Search results for: transformation and security challenges
8653 A Performance Analysis Study for Cloud Based ERP Systems
Authors: Burak Erkayman
Abstract:
The manufacturing and service organizations are in the need of using ERP systems to integrate many functions from purchasing to storage, production planning to calculation of costs. Using ERP systems by the integration in the level of information provides companies remarkable advantages in terms of profitability, productivity and efficiency in processes. Cloud computing is one of the most significant changes in information and communication technology. The developments in Cloud Computing attract business world to take advantage of this field. Cloud Computing means much more storage area, more cost saving and faster data transfer rate. In addition to these, it presents new business models, new field of study and practicable solutions for anyone’s use. These developments make inevitable the implementation of ERP systems to cloud environment. In this study, the performance of ERP systems in cloud environment is analyzed through various performance criteria and a comparison between traditional and cloud-ERP systems is presented. At the end of study the transformation and the future of ERP systems is discussed.Keywords: cloud-ERP, ERP system performance, information system transformation
Procedia PDF Downloads 5298652 A Study on Abnormal Behavior Detection in BYOD Environment
Authors: Dongwan Kang, Joohyung Oh, Chaetae Im
Abstract:
Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies
Procedia PDF Downloads 3248651 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)
Authors: R. Rama Kishore, Sunesh Malik
Abstract:
Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.Keywords: digital watermarking, fractional transform, halftone, visual cryptography
Procedia PDF Downloads 3558650 Detection and Classification of Mammogram Images Using Principle Component Analysis and Lazy Classifiers
Authors: Rajkumar Kolangarakandy
Abstract:
Feature extraction and selection is the primary part of any mammogram classification algorithms. The choice of feature, attribute or measurements have an important influence in any classification system. Discrete Wavelet Transformation (DWT) coefficients are one of the prominent features for representing images in frequency domain. The features obtained after the decomposition of the mammogram images using wavelet transformations have higher dimension. Even though the features are higher in dimension, they were highly correlated and redundant in nature. The dimensionality reduction techniques play an important role in selecting the optimum number of features from the higher dimension data, which are highly correlated. PCA is a mathematical tool that reduces the dimensionality of the data while retaining most of the variation in the dataset. In this paper, a multilevel classification of mammogram images using reduced discrete wavelet transformation coefficients and lazy classifiers is proposed. The classification is accomplished in two different levels. In the first level, mammogram ROIs extracted from the dataset is classified as normal and abnormal types. In the second level, all the abnormal mammogram ROIs is classified into benign and malignant too. A further classification is also accomplished based on the variation in structure and intensity distribution of the images in the dataset. The Lazy classifiers called Kstar, IBL and LWL are used for classification. The classification results obtained with the reduced feature set is highly promising and the result is also compared with the performance obtained without dimension reduction.Keywords: PCA, wavelet transformation, lazy classifiers, Kstar, IBL, LWL
Procedia PDF Downloads 3358649 Transformation of the Postindustrial City - The Conversion of a Smelter in Restaurant with a Panoramic Views
Authors: Martina Perinkova, Lenka Kolarcikova, Marketa Twrda
Abstract:
In Ostrava there are a lot of former post-industrial areas and areas that have gradually through conversions and their subsequent reuse. One of the largest is the national cultural monument Lower Vítkovice area where there is a large complex transformation of the former iron production. Industrial heritage today visited by tourists for entertainment, culture, history, sports and other activities. This is a unique example of reuse of technical monuments and introduction of new life into the historic area. The main task of not only find the right function and use, in terms of re integration into city life and finding a balance between history and current lifestyle, looking at the history of the area and its technical condition before reconstruction. It is not only very expensive but also time consuming. Transformations industrial monument is the result of a dialogue architect, the idea of the investor and expert opinion heritage institute.Keywords: post-industrial area, cultural monument, conversions
Procedia PDF Downloads 3418648 Supply Chain Management in the Oil Industry: Challenges and Opportunities
Authors: Mehmood Faisal
Abstract:
