Search results for: human factor in security
14259 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce
Authors: Neelima Rashmi Lakra
Abstract:
India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.Keywords: public sectors, social justice, social security schemes, trade union movement
Procedia PDF Downloads 45014258 Validation of the Career Motivation Scale among Chinese University and Vocational College Teachers
Authors: Wei Zhang, Lifen Zhao
Abstract:
The present study aims to translate and validate the Career Motivation Scale among Chinese university and vocational college teachers. Exploratory factor analysis supported a three-factor structure that was consistent with the original structure of career motivation: career insight, career identity, and career resilience. Confirmatory factor analysis showed that a second-order three-factor model with correlated measurement errors best fit the data. Configural, metric, and scalar invariance models were tested, demonstrating that the Chinese version of the Career Motivation Scale did not differ across groups of school type, educational level, and working years in current institutions. The concurrent validity of the Chinese Career Motivation Scale was confirmed by its significant correlations with work engagement, career adaptability, career satisfaction, job crafting, and intention to quit. The results of the study indicated that the Chinese Career Motivation Scale was a valid and reliable measure of career motivation among university and vocational college teachers in China.Keywords: career motivation scale, Chinese University, vocational college teachers, measurement invariance, validation
Procedia PDF Downloads 13214257 Tracy: A Java Library to Render a 3D Graphical Human Model
Authors: Sina Saadati, Mohammadreza Razzazi
Abstract:
Since Java is an object-oriented language, It can be used to solve a wide range of problems. One of the considerable usages of this language can be found in Agent-based modeling and simulation. Despite the significant power of Java, There is not an easy method to render a 3-dimensional human model. In this article, we are about to develop a library which helps modelers present a 3D human model and control it with Java. The library runs two server programs. The first one is a web page server that can connect to any browser and present an HTML code. The second server connects to the browser and controls the movement of the model. So, the modeler will be able to develop a simulation and display a good-looking human model without any knowledge of any graphical tools.Keywords: agent-based modeling and simulation, human model, graphics, Java, distributed systems
Procedia PDF Downloads 11114256 The Effect of Human Capital and Oil Revenue on Income Distribution in Real Sample
Authors: Marjan Majdi, MohammadAli Moradi, Elham Samarikhalaj
Abstract:
Income distribution is one of the most topics in macro economic theories. There are many categories in economy such as income distribution that have the most influenced by economic policies. Human capital has an impact on economic growth and it has significant effect on income distributions. The results of this study confirm that the effects of oil revenue and human capital on income distribution are negative and significant but the value of the estimated coefficient is too small in a real sample in period time (1969-2006).Keywords: gini coefficient, human capital, income distribution, oil revenue
Procedia PDF Downloads 63614255 Personalized Tissues and Organs Replacement – a Peek into the Future
Authors: Asaf Toker
Abstract:
Matricelf developed a technology that enables the production of autologous engineered tissue composed of matrix and cells derived from patients Omentum biopsy. The platform showed remarkable pre-clinical results for several medical conditions. The company recently licensed the technology that enabled scientist at Tel Aviv university that 3D printed a human heart from human cells and matrix for the first time in human history. The company plans to conduct its first human clinical trial for Acute Spinal Cord Injury (SCI) early in 2023.Keywords: tissue engineering, regenerative medicine, spinal Cord Injury, autologous implants, iPSC
Procedia PDF Downloads 12614254 Intrinsic Motivational Factor of Students in Learning Mathematics and Science Based on Electroencephalogram Signals
Authors: Norzaliza Md. Nor, Sh-Hussain Salleh, Mahyar Hamedi, Hadrina Hussain, Wahab Abdul Rahman
Abstract:
Motivational factor is mainly the students’ desire to involve in learning process. However, it also depends on the goal towards their involvement or non-involvement in academic activity. Even though, the students’ motivation might be in the same level, but the basis of their motivation may differ. In this study, it focuses on the intrinsic motivational factor which student enjoy learning or feeling of accomplishment the activity or study for its own sake. The intrinsic motivational factor of students in learning mathematics and science has found as difficult to be achieved because it depends on students’ interest. In the Program for International Student Assessment (PISA) for mathematics and science, Malaysia is ranked as third lowest. The main problem in Malaysian educational system, students tend to have extrinsic motivation which they have to score in exam in order to achieve a good result and enrolled as university students. The use of electroencephalogram (EEG) signals