Search results for: performance vs. security
14367 Effect of Training and Development on Employee Performance in the Banking Industry: A Case Study of Some Selected Banks within Bauchi Metropolis
Authors: Sagir Abubakar
Abstract:
Organization must move along with the employees, because organization should adapt itself to the changing environment. The paper examines the effect of training and development on employee performance. Training and development has an important role in improve the performance, skills and attitude of employee in an organization. Training and development will also help an employee to do his present job or to prepare him for a higher position with increased responsibilities. The paper analyses the employee performance towards training and development conducted in some selected banks within Bauchi metropolis. Review of related literature was done on, training, training objectives, methods and development and its method. A census survey was carried out using staff of GTB and Skye Banks Bauchi branch where a total of 40 questionnaires were administered personally by the researcher and there were 100% responses. Correlation analysis was adopted for the analysis of data collected. The study concludes that 95% of respondents agreed that training and development are vital for both employee and organizations performance. They also suggest that training and development should be made compulsory for all categories of employee in an organization. Training and Development programmes are necessary in any organization for improving the quality of work of the employee.Keywords: training, development, employee, performance, banks
Procedia PDF Downloads 47514366 Evaluating the Effectiveness of Critical Thinking Skills on Job Performance among Neonatal Nurses: A Cross-Sectional Study
Authors: Mehrdad Akbarzadeh, Afsaneh Abrisham
Abstract:
Introduction: Critical thinking skills are crucial for nurses, particularly those working in neonatal care, where quick and informed decision-making is essential. This study aims to evaluate the effectiveness of critical thinking skills on job performance among neonatal nurses. Methods: A cross-sectional study was conducted with 450 neonatal nurses from a hospital in Mashhad. Participants were assessed using the Critical Thinking Questionnaire (CThQ) to measure their critical thinking abilities across various subscales, including Analyzing, Evaluating, Creating, Remembering, Understanding, and Applying. Additionally, a custom Job Performance Checklist completed by supervising nurses, was used to evaluate job performance across several dimensions. Data were collected and analyzed using SPSS V.23. Correlation analysis was conducted to determine the relationship between critical thinking skills and job performance. Results: The mean age of the nurses was 33.46 ± 14.2 years, with 79.15% being female. The nurses demonstrated high proficiency in critical thinking, with notable scores in the Creating (23.98 ± 4.8), Applying (17.35 ± 3.2), and Evaluating (16.67 ± 3.4) subscales. The results indicate a significant positive correlation between several critical thinking subscales and job performance. The Creating subscale exhibited the strongest correlation (R = 0.79, p < 0.001), followed by Overall CThQ (R = 0.68, p = 0.039) and Evaluating (R = 0.67, p = 0.041). Analyzing (R = 0.45, p = 0.013) and Understanding (R = 0.41, p = 0.015) also showed significant correlations with job performance. Remembering (R = 0.29, p = 0.061) and Applying (R = 0.43, p = 0.057) were not significantly correlated with job performance. Conclusion: The findings indicate that critical thinking skills, especially in creating and evaluating, are strongly associated with job performance in neonatal nurses. Enhancing these skills through targeted training programs could improve job performance, particularly in decision-making and time management. This study underscores the importance of critical thinking in neonatal care and its impact on nursing efficacy and patient outcomes.Keywords: critical thinking, job performance, neonatal nurses, healthcare quality
Procedia PDF Downloads 2514365 Access Control System for Big Data Application
Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud
Abstract:
Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.Keywords: access control, security, Big Data, domain
Procedia PDF Downloads 13414364 Impact of Financial Technology Growth on Bank Performance in Gulf Cooperation Council Region
Authors: Ahmed BenSaïda
Abstract:
This paper investigates the association between financial technology (FinTech) growth and bank performance in the Gulf Cooperation Council (GCC) region. Application is conducted on a panel dataset containing the annual observations of banks covering the period from 2012 to 2021. FinTech growth is set as an explanatory variable on three proxies of bank performance. These proxies are the return on assets (ROA), return on equity (ROE), and net interest margin (NIM). Moreover, several control variables are added to the model, including bank-specific and macroeconomic variables. The results are significant as all the proxies of the bank performance are negatively affected by the growth of FinTech startups. Consequently, banks are urged to proactively invest in FinTech startups and engage in partnerships to avoid the risk of disruption.Keywords: financial technology, bank performance, GCC countries, panel regression