In this globalization era, the supply chain management has acquired strategic importance in diverse business environments. In the current highly competitive business environment, the success of any business considerably depends on the efficiency of the supply chain. The importance of petroleum industry cannot be avoided in the global market; however, supply chain management in the petroleum industry is facing various challenges, particularly in the logistics area. These logistical challenges have a main influence on the cost of crude oil; therefore, the opportunities to save cost in logistics still do exist. The large oil producing companies are undertaking future contracts through 'swaps or options' practice that saves their millions of dollars. The objective of this paper is to throw light on the supply chain challenges and opportunities in the oil industry and on swap practices which are widely employed by large oil producing companies around the world, such as Chevron Corporation, Saudi Arabian Oil Company, BP and Exxon Mobil.Keywords: logistics, oil industry, swap practice, supply chain management
Procedia PDF Downloads 1568647 Coping Life with Female Autistic and Cerebral Palsy Teenagers: Stress Developed by Parental Care in Ghana
Authors: Edwina Owusu Panin, Derrick Antwi
Abstract:
Autism and cerebral palsy are fraternal twins in the world of communication and social interaction challenges. Caring for autistic and cerebral palsied female teenagers in Ghana can be difficult and stressful for parents. We highlight the findings of dealing with stress, where female teenagers are more daunting than male teenagers, related to the demand for a lot of attention linked to the puberty transition. This brief examines the challenges that parents face in caring for teenagers with autism and cerebral palsy in Ghana and the stress that can develop from parental care. The article also highlights the importance of identifying and addressing mental health and self-care issues in parents of disabled female teenagers, as these issues can significantly affect the well-being of both parents and their children. Parents of teenagers with disabilities often face a variety of challenges, including managing their children's care and medical needs, navigating the educational system, and addressing social and emotional needs. These challenges can be even more disheartening in Ghana, where resources and support for families of children with disabilities are limited. In a nutshell, the challenges of caring for female teenagers with autism and cerebral palsy can be significant in Ghana. The article outlines methods that parents in Ghana can take to manage their stress and provide a brighter future for their female teenagers. Parents are better able to cope with the challenges of parenting and provide the best care possible for their female teenagers with disabilities.Keywords: autism, cerebral palsy, female teenagers, parental care
Procedia PDF Downloads 888646 Terrorism: A Threat in Constant Evolution Still Misunderstood
Authors: M. J. Gazapo Lapayese
Abstract:
It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.Keywords: responses, resilience, security, terrorism
Procedia PDF Downloads 4538645 Artificial Intelligence Ethics: What Business Leaders Need to Consider for the Future
Authors: Kylie Leonard
Abstract:
Investment in artificial intelligence (AI) can be an attractive opportunity for business leaders as there are many easy-to-see benefits. These benefits include task completion rates, overall cost, and better forecasting. Business leaders are often unaware of the challenges that can accompany AI, such as data center costs, access to data, employee acceptance, and privacy concerns. In addition to the benefits and challenges of AI, it is important to practice AI ethics to ensure the safe creation of AI. AI ethics include aspects of algorithm bias, limits in transparency, and surveillance. To be a good business leader, it is critical to address all the considerations involving the challenges of AI and AI ethics.Keywords: artificial intelligence, artificial intelligence ethics, business leaders, business concerns
Procedia PDF Downloads 1478644 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security
Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika
Abstract:
Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.Keywords: food security, institutional strengthening, model implementation, women farmer group
Procedia PDF Downloads 1818643 A Short Survey of Integrating Urban Agriculture and Environmental Planning
Authors: Rayeheh Khatami, Toktam Hanaei, Mohammad Reza Mansouri Daneshvar
Abstract:
The growth of the agricultural sector is known as an essential way to achieve development goals in developing countries. Urban agriculture is a way to reduce the vulnerability of urban populations of the world toward global environmental change. It is a sustainable and efficient system to respond to the environmental, social and economic needs of the city, which leads to urban sustainability. Today, many local and national governments are developing urban agriculture as an effective tool in responding to challenges such as poverty, food security, and environmental problems. In this study, we follow a perspective based on urban agriculture literature in order to indicate the urban agriculture’s benefits in environmental planning strategies in non-western countries like Iran. The methodological approach adopted is based on qualitative approach and documentary studies. A total of 35 articles (mixed quantitative and qualitative methods studies) were studied in final analysis, which are published in relevant journals that focus on this subject. Studies show the wide range of positive benefits of urban agriculture on food security, nutrition outcomes, health outcomes, environmental outcomes, and social capital. However, there was no definitive conclusion about the negative effects of urban agriculture. This paper provides a conceptual and theoretical basis to know about urban agriculture and its roles in environmental planning, and also conclude the benefits of urban agriculture for researchers, practitioners, and policymakers who seek to create spaces in cities for implementation urban agriculture in future.Keywords: urban agriculture, environmental planning, urban planning, literature
Procedia PDF Downloads 1448642 Investigating the Challenges and Opportunities for M-Government Implementation in Saudi Arabia
Authors: Anan Alssbaiheen, Steve Love
Abstract:
Given the lack of research into potential opportunities and challenges which are likely to be associated with the implementation of mobile services in developing countries including Saudi Arabia, the research reported here investigated the challenges and opportunities which are associated with the implementation of mobile government services in Saudi Arabia. By collecting data through surveys from 103 Saudi citizens and 46 employees working at the Ministry of Communication and Information Technology Saudi Arabia, this study indicates that the high level of mobile penetration in the country offers an opportunity for Saudi Arabian government to offer mobile government services in the country. The results also suggest that though a large percentage of populations do not have access to mobile technologies, there is still a strong desire among users for the provision of mobile government services. Moreover, the results suggest that effective implementation of mobile government services would help to increase the technological development of Saudi Arabia. However, there are certain challenges which may prevent the effective implementation of such services. First, there does not appear to be a sufficient level of understanding among the Saudi Arabian population about the benefits which are associated with mobile government services. Secondly, the results suggest that the implementation of the services needs to be closely tailored and personalised to the individual needs of target users. Finally, the lack of access to mobile technologies would be a challenge to the successful introduction of these services.Keywords: challenges, e-government, mobile government, opportunities
Procedia PDF Downloads 4158641 The Challenges of Business Incubations: A Case of Malaysian Incubators
Authors: Logaiswari Indiran, Zainab Khalifah, Kamariah Ismail
Abstract:
Business incubators have now been recognized as effective tools in providing business assistance to start-up firms. In both developed and developing countries, the number of incubators is growing tremendously. As the birth rate of incubators increases, so do its challenges. Malaysia, as one of the developing countries in the Asian continent, has also established a number of business incubators to breed and foster the growth and survival of start-up firms. Thus, this study discusses the incubation model applied in Malaysia and the challenges faced by these incubators using secondary data including policies, previous literature, and reports related to Malaysian incubators. The findings of this study call the government to rethink the key role of incubator managers and staffs, internal structure of the incubator concept and process, intellectual properties management, strategic alliances with universities-industries and funding supports in enhancing the support provided by the business incubators in Malaysia. The key challenges highlighted in this study signal important policy lessons for other developing countries that aim to create and map an effective business incubator ecosystem.Keywords: business incubators, incubation challenges, funding support, incubator managers, internal structure, start-up firms
Procedia PDF Downloads 2758640 Embracing Inclusive Education: The Issues, Challenges, Dilemmas and Future Plans for Inclusive Secondary Schools in Jakarta, Indonesia
Authors: Rinda Kurnia
Abstract:
Despite the differences and additional needs in the learning process, every individual has the right to receive educational services in order to enhance her/his abilities and potentials. This notion underlies the principle of inclusive education system, something many countries in the world are striving for since the UNESCO Salamanca Statement in 1994. This paper will consider different views that many theorists have published of the term inclusive, the issues, challenges, and dilemmas encountered during the practice, as well as some possible ways forward. It is being described, criticized and analyzed using the standpoint of a shadow teacher in an inclusive secondary school in Jakarta, Indonesia.Keywords: inclusive education, inclusive education challenges, inclusive education dilemmas, inclusive education future plans, inclusive education issues
Procedia PDF Downloads 2998639 Possibilities, Challenges and the State of the Art of Automatic Speech Recognition in Air Traffic Control
Authors: Van Nhan Nguyen, Harald Holone
Abstract:
Over the past few years, a lot of research has been conducted to bring Automatic Speech Recognition (ASR) into various areas of Air Traffic Control (ATC), such as air traffic control simulation and training, monitoring live operators for with the aim of safety improvements, air traffic controller workload measurement and conducting analysis on large quantities controller-pilot speech. Due to the high accuracy requirements of the ATC context and its unique challenges, automatic speech recognition has not been widely adopted in this field. With the aim of providing a good starting point for researchers who are interested bringing automatic speech recognition into ATC, this paper gives an overview of possibilities and challenges of applying automatic speech recognition in air traffic control. To provide this overview, we present an updated literature review of speech recognition technologies in general, as well as specific approaches relevant to the ATC context. Based on this literature review, criteria for selecting speech recognition approaches for the ATC domain are presented, and remaining challenges and possible solutions are discussed.Keywords: automatic speech recognition, asr, air traffic control, atc
Procedia PDF Downloads 3998638 The Analysis of the Challenge China’s Energy Transition Faces and Proposed Solutions
Authors: Yuhang Wang
Abstract:
As energy is vital to industrial productivity and human existence, ensuring energy security becomes a critical government responsibility. The Chinese government has implemented the energy transition to safeguard China’s energy security. Throughout this progression, the Chinese government has faced numerous obstacles. This article seeks to describe the causes of China’s energy transition barriers and the steps taken by the Chinese government to overcome them.Keywords: energy transition, energy market, fragmentation, path dependency
Procedia PDF Downloads 1028637 A Deep Learning Approach to Online Social Network Account Compromisation
Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang
Abstract:
The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.Keywords: computer security, network security, online social network, account compromisation
Procedia PDF Downloads 1198636 The Efficiency Analysis in the Health Sector: Marmara Region
Authors: Hale Kirer Silva Lecuna, Beyza Aydin
Abstract:
Health is one of the main components of human capital and sustainable development, and it is very important for economic growth. Health economics, which is an indisputable part of the science of economics, has five stages in general. These are health and development, financing of health services, economic regulation in the health, allocation of resources and efficiency of health services. A well-developed and efficient health sector plays a major role by increasing the level of development of countries. The most crucial pillars of the health sector are the hospitals that are divided into public and private. The main purpose of the hospitals is to provide more efficient services. Therefore the aim is to meet patients’ satisfaction by increasing the service quality. Health-related studies in Turkey date back to the Ottoman and Seljuk Empires. In the near past, Turkey applied 'Health Sector Transformation Programs' under different titles between 2003 and 2010. Our aim in this paper is to measure how effective these transformation programs are for the health sector, to see how much they can increase the efficiency of hospitals over the years, to see the return of investments, to make comments and suggestions on the results, and to provide a new reference for the literature. Within this framework, the public and private hospitals in Balıkesir, Bilecik, Bursa, Çanakkale, Edirne, Istanbul, Kirklareli, Kocaeli, Sakarya, Tekirdağ, Yalova will be examined by using Data Envelopment Analysis (DEA) for the years between 2000 and 2019. DEA is a linear programming-based technique, which gives relatively good results in multivariate studies. DEA basically estimates an efficiency frontier and make a comparison. Constant returns to scale and variable returns to scale are two most commonly used DEA methods. Both models are divided into two as input and output-oriented. To analyze the data, the number of personnel, number of specialist physicians, number of practitioners, number of beds, number of examinations will be used as input variables; and the number of surgeries, in-patient ratio, and crude mortality rate as output variables. 