has found to be scarce especially to identify the students’ intrinsic motivational factor in learning science and mathematics. In this research study, we are identifying the correlation between precursor emotion and its dynamic emotion to verify the intrinsic motivational factor of students in learning mathematics and science. The 2-D Affective Space Model (ASM) was used in this research in order to identify the relationship of precursor emotion and its dynamic emotion based on the four basic emotions, happy, calm, fear and sad. These four basic emotions are required to be used as reference stimuli. Then, in order to capture the brain waves, EEG device was used, while Mel Frequency Cepstral Coefficient (MFCC) was adopted to be used for extracting the features before it will be feed to Multilayer Perceptron (MLP) to classify the valence and arousal axes for the ASM. The results show that the precursor emotion had an influence the dynamic emotions and it identifies that most students have no interest in mathematics and science according to the negative emotion (sad and fear) appear in the EEG signals. We hope that these results can help us further relate the behavior and intrinsic motivational factor of students towards learning of mathematics and science.Keywords: EEG, MLP, MFCC, intrinsic motivational factor
Procedia PDF Downloads 36614253 Understanding Human Trafficking in Benin City: Implications for Social Work Intervention
Authors: Tracy B. E. Omorogiuwa
Abstract:
Human trafficking also known as modern-day slavery can be seen as an effort by some privileged and criminally minded persons to take advantage of vulnerable individuals for their economic gains. Some factors; poverty, unemployment, poor educational opportunities, ignorance and traditional attitudes are attributed as causes and psychological, sexual, moral and health problems as impacts of human trafficking. This study examines the phenomenon of human trafficking in Benin City, one of the cities in Nigeria, situated as a source of trafficked persons for exploitation in Europe and African countries. Even though the Nigerian government and Non-governmental organizations have made considerable efforts in the past to reduce the incidence of human trafficking, the result has been an adjustment in the personality of the trafficked persons rather than professional measures to combat the issue. Hence, the study adopts the focused group discussions as a method for data collection; to sort the opinions of community members towards the understanding of the phenomenon. In addition, this paper provides social work implications to address the issue of human trafficking in the Benin City, Nigeria.Keywords: human trafficking, trafficking in persons, modern-day slavery, social work implication
Procedia PDF Downloads 18414252 Human Capital Divergence and Team Performance: A Study of Major League Baseball Teams
Authors: Yu-Chen Wei
Abstract:
The relationship between organizational human capital and organizational effectiveness have been a common topic of interest to organization researchers. Much of this research has concluded that higher human capital can predict greater organizational outcomes. Whereas human capital research has traditionally focused on organizations, the current study turns to the team level human capital. In addition, there are no known empirical studies assessing the effect of human capital divergence on team performance. Team human capital refers to the sum of knowledge, ability, and experience embedded in team members. Team human capital divergence is defined as the variation of human capital within a team. This study is among the first to assess the role of human capital divergence as a moderator of the effect of team human capital on team performance. From the traditional perspective, team human capital represents the collective ability to solve problems and reducing operational risk of all team members. Hence, the higher team human capital, the higher the team performance. This study further employs social learning theory to explain the relationship between team human capital and team performance. According to this theory, the individuals will look for progress by way of learning from teammates in their teams. They expect to have upper human capital, in turn, to achieve high productivity, obtain great rewards and career success eventually. Therefore, the individual can have more chances to improve his or her capability by learning from peers of the team if the team members have higher average human capital. As a consequence, all team members can develop a quick and effective learning path in their work environment, and in turn enhance their knowledge, skill, and experience, leads to higher team performance. This is the first argument of this study. Furthermore, the current study argues that human capital divergence is negative to a team development. For the individuals with lower human capital in the team, they always feel the pressure from their outstanding colleagues. Under the pressure, they cannot give full play to their own jobs and lose more and more confidence. For the smart guys in the team, they are reluctant to be colleagues with the teammates who are not as intelligent as them. Besides, they may have lower motivation to move forward because they are prominent enough compared with their teammates. Therefore, human capital divergence will moderate the relationship between team human capital and team performance. These two arguments were tested in 510 team-seasons drawn from major league baseball (1998–2014). Results demonstrate that there is a positive relationship between team human capital and team performance which is consistent with previous research. In addition, the variation of human capital within a team weakens the above relationships. That is to say, an individual working with teammates who are comparable to them can produce better performance than working with people who are either too smart or too stupid to them.Keywords: human capital divergence, team human capital, team performance, team level research
