges since they are becoming more complex and more needed. Every detail of a patient’s interactions with health care providers is maintained in Electronic Health Records (ECR) and Healthcare information systems (HIS). However, most of the existing systems are often focused on documenting what happens in manual health care process, rather than providing the highest quality patient care. Healthcare business processes and stakeholders can no longer rely on manual processes, to provide better patient care and efficient utilization of resources, Healthcare processes must be automated wherever it is possible. In this research, a detail survey and analysis is performed on the existing health care systems in Saudi Arabia, and an automated smart medical healthcare business process model is proposed. The business process management methods and rules are followed in discovering, collecting information, analysis, redesign, implementation and performance improvement analysis in terms of time and cost. From the simulation results, it is evident that our proposed smart medical records system can improve the quality of the service by reducing the time and cost and increasing efficiency

Keywords: business process management, electronic health records, efficiency, cost, time

Procedia PDF Downloads 340
768 Corporate Governance and Business Ethical Values in Organisation: A Study of Unilag Holdings

Authors: Aribisala Oluwadamilare Olufolarin

Abstract:

The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things.

Keywords: business ethics, business ethical values, corporate governance and organization, corporate governance

Procedia PDF Downloads 3
767 Decision Making Communication in the Process of Technologies Commercialization: Archival Analysis of the Process Content

Authors: Vaida Zemlickiene

Abstract:

Scientists around the world and practitioners are working to identify the factors that influence the results of technology commercialization and to propose the ideal model for the technology commercialization process. In other words, all stakeholders of technology commercialization seek to find a formula or set of rules to succeed in commercializing technologies in order to avoid unproductive investments. In this article, the process of commercialization technology is understood as the process of transforming inventions into marketable products, services, and processes, or the path from the idea of using an invention to a product that incorporates process from 1 to 9 technology readiness level (TRL). There are many publications in the field of management literature, which are aimed at managing the commercialization process. However, there is an apparent lack of research for communication in decision-making in the process of technology commercialization. Works were done in the past, and the last decade's global research analysis led to the unambiguous conclusion that the methodological framework is not mature enough to be of practical use in business. The process of technology commercialization and the decisions made in the process should be explored in-depth. An archival analysis is performed to find insights into decision-making communication in the process of technologies commercialization, to find out the content of technology commercialization process: decision-making stages and participants, to analyze the internal factors of technology commercialization, to perform their critical analysis, to analyze the concept of successful/unsuccessful technology commercialization.

Keywords: the process of technology commercialization, communication in decision-making process, the content of technology commercialization process, successful/unsuccessful technology commercialization

Procedia PDF Downloads 151
766 The Importance and Role of Sukuk Marketing as an Islamic Bond in the Economy

Authors: Ilhan Keskin, Hasan Bulent Kantarci

Abstract:

In this study, one of the tools of Islamic financing known as “Sukuk” a non-interest bearing investment which has started to be implemented in Turkey and the world as a whole is discussed. In order to increase the vitality and efficiency of the economy, by taking lessons from the recent economic crisis new developments in the banking and investment sector are being expanded. The purpose of all investors is to obtain more revenue through the use of capital. The inability of traditional investment tools to meet the expectations of investors and the interest based financial system where one investor benefits at the expense of another there has been the need for a different, reliable and non-interest bearing financial market that is consistent with the Islamic rule. As a result an alternative and more reliable interest free financing tool “Sukuk” rental certificates covering people who are sensitive to Islamic rules, appeal to all segments, hidden remaining capital that contributes to the economy, reduce disparities in income distribution, common risk sharing system of profit and loss sharing has emerged. Today, for the structural countries by examining the state of the world market economy the applicability, enactment and future issues associated with this attractive kind of Islamic finance namely the “Sukuk” market has been explained.

Keywords: Islamic finance, islamic markets, non-interest bearing, rental certificates

Procedia PDF Downloads 522
765 Hunting Ban, Unfortunate Decisions for the Bear Population in Romania

Authors: Alexandru Gridan, Georgeta Ionescu, Ovidiu Ionescu, Ramon Jurj, George Sirbu, Mihai Fedorca

Abstract:

The Brown Bear population size in Romania is approximately 7300-7600 individuals, which is projected to be 3000 individuals over the ecological carrying capacity. The Habitats Directive imposed certain protection rules on European Union (EU) Member States with Brown Bear populations. These however allow countries like Sweden, Croatia, Slovakia, Estonia to hunting as management tool, harvesting up to 10% of the surplus bear population annually. From the point Romania joined the EU to 2016, active conservation management has contributed to maintaining the highest and most genetically diverse Brown Bear population in Europe. Importantly, there has been good coexistence between people and bears and low levels of human-bear conflict. After social pressure and campaigning by some non-governmental organisations citing issues over monitoring, the environment minister decided in September 2016 to stop the use of hunting as a management tool for bears. Against this background, this paper provides a set of recommendations to resolve the current conflict in Romania. These include the need for collaborative decision-making to reduce conflicts between stakeholders and mechanisms to reduce current human-bear conflicts, which have increased by 50 percent in the past year.