11 hospitals belonging to the Marmara region were included in the study. It is seen that these hospitals worked effectively only in 7 provinces (Balıkesir, Bilecik, Bursa, Edirne, İstanbul, Kırklareli, Yalova) for the year 2001 when no transformation program was implemented. After the transformation program was implemented, for example, in 2014 and 2016, 10 hospitals (Balıkesir, Bilecik, Bursa, Çanakkale, Edirne, İstanbul, Kocaeli, Kırklareli, Tekirdağ, Yalova) were found to be effective. In 2015, ineffective results were observed for Sakarya, Tekirdağ and Yalova. However, since these values are closer to 1 after the transformation program, we can say that the transformation program has positive effects. For Sakarya alone, no effective results have been achieved in any year. When we look at the results in general, it shows that the transformation program has a positive effect on the effectiveness of hospitals.Keywords: data envelopment analysis, efficiency, health sector, Marmara region
Procedia PDF Downloads 1308635 Organizational Challenges Facing a Small Recruitment Agency: Case Study of a Firm Based in South India
Authors: Anirban Sengupta
Abstract:
The recruitment industry plays a critical role in connecting employers with talent. While there are many big recruitment firms and big organizations can also afford to have their own recruitment teams, small recruitment agencies form an essential part of the ecosystem serving a vast majority of small and medium sized clients. These clients utilize the services of the recruitment agencies to be able to scale their operations. However, there are significant organizational challenges that a small recruitment agency faces to build a sustainable and growing business. This case study explores the organizational challenges faced by a small recruitment agency in South India in an increasingly competitive landscape. Through this paper, the authors hope to understand, analyze and share the challenges faced by this firm and suggest a systematic approach to address the challenges. The study uses both qualitative and quantitative data collected from the agency’s management and employees based on the year 2024. The findings reveal that the agency struggles with limited resources, unpredictable clients, and a lack of scalable processes and systems, which impacts not only the business outcomes but also key areas like employee performance management, compensation and benefits, and employee well-being. Based on these insights, the study proposes several strategies for overcoming these challenges, such as implementing scalable systems and processes. This research contributes to the understanding of the specific obstacles faced by small recruitment agencies in regional contexts and offers actionable recommendations for improving their organizational health, which may, in turn, positively impact their competitiveness.Keywords: recruitment, organizational challenges, performance management, recruitment technology
Procedia PDF Downloads 98634 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks
Authors: Jameelah O. Yaqub
Abstract:
The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.Keywords: banks, e-products, innovation, Nigeria
Procedia PDF Downloads 3378633 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies
Authors: Kristina Thorell
Abstract:
Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices
Procedia PDF Downloads 3178632 Adsorption and Transformation of Lead in Coimbatore Urban Soils
Authors: K. Sivasubramanin, S. Mahimairaja, S. Pavithrapriya
Abstract:
Heavy metal pollution originating from industrial wastes is becoming a serious problem in many urban environments. These heavy metals, if not properly managed, could enter into the food chain and cause a serious health hazards in animals and humans. Industrial wastes, sewage sludge, and automobile emissions also contribute to heavy metal like Pb pollution in the urban environment. However, information is scarce on the heavy metal pollution in Coimbatore urban environment. Therefore, the current study was carried out to examine the extent of lead pollution in Coimbatore urban environment the maximum Pb concentration in Coimbatore urban environment was found in ukkadam, whose concentration in soils 352 mg kg-1. In many places, the Pb concentration was found exceeded the permissible limit of 100 mg kg-1. In laboratory, closed incubation experiment showed that the concentration of different species of Pb viz., water soluble Pb(H2O-Pb), exchangeable Pb(KNO3-Pb), organic-Pb(NaOH-Pb), and organic plus metal (Fe & Al) oxides bound-Pb(Na2 EDTA-Pb) was found significantly increased during the 15 days incubation, mainly due to biotransformation processes. Both the moisture content of soil and ambient temperature exerted a profound influence on the transformation of Pb. The results of a batch experiment has shown that the sorption data was adequately described by the Freundlich equation as indicated by the high correlation coefficients (R2= 0.64) than the Langmuir equation (R2 = 0.33). A maximum of 86 mg of Pb was found adsorbed per kilogram of soil. Consistently, a soil column experiment result had shown that only a small amount of Pb( < 1.0 µg g-1 soil) alone was found leached from the soil. This might be due to greater potential of the soil towards Pb adsorption.Keywords: lead pollution, adsorption, transformation, heavy metal pollution