Procedia PDF Downloads 24014251 Nuclear Safety and Security in France in the 1970s: A Turning Point for the Media
Authors: Jandot Aurélia
Abstract:
In France, in the main media, the concern about nuclear safety and security has not really appeared before the beginning of the 1970s. The gradual changes in its perception are studied here through the arguments given in the main French news magazines, linked with several parameters. As this represents a considerable amount of copies and thus of information, are selected here the main articles as well as the main “mental images” aiming to persuade the readers and which have led the public awareness to evolve. Indeed, in the 1970s, in France, these evolutions were not made in one day. Indeed, over the period, many articles were still in favor of nuclear power plants and promoted the technological advances that were made in this field. They had to be taken into account. But, gradually, grew up arguments and mental images discrediting the perception of nuclear technology. Among these were the environmental impacts of this industry, as the question of pollution progressively appeared. So, between 1970 and 1979, the language has changed, as the perceptible objectives of the communication, allowing to discern the deepest intentions of the editorial staffs of the French news magazines. This is all these changes that are emphasized here, over a period when the safety and security concern linked to the nuclear technology, to there a field for specialists, has become progressively a social issue seemingly open to all.Keywords: environmental impacts, media discourse, nuclear security, public awareness
Procedia PDF Downloads 28314250 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 18414249 Engineering the Human Mind: Social Engineering Attack Using Kali Linux
Authors: Joy Winston James, Abdul Kadher Jilani
Abstract:
This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.Keywords: pen testing, hacking, Kali Linux, social engineering
Procedia PDF Downloads 9814248 Location Tracking of Human Using Mobile Robot and Wireless Sensor Networks
Authors: Muazzam A. Khan
Abstract:
In order to avoid dangerous environmental disasters, robots are being recognized as good entrants to step in as human rescuers. Robots has been gaining interest of many researchers in rescue matters especially which are furnished with advanced sensors. In distributed wireless robot system main objective for a rescue system is to track the location of the object continuously. This paper provides a novel idea to track and locate human in disaster area using stereo vision system and ZigBee technology. This system recursively predict and updates 3D coordinates in a robot coordinate camera system of a human which makes the system cost effective. This system is comprised of ZigBee network which has many advantages such as low power consumption, self-healing low data rates and low cost.Keywords: stereo vision, segmentation, classification, human tracking, ZigBee module
Procedia PDF Downloads 49314247 A Comparative Analysis of Safety Orientation and Safety Performance in Organizations: A Project Management Perspective
Authors: Dina Alfreahat, Zoltan Sebestyen
Abstract:
Safety is considered as one of the project’s success factors. Poor safety management may result in accidents that impact human, economic, and legal issues. Therefore, it is necessary to consider safety and health as a project success factor along with other project success factors, such as time, cost, and quality. Organizations have a knowledge deficit of the implementation of long-term safety practices, and due to cost control, safety problems tend to receive the least priority. They usually assume that safety management involves expenditures unrelated to production goals, thereby considering it unnecessary for profitability and competitiveness. The purpose of this study is to introduce, analysis and identify the correlation between the orientation of the public safety procedures of an organization and the public safety standards applied in the project. Therefore, the authors develop the process and collect the possible mathematical-statistical tools supporting the previously mentioned goal. The result shows that the adoption of management to safety is a major factor in implementing the safety standard in the project and thereby improving safety performance. It may take time and effort to adopt the mindset of safety orientation service development, but at the same time, the higher organizational investment in safety and health programs will contribute to the loyalty of staff to safety compliance.Keywords: project management perspective, safety orientation, safety performance, safety standards
Procedia PDF Downloads 17914246 The Context of Human Rights in a Poverty-Stricken Africa: A Reflection
Authors: Ugwu Chukwuka E.