Keywords: bear, bear population, bear management, wildlife conflict

Procedia PDF Downloads 181
764 Facilitating Written Biology Assessment in Large-Enrollment Courses Using Machine Learning

Authors: Luanna B. Prevost, Kelli Carter, Margaurete Romero, Kirsti Martinez

Abstract:

Writing is an essential scientific practice, yet, in several countries, the increasing university science class-size limits the use of written assessments. Written assessments allow students to demonstrate their learning in their own words and permit the faculty to evaluate students’ understanding. However, the time and resources required to grade written assessments prohibit their use in large-enrollment science courses. This study examined the use of machine learning algorithms to automatically analyze student writing and provide timely feedback to the faculty about students' writing in biology. Written responses to questions about matter and energy transformation were collected from large-enrollment undergraduate introductory biology classrooms. Responses were analyzed using the LightSide text mining and classification software. Cohen’s Kappa was used to measure agreement between the LightSide models and human raters. Predictive models achieved agreement with human coding of 0.7 Cohen’s Kappa or greater. Models captured that when writing about matter-energy transformation at the ecosystem level, students focused on primarily on the concepts of heat loss, recycling of matter, and conservation of matter and energy. Models were also produced to capture writing about processes such as decomposition and biochemical cycling. The models created in this study can be used to provide automatic feedback about students understanding of these concepts to biology faculty who desire to use formative written assessments in larger enrollment biology classes, but do not have the time or personnel for manual grading.

Keywords: machine learning, written assessment, biology education, text mining

Procedia PDF Downloads 279
763 Loan Repayment Prediction Using Machine Learning: Model Development, Django Web Integration and Cloud Deployment

Authors: Seun Mayowa Sunday

Abstract:

Loan prediction is one of the most significant and recognised fields of research in the banking, insurance, and the financial security industries. Some prediction systems on the market include the construction of static software. However, due to the fact that static software only operates with strictly regulated rules, they cannot aid customers beyond these limitations. Application of many machine learning (ML) techniques are required for loan prediction. Four separate machine learning models, random forest (RF), decision tree (DT), k-nearest neighbour (KNN), and logistic regression, are used to create the loan prediction model. Using the anaconda navigator and the required machine learning (ML) libraries, models are created and evaluated using the appropriate measuring metrics. From the finding, the random forest performs with the highest accuracy of 80.17% which was later implemented into the Django framework. For real-time testing, the web application is deployed on the Alibabacloud which is among the top 4 biggest cloud computing provider. Hence, to the best of our knowledge, this research will serve as the first academic paper which combines the model development and the Django framework, with the deployment into the Alibaba cloud computing application.

Keywords: k-nearest neighbor, random forest, logistic regression, decision tree, django, cloud computing, alibaba cloud

Procedia PDF Downloads 132
762 Mandatory Mediation in Defamation Suits: A Balancing of the Scales between Freedom of Expression and the Protection of Reputation

Authors: Ronelle Prinsloo

Abstract:

Rule 41A was introduced to the Uniform Rules of Court with the intention of promoting alternative dispute resolution (ADR), specifically mediation, as a means of resolving disputes; its voluntary nature allows parties to explore mediation willingly without the imposition of a mandatory requirement. Defamation suits, often notorious for their protracted litigation timelines, could benefit from the streamlined efficiency offered by mandatory rule 41A processes. Mediation, when mandated, could serve as a swift alternative, alleviating the burden on the court system and providing expedited relief to aggrieved parties. By incorporating a mandatory mediation step, parties might be encouraged to engage in a more constructive dialogue at an earlier stage, potentially fostering resolutions that might be elusive within the confines of protracted courtroom battles. This expedited resolution could not only benefit the litigants involved but also contribute to the broader efficiency and efficacy of the legal system. However, the application of rule 41A in defamation cases raises intriguing questions about its effectiveness in balancing the scales between freedom of expression and the protection of reputation. In considering the potential merits of making rule 41A mandatory in defamation cases, a key consideration is the prospect of expeditious and cost-effective resolution.