Procedia PDF Downloads 3238631 Adopting English as a Language of Instruction of STEM in Tunisian Higher Education Institutions: Promises and Challenges
Authors: Mimoun Melliti
Abstract:
This research paper investigates the promises, challenges, and perspectives associated with teaching STEM subjects in English within Tunisian higher education institutions. The study explores the potential benefits of English-medium instruction in Science, Technology, Engineering, and Mathematics (henceforth STEM) education, with a special focus on enhanced global competitiveness, improved English language proficiency, and increased access to international resources and collaborations. Additionally, it examines the various challenges faced by educators and students, such as language shift/barriers, curriculum adaptation, faculty training, and student support. Through a comprehensive analysis of promises and challenges, this paper aims to provide insights and recommendations for effectively implementing English medium instruction (henceforth EMI) of STEM in Tunisian higher education institutions. The paper concludes with a recommended action plan for the proper introduction of EMI of STEM in Tunisia.Keywords: EMI;, STEM education, EFL, language reforms
Procedia PDF Downloads 768630 An Inductive Study of Pop Culture Versus Visual Art: Redefined from the Lens of Censorship in Bangladesh
Authors: Ahmed Tahsin Shams
Abstract:
The right to dissent through any form of art has been facing challenges through various strict legal measures, particularly since 2018 when the Government of Bangladesh passed the Digital Security Act 2018 (DSA). Therefore, the references to ‘popular’ culture mostly include mainstream religious and national festivals and exclude critical intellectual representation of specific political allusions in any form of storytelling: whether wall art or fiction writing, since the post-DSA period in Bangladesh. Through inductive quantitative and qualitative methodological approaches, this paper aims to study the pattern of censorship, detention or custodial tortures against artists and the banning approach by the Bangladeshi government in the last five years, specifically against static visual arts, i.e., cartoon and wall art. The pattern drawn from these data attempts to redefine the popular notion of ‘pop culture’ as an unorganized folk or mass culture. The results also hypothesize how the post-DSA period forcefully constructs ‘pop culture’ as a very organized repetitive deception of enlightenment or entertainment. Thus the argument theorizes that this censoring trend is a fascist approach making the artists subaltern. So, in this socio-political context, these two similar and overlapping elements: culture and art, are vastly separated in two streams: the former being appreciated by the power, and the latter is a fearful concern for the power. Therefore, the purpose of art also shifts from entertainment to an act of rebellion, adding more layers to the new postmodern definition of ‘pop culture.’Keywords: popular culture, visual arts, censoring trend, fascist approach, subaltern, digital security act
Procedia PDF Downloads 778629 Countering Terrorism through Social Media: Case Study in Indonesia
Authors: Mauly Budiyanti, Aisyah M. Anggiana
Abstract:
Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.Keywords: Indonesia, national security, social media, terrorism.
Procedia PDF Downloads 2218628 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?
Authors: Abdoulahad Allamine
Abstract:
The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data
Procedia PDF Downloads 3898627 Industry 4.0 Platforms as 'Cluster' ecosystems for small and medium enterprises (SMEs)
Authors: Vivek Anand, Rainer Naegele
Abstract:
Industry 4.0 is a global mega-trend revolutionizing the world of advanced manufacturing, but also bringing up challenges for SMEs. In response, many regional, as well as digital Industry 4.0 Platforms, have been set up to boost the competencies of established enterprises as well as SMEs. The concept of 'Clusters' is a policy tool that aims to be a starting point to establish sustainable and self-supporting structures in industries of a region by identifying competencies and supporting cluster actors with services that match their growth needs. This paper is motivated by the idea that Clusters have the potential to enable firms, particularly SMEs, to accelerate the innovation process and transition to digital technologies. In this research, the efficacy of Industry 4.0 platforms as Cluster ecosystems is evaluated, especially for SMEs. Focusing on the Baden Wurttemberg region in Germany, an action research method is employed to study how SMEs leverage other actors on Industry 4.0 Platforms to further their Industry 4.0 journeys. The aim is to evaluate how such Industry 4.0 platforms stimulate innovation, cooperation and