Abstract:
The African context of human right instruments as recognized today can be traced to Africa’s relationship with the Western World. A significant preponderance of these instruments are found in both colonial and post colonial statutes as the colonial laws, the post colonial legal documents as constitutions or Africa’s adherence to relevant international instruments on human rights as the Universal Declaration of Human Rights (1948) and the African Charter on Human and Peoples’ Rights (1981). In spite of all these human rights instruments inherent in the African continent, it is contended in this paper that, these Western-oriented notion of human rights, emphasizes rights that hardly meets the current needs of contemporary African citizens. Adopting a historical research methodology, this study interrogates the dynamics of the African poverty context in relation to the implementation of human rights instruments in the continent. In this vein, using human rights and poverty scenarios from one Anglophone (Uganda) and one Francophone (Senegal) countries in Africa, the study hypothesized that, majority of Africans are not in a historical condition for the realization of these rights. The raison d’etre for this claim emerges from the fact that, the present generations of African hoi polloi are inundated with extensive powerlessness, ignorance, diseases, hunger and overall poverty that emasculates their interest in these rights instruments. In contrast, the few Africans who have access to the enjoyment of these rights in the continent hardly needs these instruments, as their power and resources base secures them that. The paper concludes that the stress of African states and stakeholders on African affairs should concentrated significantly, on the alleviation of the present historical poverty squalor of Africans, which when attended to, enhances the realization of human right situations in the continent.Keywords: Africa, human rights, poverty, western world
Procedia PDF Downloads 43914245 A Study on the Influence of Pin-Hole Position Error of Carrier on Mesh Load and Planet Load Sharing of Planetary Gear
Authors: Kyung Min Kang, Peng Mou, Dong Xiang, Gang Shen
Abstract:
For planetary gear system, Planet pin-hole position accuracy is one of most influential factor to efficiency and reliability of planetary gear system. This study considers planet pin-hole position error as a main input error for model and build multi body dynamic simulation model of planetary gear including planet pin-hole position error using MSC. ADAMS. From this model, the mesh load results between meshing gears in each pin-hole position error cases are obtained and based on these results, planet load sharing factor which reflect equilibrium state of mesh load sharing between whole meshing gear pair is calculated. Analysis result indicates that the pin-hole position error of tangential direction cause profound influence to mesh load and load sharing factor between meshing gear pair.Keywords: planetary gear, load sharing factor, multibody dynamics, pin-hole position error
Procedia PDF Downloads 57914244 “Japan’s New Security Outlook: Implications for the US-Japan Alliance”
Authors: Agustin Maciel-Padilla
Abstract:
This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years.Keywords: us-japan alliance, japan security, great power competition, interoperability
Procedia PDF Downloads 6514243 Assessing the Factors Mediating the Attitude-Behaviour Gap in Sustainable Fashion Consumerism
Abstract:
With the rise of fast-fashion, over consumerism and overproduction, the fashion industry is believed to be one of the most polluting industry. It is a matter of importance today to further understand the factors involved in green consumerism to enhance sustainable fashion. One of the critical issues in also evaluating green consumerism, particularly in fashion, is the attitude-behaviour gap. Indeed, many consumers report a positive attitude towards sustainable fashion consumerism, but this attitude is not always actioned into behaviour. This study aims to further investigate the attitude-behaviour gap in sustainable fashion consumerism. S triangulation of qualitative and quantitative methods was used. Focus groups were used to gain opinions and understanding of the barriers to sustainable fashion consumption. A quantitative online questionnaire was then used to quantify the barriers identified in Study 1 and measure their influence on the attitude-behaviour gap. The results suggest that knowledge about sustainable fashion is the key factor in the attitude-behaviour gap in sustainable fashion consumerism. Accessibility was also identified as a factor, but this relationship is more complex. It is suggested that knowledge is the main factor in the attitude-behaviour gap and that once knowledge is controlled for, accessibility will become a main factor. The present study is the first one to identify the factors involved in sustainable fashion consumerism.Keywords: fashion, consumer behaviour, sustainable consumerism, attitude-behavioural gap
Procedia PDF Downloads 19114242 Averting Food Crisis in Nigeria and Beyond, Activities of the National Food Security Programme
Authors: Musa M. Umar, S. G. Ado
Abstract:
The paper examines the activities of the National Programme for food security (NPFS) for averting food insecurity in Nigeria and beyond. The components of the NPFS include site development, outreach, community development and management support. On each site, core activities comprise crop productivity, production diversification and agro-processing. The outreach activities consist of inputs and commodity marketing, rural finance, strengthening research-extension-farmers-inputs linkages, health and nutrition and expansion of site activities. The community development activities include small-scale rural infrastructure, micro-earth dams and community forestry. The overall benefits include food security, improved productivity, marketing and processing, enhanced land and water use, increased animal production and fish catches, improved nutrition, reduction in post-harvest losses and value addition, improved rural infrastructure and diversification of production leading to improved livelihood. The NPFS would poster sustained development of small-holder agricultural and income generation.Keywords: food-security, community development, post-harvest, production
Procedia PDF Downloads 35814241 A Resource Based View: Perspective on Acquired Human Resource towards Competitive Advantage
Authors: Monia Hassan Abdulrahman
Abstract:
Resource-based view is built on many theories in addition to diverse perspectives, we extend this view placing emphasis on human resources addressing the tools required to sustain competitive advantage. Highlighting on several theories and judgments, assumptions were established to clearly reach if resource possession alone suffices for the sustainability of competitive advantage, or necessary accommodation are required for better performance. New practices were indicated in terms of resources used in firms, these practices were implemented on the human resources in particular, and results were developed in compliance to the mentioned assumptions. Such results drew attention to the significance of practices that provide enhancement of human resources that have a core responsibility of maintaining resource-based view for an organization to lead the way to gaining competitive advantage.Keywords: competitive advantage, resource based value, human resources, strategic management
Procedia PDF Downloads 39114240 Determinants and Repercussions of International Migration in and Through Libya: Afield Study
Authors: Ihab S. Jweida
Abstract:
Libya is witnessing major shifts in international migration flows resulting frompolitical, economic, social, security and environmental reasons as a result of what it iswitnessing from the elements of a fragile state due to government division, politicalconflicts, security chaos and the spread of terrorist organizations, since the popularuprising in February 2011, which threatens economic, social and security stability andthen The political stability of the Mediterranean basin countries. Therefore, this studycame as a scientific research aimed at analyzing the role of political economy inexplaining international migration with application to the case of Libya during theperiod from 2011-2021. To achieve this objective, the researcher relied on the descriptive approach basedon qualitative and quantitative analysis to analyze studies, reports, and internationalmigration policies in Libya, and conducted an exploratory study based on a personalinterview questionnaire for (670) migrants present in the distribution areas in Libyaand (65) Libyan migrants,Keywords: international, migration, Libya, case
Procedia PDF Downloads 6214239 Security of Database Using Chaotic Systems
Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem
Abstract:
Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST
Procedia PDF Downloads 26514238 FE Analysis of the Notch Effect on the Behavior of Repaired Crack with Bonded Composite Patch in Aircraft Structures
Authors: Faycal Benyahia, Abdelmohsen Albedah, Bel Abbes Bachir Bouiadjra
Abstract:
In this paper, the finite element analysis is applied to study the performance of the bonded composite reinforcement or repair for reducing stress concentration at a semi-circular lateral notch and repairing cracks emanating from this kind of notch. The effects of the adhesive properties on the variation of the stress intensity factor at the crack tip were highlighted. The obtained results show that the stress concentration factor at the notch tip is reduced about 30% and the maximal reduction of the stress intensity factor is about 80%. The adhesive properties must be optimized in order to increase the performance of the patch repair or reinforcement.Keywords: bonded repair, notch, crack, adhesive, composite
Procedia PDF Downloads 39014237 Street Begging: A Loss of Human Resource in Nigeria
Authors: Sulaiman Kassim Ibrahim
Abstract:
Human Resource is one of the most important elements in any country. They are very important in actualizing the potential of every sector in the country, i.e Agric, Education, Finance, Judiciary and all formal and informal sectors. The purpose of this study is to investigate the loss of human resource in Nigeria through street begging. The study used intensive literature review. Finding from the review indicate that a significant number of human resource are into street begging in the country undeveloped and untapped. The paper recommend that policy should be initiated to discourage street begging, develop this resource through education and empowerment, stop rural-urban migration by providing infrastructure in the rural areas and abolish informal (Almajiri or beggars school) and transform it into formal school.Keywords: human resource, street begging, Nigeria, Almajiri
Procedia PDF Downloads 25514236 Numerical Approach for Solving the Hyper Singular Integral Equation in the Analysis of a Central Symmetrical Crack within an Infinite Strip
Authors: Ikram Slamani, Hicheme Ferdjani
Abstract:
