Search results for: performance vs. security
14397 Effect of Innovation and Its Determinants on the Performance of Small and Medium-Sized Enterprises
Authors: Rihab Hentati, Younes Boujelbene
Abstract:
Nowadays we realize more and more than the value of a company is not only a function of its means of production but depends essentially on the managerial aptitude and orientation to implement the material and human means for generating profitability. Indeed, a productive R&D activity, a good strategy, and innovation are originally supplementary benefits that increase the value of the business. Is this ‘value-added’ closely linked to innovation? The purpose of our research is to Meta-analyze the results of 56 empirical studies in order to explain the overall effect of innovation on performance of small and medium-sized enterprises. In order to justify the differences in the results, we look for the moderating factors that may affect the innovation-performance relationship. We find a positive and significant relationship between innovation and performance in small and medium-sized enterprises. The results also note a positive relationship between entrepreneurial orientation, research and development (R&D), and performance in SMEs. In addition, innovation has a strong impact on performance measured both with accounting and market index. The originality of the article is based on a rigorous synthesis, based on several statistical tools, of an important subject of research in finance.Keywords: innovation, performance, entrepreneurial orientation, meta-analysis, moderator variables
Procedia PDF Downloads 28714396 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law
Procedia PDF Downloads 12814395 Agriculture, Food Security and Poverty Reduction in Nigeria: Cointegration and Granger Causality Approach
Authors: Ogunwole Cecilia Oluwakemi, Timothy Ayomitunde Aderemi
Abstract:
Provision of sufficient food and elimination of abject poverty have usually been the conventional benefits of agriculture in any society. Meanwhile, despite the fact that Nigeria is an agrarian society, food insecurity and poverty have become the issues of concern among both scholars and policymakers in the recent times. Against this backdrop, this study examined the nexus among agriculture, food security, and poverty reduction in Nigeria from 1990 to 2019 within the framework of the Cointegration and Granger Causality approach. Data was collected from the Central Bank of Nigeria Statistical Bulletin and the World Development Indicators, respectively. The following are the major results that emanated from the study. A long run equilibrium relationship exists among agricultural value added, food production index, and GDP per capita in Nigeria. Similarly, there is a unidirectional causality which flows from food production index to poverty reduction in Nigeria. In the same vein, one way causality flows from poverty reduction to agricultural value added in Nigeria. Consequently, this study makes the following recommendation for the policymakers in Nigeria, and other African countries by extension, that agricultural value added and food production are the important variables that cannot be undermined when poverty reduction occupies the central focus of the policymakers. Therefore, any time these policymakers want to reduce poverty, policies that drive agricultural value added and food production should be embarked upon. Therefore, this study will contribute to the literature by establishing the type of linkage that exists between agriculture, food security, and poverty reduction in Nigeria.Keywords: agriculture, value added, food production, GDP per capita, Nigeria
Procedia PDF Downloads 19914394 Biometric Recognition Techniques: A Survey
Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz
Abstract:
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric
Procedia PDF Downloads 75614393 The Food Security and Nutritional Diversity Impacts of Coupling Rural Infrastructure and Value Chain Development: Evidence from a Generalized Propensity Score Analysis
Authors: Latif Apaassongo Ibrahim, Owusu-Addo Ebenezer, Isaac Bonuedo
Abstract:
Structural barriers - including inadequate infrastructure, poor market linkages, and limited access to financial and extension services - have been the major constraints to improved welfare in the semi-arid regions of Ghana; food insecurity and malnutrition are persistent. The effects of infrastructural improvements as countermeasures are often misdirected by confounding effects of other economic, social, and environmental variables. This study applies Directed Acyclic Graphs (DAGs) to map the causal pathways between infrastructure development and household welfare, identifying key mediators and confounders for one such initiative in Ghana. Then, using Generalized Propensity Score (GPS) and Doubly Robust Estimation (IPWRA), this study evaluates the differential roles of government-supported infrastructure improvements in access and intensity of commercial relative to public infrastructure, on household food security and women’s nutritional diversity given three major value-chain improvements. The main findings suggest that these infrastructure improvements positively impact food security and nutrition, with women’s empowerment and nutritional education acting as key mediators. Market access emerged as a stronger causal mechanism relative to productivity gains in linking infrastructure to improved welfare. Membership in Farmer-Based Organizations (FBOs) and participation in agribusiness linkages further amplified these impacts. However, the effects of infrastructure improvements were less clear when combined with the adoption of climate resilience practices, suggesting potential trade-offs.Keywords: food security, nutrition, infrastructure, market access, women's empowerment, farmer-based organizations, climate resilience, Ghana