Procedia PDF Downloads 8114363 A Study on the Improvement of the Bond Performance of Polypropylene Macro Fiber according to Longitudinal Shape Change
Authors: Sung-yong Choi, Woo-tai Jung, Young-hwan Park
Abstract:
This study intends to improve the bond performance of the polypropylene fiber used as reinforcing fiber for concrete by changing its shape into double crimped type through the enhancement its fabrication process. The bond performance of such double crimped fiber is evaluated by applying the JCI SF-8 (dog-bone shape) testing method. The test results reveal that the double crimped fiber develops bond performance improved by more than 19% compared to the conventional crimped type fiber.Keywords: Bond, Polypropylene, fiber reinforcement, macro fiber, shape change
Procedia PDF Downloads 46214362 Improving Performance and Progression of Novice Programmers: Factors Considerations
Authors: Hala Shaari, Nuredin Ahmed
Abstract:
Teaching computer programming is recognized to be difficult and a real challenge. The biggest problem faced by novice programmers is their lack of understanding of basic programming concepts. A visualized learning tool was developed and used by volunteered first-year students for two semesters. The purposes of this paper are firstly, to emphasize factors which directly affect the performance of our students negatively. Secondly, to examine whether the proposed tool would improve their performance and learning progression. The results of adopting this tool were conducted using a pre-survey and post-survey questionnaire. As a result, students who used the learning tool showed better performance in their programming subject.Keywords: factors, novice, programming, visualization
Procedia PDF Downloads 36414361 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India
Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer
Abstract:
The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.Keywords: East Himalaya, local community, wild edible plants, nutrition, food security
Procedia PDF Downloads 26414360 Development of an Information System Based on the Establishment and Evaluation of Performance Rating by Application Part/Type of Remodeling Element Technologies
Authors: Sungwon Jung
Abstract:
The percentage of 20 years or older apartment houses in South Korea is approximately 20% (1.55 million houses), and the explosive increase of aged houses is expected around the first planned new towns. Accordingly, we should prepare for social issues such as difficulty of housing lease and degradation of housing performance. The improvement of performance of aged houses is essential for achieving the national energy and carbon reduction goals, and we should develop techniques to respond to the changing construction environment. Furthermore, we should develop a performance evaluation system that is appropriate for the demands of residents such as the improvement of remodeling floor plan by performance improvement in line with the residence type of the housing vulnerable groups such as low-income group and elderly people living alone. For this purpose, remodeling techniques and business models optimized for the target complexes must be spread through the development of various business models. In addition, it is necessary to improve the remodeling business by improving the laws and systems related to the improvement of the residential performance and to prepare techniques to respond to the increasing business demands. In other words, performance improvement and evaluation and knowledge systems need to be researched as new issues related to remodeling that has not been addressed in the existing research.Keywords: remodelling, performance evaluation, web-based system, big data
Procedia PDF Downloads 22414359 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners
Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi
Abstract:
Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression
Procedia PDF Downloads 22314358 Developing a Model – an Application of Fuzzy Analytic Network Process Techniques for Hostels
Authors: Pin-Ju Juan, Peng-Yu Juan, Yi-Shan Chen
Abstract:
The main purpose of this paper is to present a fuzzy Analytic Network Process (ANP) model for the hostel organizational performance selection. In this article, we created 39 criteria for selecting hostel organizational performance acquired from literature's review and experts method practical investigations, and the methods of fuzzy analytic network process are used to consolidate decision-makers’ assessments about criteria weightings. Finally, we selected organizational performance of a hostel in Taiwan to determine the effectiveness of the proposed evaluation model in this paper.Keywords: Fuzzy ANP, hostel, organizational performance, strategy management
Procedia PDF Downloads 20114357 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 16614356 Landmines and the Postcolonial Security Discourse in Zimbabwe
Authors: Fradreck Jockonia Mujuru
Abstract:
The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.Keywords: landmines, postcolonial, repression, security, violence
Procedia PDF Downloads 7614355 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 14114354 How Reverse Logistics Can Improve the Sustainability Performance of a Business?