competitiveness. Additionally, the barriers to these platforms fulfilling their promise to serve as capacity building cluster ecosystems for SMEs in a region will also be identified. The findings will be helpful for academicians and policymakers alike, who can leverage a ‘cluster policy’ to enable Industry 4.0 ecosystems in their regions. Furthermore, relevant management and policy implications stem from the analysis. This will also be of interest to the various players in a cluster ecosystem - like SMEs and service providers - who benefit from the cooperation and competition. The paper will improve the understanding of how a dialogue orientation, a bottom-up approach and active integration of all involved cluster actors enhance the potential of Industry 4.0 Platforms. A strong collaborative culture is a key driver of digital transformation and technology adoption across sectors, value chains and supply chains; and will position Industry 4.0 Platforms at the forefront of the industrial renaissance. Motivated by this argument and based on the results of the qualitative research, a roadmap will be proposed to position Industry 4.0 Platforms as effective clusters ecosystems to support Industry 4.0 adoption in a region.Keywords: cluster policy, digital transformation, industry 4.0, innovation clusters, innovation policy, SMEs and startups
Procedia PDF Downloads 2228626 Safety of Mesenchymal Stem Cells Therapy: Potential Risk of Spontaneous Transformations
Authors: Katarzyna Drela, Miroslaw Wielgos, Mikolaj Wrobel, Barbara Lukomska
Abstract:
Mesenchymal stem cells (MSCs) have a great potential in regenerative medicine. Since the initial number of isolated MSCs is limited, in vitro propagation is often required to reach sufficient numbers of cells for therapeutic applications. During long-term culture MSCs may undergo genetic or epigenetic alterations that subsequently increase the probability of spontaneous malignant transformation. Thus, factors that influence genomic stability of MSCs following long-term expansions need to be clarified before cultured MSCs are employed for clinical application. The aim of our study was to investigate the potential for spontaneous transformation of human neonatal cord blood (HUCB-MSCs) and adult bone marrow (BM-MSCs) derived MSCs. Materials and Methods: HUCB-MSCs and BM-MSCs were isolated by standard Ficoll gradient centrifugations method. Isolated cells were initially plated in high density 106 cells per cm2. After 48 h medium were changed and non-adherent cells were removed. The malignant transformation of MSCs in vitro was evaluated by morphological changes, proliferation rate, ability to enter cell senescence, the telomerase expression and chromosomal abnormality. Proliferation of MSCs was analyzed with WST-1 reduction method and population doubling time (PDT) was calculated at different culture stages. Then the expression pattern of genes characteristic for mesenchymal or epithelial cells, as well as transcriptions factors were examined by RT-PCR. Concomitantly, immunocytochemical analysis of gene-related proteins was employed. Results: Our studies showed that MSCs from all bone marrow isolations ultimately entered senescence and did not undergo spontaneous malignant transformation. However, HUCB-MSCs from one of the 15 donors displayed an increased proliferation rate, failed to enter senescence, and exhibited an altered cell morphology. In this sample we observed two different cell phenotypes: one mesenchymal-like exhibited spindle shaped morphology and express specific mesenchymal surface markers (CD73, CD90, CD105, CD166) with low proliferation rate, and the second one with round, densely package epithelial-like cells with significantly increased proliferation rate. The PDT of epithelial-like populations was around 1day and 100% of cells were positive for proliferation marker Ki-67. Moreover, HUCB-MSCs showed a positive expression of human telomerase reverse transcriptase (hTERT), cMYC and exhibit increased number of CFU during the long-term culture in vitro. Furthermore, karyotype analysis revealed chromosomal abnormalities including duplications. Conclusions: Our studies demonstrate that HUCB-MSCs are susceptible to spontaneous malignant transformation during long-term culture. Spontaneous malignant transformation process following in vitro culture has enormous effect on the biosafety issues of future cell-based therapies and regenerative medicine regimens.Keywords: mesenchymal stem cells, spontaneous, transformation, long-term culture
Procedia PDF Downloads 2678625 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet
Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima
Abstract:
Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.Keywords: IP address, digital forensics, big data, data analytics, information and communication technology
Procedia PDF Downloads 1248624 Cloud-Based Mobile-to-Mobile Computation Offloading
Authors: Ebrahim Alrashed, Yousef Rafique
Abstract:
Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.Keywords: computational offloading, power conservation, cloud, sandboxing
Procedia PDF Downloads 388