Procedia PDF Downloads 1614392 The Effect of Environmental CSR on Corporate Social Performance: The Mediating Role of Green Innovation and Corporate Image
Authors: Edward Fosu
Abstract:
Green innovation has emerged as a significant environmental concern across the world. Green innovation refers to the utilization of technological developments that facilitate energy savings and waste material recycling. The stakeholder theory and resourced-based theory were used to examine how stakeholders' expectations affect corporate green innovation activities and how corporate innovation initiatives affect the corporate image and social performance. This study used structural equation modelling (SEM) and hierarchical regression to test the effects of environmental corporate social responsibility on social performance through mediators: green innovation and corporate image. A quantitative design was employed using data from Chinese companies in Ghana for this study. The study assessed. The results revealed that environmental practices promote corporate social performance (β = 0.070, t = 1.974, p = 0.049), positively affect green product innovation (β = 0.251, t = 7.478, p < 0.001), and has direct effect on green process innovation (β = 0.174, t = 6.192, p < 0.001). Green product innovation and green process innovation significantly promote corporate image respectively (β = 0.089, t = 2.581, p = 0.010), (β = 0.089, t = 2.367, p = 0.018). Corporate image has significant direct effects on corporate social performance (β = 0.146, t = 4.256, p < 0.001). Corporate environmental practices have an impact on the development of green products and processes which promote companies’ social performance. Additionally, evidence supports that corporate image influences companies’ social performance.Keywords: environmental CSR, corporate image, green innovation, coprorate social performance
Procedia PDF Downloads 12714391 On the Use of Analytical Performance Models to Design a High-Performance Active Queue Management Scheme
Authors: Shahram Jamali, Samira Hamed
Abstract:
One of the open issues in Random Early Detection (RED) algorithm is how to set its parameters to reach high performance for the dynamic conditions of the network. Although original RED uses fixed values for its parameters, this paper follows a model-based approach to upgrade performance of the RED algorithm. It models the routers queue behavior by using the Markov model and uses this model to predict future conditions of the queue. This prediction helps the proposed algorithm to make some tunings over RED's parameters and provide efficiency and better performance. Widespread packet level simulations confirm that the proposed algorithm, called Markov-RED, outperforms RED and FARED in terms of queue stability, bottleneck utilization and dropped packets count.Keywords: active queue management, RED, Markov model, random early detection algorithm
Procedia PDF Downloads 54114390 Organizational Climate of Silence and Job Performance: Examining the Mediatory and Moderating Role of Work Engagement and Supervisor Support among Frontline Nurses
Authors: Sabina Ampon-Wireko
Abstract:
Purpose: The study explores the influence of the organizational climate of silence on job performance through the mediating effects of work engagement (WE). Further, the degree to which supervisor support (SS) and work engagement moderate job performance are examined. Method: Using a questionnaire, the study collected 565 valid responses from frontline nurses in Ghana. The hierarchical regression technique was employed in estimating the relationship between the variables. Findings: The results showed a significant negative influence of top managers' and supervisors' attitudes to silence on both contextual and task performance. Communication opportunities, however, revealed positive and significant effects on contextual and task performance. Work engagement had no role in mediating top managers' and supervisors’ attitudes toward silence, communication opportunities, and task performance. Supervisor support acted as a moderating factor in the relationship between job engagement and task performance. In contrast, despite the direct positive relationship between supervisor support and contextual performance, it failed to moderate the relationship between work engagement and contextual performance. Practical implications: The study's findings demonstrate the need for health managers and supervisors to become more conscious of silence. The findings offer diverse recommendations for encouraging the sharing of relevant ideas, facts, and opinions within the health sector.Keywords: organizational climate of silence, job performance, work engagement, supervisor support, frontline nurses