Keywords: constitution of South Africa, defamation, litigation, mandatory, mediation

Procedia PDF Downloads 16
761 Application of Simulated Annealing to Threshold Optimization in Distributed OS-CFAR System

Authors: L. Abdou, O. Taibaoui, A. Moumen, A. Talib Ahmed

Abstract:

This paper proposes an application of the simulated annealing to optimize the detection threshold in an ordered statistics constant false alarm rate (OS-CFAR) system. Using conventional optimization methods, such as the conjugate gradient, can lead to a local optimum and lose the global optimum. Also for a system with a number of sensors that is greater than or equal to three, it is difficult or impossible to find this optimum; Hence, the need to use other methods, such as meta-heuristics. From a variety of meta-heuristic techniques, we can find the simulated annealing (SA) method, inspired from a process used in metallurgy. This technique is based on the selection of an initial solution and the generation of a near solution randomly, in order to improve the criterion to optimize. In this work, two parameters will be subject to such optimisation and which are the statistical order (k) and the scaling factor (T). Two fusion rules; “AND” and “OR” were considered in the case where the signals are independent from sensor to sensor. The results showed that the application of the proposed method to the problem of optimisation in a distributed system is efficiency to resolve such problems. The advantage of this method is that it allows to browse the entire solutions space and to avoid theoretically the stagnation of the optimization process in an area of local minimum.

Keywords: distributed system, OS-CFAR system, independent sensors, simulating annealing

Procedia PDF Downloads 496
760 Characterising Stable Model by Extended Labelled Dependency Graph

Authors: Asraful Islam

Abstract:

Extended dependency graph (EDG) is a state-of-the-art isomorphic graph to represent normal logic programs (NLPs) that can characterize the consistency of NLPs by graph analysis. To construct the vertices and arcs of an EDG, additional renaming atoms and rules besides those the given program provides are used, resulting in higher space complexity compared to the corresponding traditional dependency graph (TDG). In this article, we propose an extended labeled dependency graph (ELDG) to represent an NLP that shares an equal number of nodes and arcs with TDG and prove that it is isomorphic to the domain program. The number of nodes and arcs used in the underlying dependency graphs are formulated to compare the space complexity. Results show that ELDG uses less memory to store nodes, arcs, and cycles compared to EDG. To exhibit the desirability of ELDG, firstly, the stable models of the kernel form of NLP are characterized by the admissible coloring of ELDG; secondly, a relation of the stable models of a kernel program with the handles of the minimal, odd cycles appearing in the corresponding ELDG has been established; thirdly, to our best knowledge, for the first time an inverse transformation from a dependency graph to the representing NLP w.r.t. ELDG has been defined that enables transferring analytical results from the graph to the program straightforwardly.

Keywords: normal logic program, isomorphism of graph, extended labelled dependency graph, inverse graph transforma-tion, graph colouring

Procedia PDF Downloads 210
759 Economics and Management Information Systems: Institute of Management and Technology Enugu a Case Study

Authors: Cletus Agbowo

Abstract:

Standard principles, rules, regulations, norms and guides are necessities in practice especially in the Economics and management information system Institute of management of and technology (IMT) Enugu a case sturdy as presented by the presenter. Without mincing words, the fundamental bottle neck of management is economics, how to select to engage merger productivity resources to achieve uncountable objectives without tears. Management information system inevitably become bound up in organizational politics because the influence access to a key resource – namely information. Economics and management information can effect who does what to whom, when, where and how in an organization. In great institutions like the Institute of Management and Technology (IMT) Enugu a case study many new information systems require changes in personnel, individual routines that can be painful for those involved and require retraining and additional effort may or may not be compensated. In a nut shell, because management information system potentially change an organization’s structure, culture, business processes, and strategy, there is often considerable resistance to them when they are introduced. The case study have many schools, departments, divisions and units which needs research on economics and management information systems. A system can be defined as a set of interrelated components and / or elements, which reacts with input to produce output. A department in an organization is a system. The researcher is faced to itemize the practical challenges encountered and solution adopted by the Institute Management and Enugu state government.

Keywords: economics, information, management, productivity, regulations

Procedia PDF Downloads 380
758 Corporate Governance and Business Ethical Values in Organisation: A Study of Unilag Holdings

Authors: Ogunmayi Bamidele, Aribisala Oluwadamilare Olufolarin

Abstract:

The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things.

Keywords: business ethical values, corporate governance, organization, business ethics

Procedia PDF Downloads 15