This study focuses on analyzing a Griffith crack situated at the center of an infinite strip. The problem is reformulated as a hyper-singular integral equation and solved numerically using second-order Chebyshev polynomials. The primary objective is to calculate the stress intensity factor in mode 1, denoted as K1. The obtained results reveal the influence of the strip width and crack length on the stress intensity factor, assuming stress-free edges. Additionally, a comparison is made with relevant literature to validate the findings.Keywords: center crack, Chebyshev polynomial, hyper singular integral equation, Griffith, infinite strip, stress intensity factor
Procedia PDF Downloads 14414235 Humans, Social Robots, and Mutual Love: An Application of Aristotle’s Nicomachean Ethics
Authors: Ruby Jean Hornsby
Abstract:
In our rapidly advancing techno-moral world, human-robot relationships are increasingly becoming a part of intimate human life. Indeed, social robots - that is, autonomous or semi-autonomous embodied artificial agents that generally possess human or animal-like qualities (such as responding to environmental stimuli, communicating, learning, performing human tasks, and making autonomous decisions) - have been designed to function as human friends. In light of such advances, immediate philosophical scrutiny is imperative in order to examine the extent to which human-robot interactions constitute genuine friendship and therefore contribute towards the good human life. Aristotle's conception of friendship is philosophically illuminating and sufficiently broad in scope to guide such analysis. On his account, it is necessary (though not sufficient) that for a friendship to exist between two agents - A and B - both agents must have a mutual love for one another. Aristotle claims that A loves B if: Condition 1: A desires those apparent good (qua pleasant, useful, or virtuous) properties attributable to B, and Condition 2: A has goodwill (wishes what is best) for B. This paper argues that human-robot interaction can (and does) successfully meet both conditions; as such, it demonstrates that robots and humans can reciprocally love one another. It will argue for this position by first justifying the claim that a human can desire apparent good features attributable to a robot (i.e., by taking them to be pleasant and/or useful) and outlining how it is that a human can wish a robot well in light of that robot's (quasi-) interests. Next, the paper will argue that a robot can (quasi-)desire certain properties that are attributable to a human before elucidating how it is possible for a robot to act in the interests of a human. Accordingly, this paper will conclude that it is already the case that humans can formulate relationships with robots that involve reciprocated love. This is significant because it suggests that social robots are candidates for human friendship and can therefore contribute toward flourishing human futures.Keywords: ancient philosophy, friendship, inter-disciplinary applied ethics, love, social robotics
Procedia PDF Downloads 10114234 Identification of Genes Regulating Differentiation and Stemness of Human Mesenchymal Stem Cells for Gene Therapy in Regenerative Medicine
Authors: Tong Ming Liu
Abstract:
Human mesenchymal stem cells (MSCs) represent the most used stem cells for clinical application, which have been used in over 1000 clinical trials to treat over 30 diseases due to multilineage differentiation potential, secretome and immunosuppression. Gene therapies of MSCs hold great promise in the treatment of many diseases due to enhanced MSC-based clinical outcomes. To identify genes for gene therapy of MSCs, by comparing gene expression profile before and after MSC differentiation following by functional screening, we have identified ZNF145 that regulated MSC differentiation. Forced expression of ZNF145 resulted in enhanced in vitro chondrogenesis of MSCs as an upstream factor of SOX9 and improved osteochondral repair upon implant into osteochondral defects in rodents. By comparing gene expression profile during differentiation of iPSCs toward MSCs, we also identified gene HOX regulating MSC stemness, which was much downregulated in late-passaged MSCs. Knockdown of this gene greatly compromised MSC stemness including abolished proliferation, decreased CFU-F, promoted senescence and reduced expression of cell surface antigens linked to the MSC phenotype. In addition, multi-linage differentiation was also greatly impaired. Notably, HOX overexpression resulted in improved multi-lineage differentiation. In the mechanism, HOX expression significantly deceased in late passage of MSCs compared with early passage of MSCs, correlating with MSC important genes. ChIP-seq data shown that HOX binds to genes related to MSC self-renewal and differentiation. Most importantly, most HOX binding sites are lost in late passage of MSCs. HOX exerts its effects by directing binding Twist1, one important gene of MSCs. The identification of the genes regulating MSC differentiation and stemness will provide and promising strategies for gene therapy of MSCs in regenerative medicine.Keywords: mesenchymal stem cell, novel transcription factor, stemness, gene therapy, cartilage repair, signaling pathway
Procedia PDF Downloads 5714233 A Study on the Role of Human Rights in the Aid Allocations of China and the United States
Authors: Shazmeen Maroof
Abstract:
The study is motivated by a desire to investigate whether there is substance to claims that, relative to traditional donors, China disregards human rights considerations when allocating overseas aid. While the stated policy of the U.S. is that consideration of potential aid recipients’ respect for human rights is mandatory, some quantitative studies have cast doubt on whether this is reflected in actual allocations. There is a lack of academic literature that formally assesses the extent to which the two countries' aid allocations differ; which is essential to test whether the criticisms of China's aid policy in comparison to that of the U.S. are justified. Using data on two standard human rights measures, 'Political Terror Scale' and 'Civil Liberties', the study analyse the two donors’ aid allocations among 125 countries over the period 2000 to 2014. The bivariate analysis demonstrated that a significant share of China’s aid flow to countries with poor human rights record. At the same time, the U.S. seems little different in providing aid to these countries. The empirical results obtained from the Fractional Logit model also provided some support to the general pessimism regarding China’s provision of aid to countries with poor human rights record, yet challenge the optimists expecting better targeted aid from the U.S. These findings are consistent with the split between humanitarian and non-humanitarian aid and in the sample of countries whose human rights record is below some threshold level.Keywords: China's aid policy, foreign aid allocation, human rights, United States Foreign Assistance Act
Procedia PDF Downloads 10914232 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 29414231 Simplified Linearized Layering Method for Stress Intensity Factor Determination
Authors: Jeries J. Abou-Hanna, Bradley Storm
Abstract:
This paper looks to reduce the complexity of determining stress intensity factors while maintaining high levels of accuracy by the use of a linearized layering approach. Many techniques for stress intensity factor determination exist, but they can be limited by conservative results, requiring too many user parameters, or by being too computationally intensive. Multiple notch geometries with various crack lengths were investigated in this study to better understand the effectiveness of the proposed method. By linearizing the average stresses in radial layers around the crack tip, stress intensity factors were found to have error ranging from -10.03% to 8.94% when compared to analytically exact solutions. This approach proved to be a robust and efficient method of accurately determining stress intensity factors.Keywords: fracture mechanics, finite element method, stress intensity factor, stress linearization
Procedia PDF Downloads 14314230 Developing a Model to Objectively Assess the Culture of Individuals and Teams in Order to Effectively and Efficiently Achieve Sustainability in the Manpower
Authors: Ahmed Mohamed Elnady Mohamed Elsafty
Abstract:
This paper explains a developed applied objective model to measure the culture qualitatively and quantitatively, whether in individuals or in teams, in order to be able to use culture correctly or modify it efficiently. This model provides precise measurements and consistent interpretations by being comprehensive, updateable, and protected from being misled by imitations. Methodically, the provided model divides the culture into seven dimensions (total 43 cultural factors): First dimension is outcome-orientation which consists of five factors and should be highest in leaders. Second dimension is details-orientation which consists of eight factors and should be in highest intelligence members. Third dimension is team-orientation which consists of five factors and should be highest in instructors or coaches. Fourth dimension is change-orientation which consists of five factors and should be highest in soldiers. Fifth dimension is people-orientation which consists of eight factors and should be highest in media members. Sixth dimension is masculinity which consists of seven factors and should be highest in hard workers. Last dimension is stability which consists of seven factors and should be highest in soft workers. In this paper, the details of all cultural factors are explained. Practically, information collection about each cultural factor in the targeted person or team is essential in order to calculate the degrees of all cultural factors using the suggested equation of multiplying 'the score of factor presence' by 'the score of factor strength'. In this paper, the details of how to build each score are explained. Based on the highest degrees - to identify which cultural dimension is the prominent - choosing the tested individual or team in the supposedly right position at the right time will provide a chance to use minimal efforts to make everyone aligned to the organization’s objectives. In other words, making everyone self-motivated by setting him/her at the right source of motivation is the most effective and efficient method to achieve high levels of competency, commitment, and sustainability. Modifying a team culture can be achieved by excluding or including new members with relatively high or low degrees in specific cultural factors. For conclusion, culture is considered as the software of the human beings and it is one of the major compression factors on the managerial discretion. It represents the behaviors, attitudes, and motivations of the human resources which are vital to enhance quality and safety, expanding the market share, and defending against attacks from external environments. Thus, it is tremendously essential and useful to use such a comprehensive model to measure, use, and modify culture.Keywords: culture dimensions, culture factors, culture measurement, cultural analysis, cultural modification, self-motivation, alignment to objectives, competency, sustainability
Procedia PDF Downloads 164