Procedia PDF Downloads 7614389 Fracking the UK's Shale Gas Regulatory Regime
Authors: Yanal Abul Failat
Abstract:
The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.Keywords: shale gas, UK, legal, oil and gas, energy
Procedia PDF Downloads 71114388 Evaluation of Sustainable Blue Economy Development Performance: Method and Case
Authors: Mingbao Chen
Abstract:
After Rio+20, the blue economy rises all over the world, and it has become the focus field of national development. At present, the blue economy has become a new growth point in the field of global economy and the direction of the development of ‘green’ in the ocean. However, in fact, the key factors affecting the development of the blue economy have not been explored in depth, and the development policies and performance of the blue economy have not been scientifically evaluated. This cannot provide useful guidance for the development of the blue economy. Therefore, it is urgent to establish a quantitative evaluation framework to measure the performance of the blue economic development. Based on the full understanding of the connotation and elements of the blue economy, and studying the literature, this article has built an universality and operability evaluation index system, including ecological environment, social justice, sustainable growth, policy measures, and so on. And this article also established a sound evaluation framework of blue economic development performance. At the same time, this article takes China as a sample to test the framework of the adaptability, and to assess the performance of China's blue economic.Keywords: Blue economy, development performance, evaluation framework, assess method
Procedia PDF Downloads 24914387 Gender Recognition with Deep Belief Networks
Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang
Abstract:
A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs
Procedia PDF Downloads 45514386 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations
Authors: Sadiq Nasir
Abstract:
The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security
Procedia PDF Downloads 8814385 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review
Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani
Abstract:
Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.Keywords: cost, mobility, reliability, speed, security, wired, wireless
Procedia PDF Downloads 47214384 The Effects of Dual-Enrollment Programs on Students’ Post-Secondary Academic Performance
Authors: Cody Kirby, Kaustav Misra, Arundhati Bagchi Misra, Sharon P. Cox
Abstract:
This paper focuses on the relationship that dual-enrollment programs have on academic performance and retention. Both performance and retention are significant issues in higher education. The first, performance, is a goal of higher education, having an impact on students’ lives. The second, retention, is key to the viability of any college or university. This paper uses survey research methodology to examine factors that lead to positive student academic performance, which leads to retention, specifically in dual-enrollment programs. The data show several characteristics that lead to a positive impact on GPA. These include the following; age, Caucasian race, full-time status, students in STEM programs, and finally dual enrollment participation.Keywords: dual enrollment, early college, retention, undergraduate education
Procedia PDF Downloads 15014383 The Impact of Iso 9001 Certification on Brazilian Firms’ Performance: Insights from Multiple Case Studies
Authors: Matheus Borges Carneiro, Fabiane Leticia Lizarelli, José Carlos De Toledo
Abstract:
The evolution of quality management by companies was strongly enabled by, among others, ISO 9001 certification, which is considered a crucial requirement for several customers. Likewise, performance measurement provides useful insights for companies to identify the reflection of their decision-making process on their improvement. One of the most used performance measurement models is the balanced scorecard (BSC), which uses four perspectives to address a firm’s performance: financial, internal process, customer satisfaction, and learning and growth. Studies related to ISO 9001 and business performance have mostly adopted a quantitative approach to identify the standard’s causal effect on a firm’s performance. However, to verify how this influence may occur, an in-depth analysis within a qualitative approach is required. Therefore, this paper aims to verify the impact of ISO 9001:2015 on Brazilian firms’ performance based on the balanced scorecard perspective. Hence, nine certified companies located in the Southeast region of Brazil were studied through a multiple case study approach. Within this study, it was possible to identify the positive impact of ISO 9001 on firms’ overall performance, and four Critical Success Factors (CSFs) were identified as relevant on the linkage among ISO 9001 and firms’ performance: employee involvement, top management, process management, and customer focus. Due to the COVID-19 pandemic, the number of interviews was limited to the quality manager specialist, and the sample was limited since several companies were closed during the period of the study. This study presents an in-depth analysis of how the relationship between ISO 9001 certification and firms’ performance in a developing country is.Keywords: balanced scorecard, Brazilian firms’ performance, critical success factors, ISO 9001 certification, performance measurement
Procedia PDF Downloads 19814382 An Investigation on the Relationship between Taxi Company Safety Climate and Safety Performance of Taxi Drivers in Iloilo City
Authors: Jasper C. Dioco
Abstract:
The study was done to investigate the relationship of taxi company safety climate and drivers’ safety motivation and knowledge on taxi drivers’ safety performance. Data were collected from three Taxi Companies with taxi drivers as participants (N = 84). The Hiligaynon translated version of Transportation Companies’ Climate Scale (TCCS), Safety Motivation and Knowledge Scale, Occupational Safety Motivation Questionnaire and Global Safety Climate Scale were used to study the relationships among four parameters: (a) Taxi company safety climate; (b) Safety motivation; (c) Safety knowledge; and (d) Safety performance. Correlational analyses found that there is no relation between safety climate and safety performance. A Hierarchical regression demonstrated that safety motivation predicts the most variance in safety performance. The results will greatly impact how taxi company can increase safe performance through the confirmation of the proximity of variables to organizational outcome. A strong positive safety climate, in which employees perceive safety to be a priority and that managers are committed to their safety, is likely to increase motivation to be safety. Hence, to improve outcomes, providing knowledge based training and health promotion programs within the organization must be implemented. Policy change might include overtime rules and fatigue driving awareness programs.Keywords: safety climate, safety knowledge, safety motivation, safety performance, taxi drivers
Procedia PDF Downloads 19214381 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 12614380 Knowledge Sharing and Organizational Performance: A System Dynamics Approach
Authors: Shachi Pathak
Abstract:
We are living in knowledge based economy where firms can gain competitive advantage with the help of managing knowledge within the organization. The purpose the study is to develop a conceptual model to explain the relationship between factors affecting knowledge sharing, called as knowledge enablers, in an organization, knowledge sharing activities and organizational performance, using system dynamics approach. This research is important since it will provide better understandings on what are the key knowledge enablers to support knowledge sharing activities, and how knowledge sharing activities will affect the capability of an organization to enhance the performance of the organization.Keywords: knowledge management, knowledge sharing, organizational performance, system dynamics
Procedia PDF Downloads 37614379 Impact of Job Burnout on Job Satisfaction and Job Performance of Front Line Employees in Bank: Moderating Role of Hope and Self-Efficacy
Authors: Huma Khan, Faiza Akhtar
Abstract:
The present study investigates the effects of burnout toward job performance and job satisfaction with the moderating role of hope and self-efficacy. Findings from 310 frontline employees of Pakistani commercial banks (Lahore, Karachi & Islamabad) disclosed burnout has negative significant effects on job performance and job satisfaction. Simple random sampling technique was used to collect data and inferential statistics were applied to analyzed the data. However, results disclosed no moderation effect of hope on burnout, job performance or with job satisfaction. Moreover, Data significantly supported the moderation effect of self-efficacy. Study further shed light on the development of psychological capital. Importance of the implication of the current finding is discussed.Keywords: burnout, hope, job performance, job satisfaction, psychological capital, self-efficacy
Procedia PDF Downloads 14214378 Identification of Effective Factors on Marketing Performance Management in Iran’s Airports and Air Navigation Companies
Authors: Morteza Hamidpour, Kambeez Shahroudi
Abstract:
The aim of this research was to identify the factors affecting the measurement and management of marketing performance in Iran's airports and air navigation companies (Economics in Air and Airport Transport). This study was exploratory and used a qualitative content analysis technique. The study population consisted of university professors in the field of air transportation and senior airport managers, with 15 individuals selected as samples using snowball technique. Based on the results, 15 main indicators were identified for measuring the marketing performance of Iran's airports and air navigation companies. These indicators include airport staff, general and operational expenses, annual passenger reception capacity, number of counter receptions and passenger dispatches, airport runway length, airline companies' loyalty to using airport space and facilities, regional market share of transit and departure flights, claims and net profit (aviation and non-aviation). By keeping the input indicators constant, the output indicators can be improved, enhancing performance efficiency and consequently increasing the economic situation in air transportation.Keywords: air transport economics, marketing performance management, marketing performance input factors, marketing performance intermediary factors, marketing performance output factors, content analysis
Procedia PDF Downloads 6714377 Analysis of the Acoustic Performance of Vertical Internal Seals with Pet Wool as NBR 15.575-4NO Green Towers Building-DF
Authors: Lucas Aerre, Wallesson Faria, Roberto Pimentel, Juliana Santos
Abstract:
An extremely disturbing and irritating element in the lives of people and organizations is the noise, the consequences that can bring us has a lot of connection with human health as well as financial and economic aspects. In order to improve the efficiency of buildings in Brazil in general, a performance standard was created, NBR 15.575 in which all buildings are seen in a more systemic and peculiar way, while following the requirements of the standard. The acoustic performance present in these buildings is one such requirement. Based on this, the present work was elaborated with the objective of evaluating through acoustic measurements the acoustic performance of vertical internal fences that are under the incidence of aerial noise of a building in the city of Brasilia-DF. A short theoretical basis is made and soon after the procedures of measurement are described through the control method established by the standard, and its results are evaluated according to the parameters of the same. The measurement performed between rooms of the same unit, presented a standardized sound pressure level difference (D nT, w) equal to 40 dB, thus being classified within the minimum performance required by the standard in question.Keywords: airborne noise, performance standard, soundproofing, vertical seal
Procedia PDF Downloads 29814376 Privacy for the Internet of Things and its Different Dimensions
Authors: Maryam M Esfahani
Abstract:
The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies
Procedia PDF Downloads 10114375 Performance Analysis of Vapour Compression Refrigeration System with Alternate Refrigerants
Authors: K. Parthiban, P. Pradeep, I. Pon Surya Prakash, S. Vinoth, A. Murugan
Abstract:
The main aim of this project is to analyze the performance of vapor compression refrigeration system with alternate refrigerants. Currently we are using R134a as refrigerant. It is used in both household and industrial appliances as refrigerant. It has an advantage that the ozone depletion potential is zero i.e. R134a does not affects ozone layer. But its Global warming potential is considerably high. Also the compressor failure occurs frequently. Hence this project deals with how the performance of R134a varies with blended refrigerants such as R416a and R407c. This analysis is based on how much the Co-efficient of Performance (COP) varies with different refrigerants.Keywords: compressor, condenser, expansion valve, evaporator
Procedia PDF Downloads 32314374 Application of Fuzzy Analytical Hierarchical Process in Evaluation Supply Chain Performance Measurement
Authors: Riyadh Jamegh, AllaEldin Kassam, Sawsan Sabih
Abstract:
In modern trends of market, organizations face high-pressure environment which is characterized by globalization, high competition, and customer orientation, so it is very crucial to control and know the weak and strong points of the supply chain in order to improve their performance. So the performance measurements presented as an important tool of supply chain management because it's enabled the organizations to control, understand, and improve their efficiency. This paper aims to identify supply chain performance measurement (SCPM) by using Fuzzy Analytical Hierarchical Process (FAHP). In our real application, the performance of organizations estimated based on four parameters these are cost parameter indicator of cost (CPI), inventory turnover parameter indicator of (INPI), raw material parameter (RMPI), and safety stock level parameter indicator (SSPI), these indicators vary in impact on performance depending upon policies and strategies of organization. In this research (FAHP) technique has been used to identify the importance of such parameters, and then first fuzzy inference (FIR1) is applied to identify performance indicator of each factor depending on the importance of the factor and its value. Then, the second fuzzy inference (FIR2) also applied to integrate the effect of these indicators and identify (SCPM) which represent the required output. The developed approach provides an effective tool for evaluation of supply chain performance measurement.Keywords: fuzzy performance measurements, supply chain, fuzzy logic, key performance indicator
Procedia PDF Downloads 14514373 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict
Authors: Christopher Holroyd
Abstract:
With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.Keywords: human trafficking, reconstruction, security, terrorism
Procedia PDF Downloads 13414372 Exploring the Role of IPv6 in Enhancing IoT Communication and Green Network Optimization for Business Sustainability
Authors: Saqib Warsi
Abstract:
The Internet of Things (IoT) has become an essential component of modern communication networks, with IPv6 playing a pivotal role in addressing the challenges posed by the rapidly growing number of connected devices. IPv6 provides an expanded address space, offering a solution to the limitations of IPv4 while enhancing routing efficiency and security. This paper explores the impact of IPv6 in improving IoT communication, focusing on its operational benefits for businesses. Additionally, we examine the integration of green communication principles, which aim to reduce energy consumption and operational costs, thus promoting environmental sustainability and business efficiency. Through qualitative analysis and simulation-based modeling, this paper investigates the benefits of IPv6 in IoT environments and evaluates the role of green communication strategies in optimizing network performance. Traffic measurement tools and network performance simulators were employed to analyze the efficiency, sustainability, and scalability of IPv6 networks. By presenting a comprehensive framework for traffic analysis, modeling, and optimization, this research highlights the potential of combining IPv6 and green communication practices to drive business growth while promoting environmental sustainability. The findings provide valuable insights for businesses adopting more sustainable and efficient communication networks.Keywords: IPv6, Internet of Things (IoT), green communications, traffic measurement and modeling, network virtualization
Procedia PDF Downloads 214371 Comparing Performance of Irrigation System in Nepal by Collective Action and Decision-Making Capacity of the Farmers
Authors: Manita Ale, Ganesh P. Shivakoti, Ram C. Bastakoti
Abstract:
Irrigation system, a system for enhancing agricultural productivity, requires regular maintenance in order to avoid irregular allocation of water. For maintenance of the system in long run, farmers’ participation plays a key role increasing the performance of system. The performance of any irrigation system mainly relies on various factors which affect collective action plus decision making, as well as their shared impacts. The paper consists of system level information that were collected from 12 Irrigation Systems (IS) from three-sampled districts of Nepal and the household information that were collected from 160 irrigation water users. The results reveal that, out of 12 sampled irrigation systems, only 4 systems shows high performance levels. The high performance level of those systems was characterized on the basis of adequate availability of water, good maintenance of system infrastructure, and conformance to existing rules followed. In addition, the paper compares different irrigation systems based on trust, reciprocity, cropping intensity, command area and yield as tools to indicate the importance of collective action in performance of irrigation system.Keywords: collective action, decision-making, farmers’ participation, performance
Procedia PDF Downloads 40514370 Prussian Blue/Chitosan Mixed-Matrix Membranes with Improved Separation Performance of Ethanol/Water Mixtures
Authors: Ting-YuLiu, Yi-Feng Lin
Abstract:
Porous Prussian Blue (PB) nanoparticles were successfully incorporated into chitosan (CS) membranes to form PB/CS mixed-matrix membranes (MMMs) and the as-prepared PB/CS MMMs were used to dehydration of ethanol at 25 oC in the pervaporation process. The effect of PB loading in CS matrix on pervaporation performance was investigated. The FESEM, EDS, FTIR and XRD measurements were also used for the characterization of the PB/CS MMMs. The PB/CS membranes with 30 wt% PB loading show the best performance with the permeate flux of 614 g/m2h and the separation factor of 1472. The pervaporation using the PB/CS membranes exhibits outstanding performance as compared with the previously reported CS based membranes and MMMs. The present work demonstrates good pervaporation performance of the PB/CS MMMs for the separation of 90wt% ethanol aqueous solution, moreover, it has an opportunity for dehydration of bioethanol in this system of pervaporation.Keywords: pervaporation, chitosan, Prussian blue, mixed-matrix membrane
Procedia PDF Downloads 41314369 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 36914368 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation
Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin
Abstract:
The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.Keywords: ISMS success factors, IT project management, IS success, information security
Procedia PDF Downloads 315