Authors: Taknaz Banihashemi, Jiangang Fei, Peggy Shu-Ling Chen
Abstract:
Reverse logistics (RL) is a part of the logistics of companies and its aim is to reclaim value from the returned products in an environmentally friendly manner. In recent years, RL has attracted significant attention among both practitioners and academics due to environmental directives and governmental legislation, consumer concerns and social responsibilities for environment, awareness of the limits of natural resources and economic potential. Sustainability development is considered as a critical goal for organisations due to its impact on competitive advantage. With growing environmental concerns and legal regulations related to green and sustainability issues, product disposition through RL can be considered as an environmental, economic and social sound way to achieve sustainable development. When employed properly, RL can help firms to improve their sustainability performance. The aim of this paper is to investigate the sustainability issues in the context of RL in the perspective of the triple-bottom-line approach. Content analysis was used to collect the information. The findings show that there is a research gap to investigate the relationship between RL and sustainability performance. Most of the studies have focused on performance evaluation of RL by considering the factors related to economic and environmental performance. RL can have significant effects on social issues along with economic and environmental issues. The inclusion of the social aspect in the sustainability performance will provide a complete and holistic picture of how RL may impact on the sustainability performance of firms. Generally, there is a lack of research on investigating the relationship between RL and sustainability by integrating the three pillars of triple-bottom-line sustainability performance. This paper provides academics and researchers a broad view of the correlations between RL and sustainability performance.Keywords: verse Logistics, review, sustainability, sustainability performance
Procedia PDF Downloads 15414353 Bank Specialization and Credit Risk: Evidence from Global Financial Crisis Shock
Authors: Lemu Abebe Geleta
Abstract:
In this study, it compare the performance of banks and financial services (operational, financial, and market) across four major regions including Asia, Europe, Africa, and North with the extent of sustainability reporting. We examine how the Environment, Social, and Governance score (ESG) and the three pillars such as Return on Assets, Return on Equity, and Tobin's (Q) affect the performance of banks using data collected from 3450 observations across 40 different nations over ten years of (2011-2020). it also consider implications for governance, macroeconomics, and specific bank attributes. The results indicate a negative correlation between ESG and operational performance (ROA), financial performance (ROE), and market performance (TQ). The inclusion of diverse political and economic contexts lends distinctiveness to this paper. the findings hold significant theoretical implications for global scholars and policymakers. The limited correlation between ESG, its pillars, and the performance of banks and financial services underscores managerial shortcomings within these sectors.Keywords: bank specialization, financial crisis, credit risk, difference-in-differences, herfindahl hirschman index
Procedia PDF Downloads 2914352 Effect of Thickness and Solidity on the Performance of Straight Type Vertical Axis Wind Turbine
Authors: Jianyang Zhu, Lin Jiang, Tixian Tian
Abstract:
Inspired by the increasing interesting on the wind power associated with production of clear electric power, a numerical experiment is applied to investigate the aerodynamic performance of straight type vertical axis wind turbine with different thickness and solidity, where the incompressible Navier-Stokes (N-S) equations coupled with dynamic mesh technique is solved. By analyzing the flow field, as well as energy coefficient of different thickness and solidity turbine, it is found that the thickness and solidity can significantly influence the performance of vertical axis wind turbine. For the turbine under low tip speed, the mean energy coefficient increase with the increasing of thickness and solidity, which may improve the self starting performance of the turbine. However for the turbine under high tip speed, the appropriate thickness and smaller solidity turbine possesses better performance. In addition, delay stall and no interaction of the blade and previous separated vortex are observed around appropriate thickness and solidity turbine, therefore lead better performance characteristics.Keywords: vertical axis wind turbine, N-S equations, dynamic mesh technique, thickness, solidity
Procedia PDF Downloads 26614351 The Impact of Regulation on Corporate Social Responsibility Reporting Quality: UK Evidence
Authors: Ruba Hamed, Khaled Hussainey, Basiem Al-Shattarat, Wasim Al-Shattarat
Abstract:
This paper examines how the influence of mandating corporate social responsibility reporting (CSR) on subsequent financial performance through accounting-based measures and market-based measures. We provide evidence about the negative impact of reporting CSR voluntarily on the firm’s future performance due to the increased spending on and costs related to such activities. On the contrary, mandating CSR reporting enhances firms’ future performance by signalling to the market about the firm’s positive stance towards sustainability issues in the UK. Our findings are of interest to regulation setters and stakeholders with respect to mandatory CSR reporting and provide further insight and feedback into accounting and reporting practices.Keywords: accounting-based performance, mandatory CSR, mandatory regulation, market-based performance
Procedia PDF Downloads 12614350 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States
Authors: Mai Kaneda, Sarah Feeney
Abstract:
This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.Keywords: attachment, career decision-making, college students, self-efficacy
Procedia PDF Downloads 22114349 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 48614348 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 13214347 Analysis of Business Intelligence Tools in Healthcare
Authors: Avishkar Gawade, Omkar Bansode, Ketan Bhambure, Bhargav Deore
Abstract:
In recent year wide range of business intelligence technology have been applied to different area in order to support decision making process BI enables extraction of knowledge from data store. BI tools usually used in public health field for financial and administrative purposes.BI uses a dashboard in presentation stage to deliver information to information to end users.In this paper,we intend to analyze some open source BI tools on the market and their applicability in the clinical sphere taking into consideration the general characteristics of the clinical environment.A pervasive BI platform was developed using a real case in order to prove the tool viability.Analysis of various BI Tools in done with the help of several parameters such as data security,data integration,data quality reporting and anlaytics,performance,scalability and cost effectivesness.Keywords: CDSS, EHR, business intelliegence, tools
Procedia PDF Downloads 13814346 Effects of Workplace Power on Employees’ Job Performance in Selected Federal Universities of Agriculture in Nigeria
Authors: B. G. Abiona, T. D. Odetayo, S. O. Adeogun, O. E. Fakoya
Abstract:
This study determined the effects of workplace power on employees’ job performance in selected federal universities of agriculture in Nigeria. Two hundred and twenty-seven (227) employees were randomly drawn from the selected universities through a multistage sampling procedure. The mean age of the employees was 38 years, mostly (60.8%) male. Results indicated that the overall job performance was significantly influenced by an expert (b = 0.287, p<0.01) and legitimate power (b = -0.279, p<0.05). The findings clearly showed that supervisor has considerable professional experience to draw from in helping subordinates to do their work better because they have specialized training in their field of study, and subordinates prefer to do what the supervisor suggests because of their professional expertise, which greatly influences employees’ job performance. A policy that will ensure transparency in all administrative procedures, with a formal line of authority that will enhance the thriving of legitimate power, should be established within organisation is recommended.Keywords: workplace power, employees, job performance, agricultural unversities
Procedia PDF Downloads 9114345 Examining the Performance of Three Multiobjective Evolutionary Algorithms Based on Benchmarking Problems
Authors: Konstantinos Metaxiotis, Konstantinos Liagkouras
Abstract:
The objective of this study is to examine the performance of three well-known multiobjective evolutionary algorithms for solving optimization problems. The first algorithm is the Non-dominated Sorting Genetic Algorithm-II (NSGA-II), the second one is the Strength Pareto Evolutionary Algorithm 2 (SPEA-2), and the third one is the Multiobjective Evolutionary Algorithms based on decomposition (MOEA/D). The examined multiobjective algorithms are analyzed and tested on the ZDT set of test functions by three performance metrics. The results indicate that the NSGA-II performs better than the other two algorithms based on three performance metrics.Keywords: MOEAs, multiobjective optimization, ZDT test functions, evolutionary algorithms
Procedia PDF Downloads 47014344 Optimization of Wavy Channel Using Genetic Algorithm
Authors: Yue-Tzu Yang, Peng-Jen Chen
Abstract:
The present study deals with the numerical optimization of wavy channel with the help of genetic algorithm (GA). Three design variables related to the wave amplitude (A), the wavelength (λ) and the channel aspect ratio (α) are chosen and their ranges are decided through preliminary calculations of three-dimensional Navier-stokes and energy equations. A parametric study is also performed to show the effects of different design variables on the overall performance of the wavy channel. Objective functions related to the heat transfer and pressure drop, performance factor (PF) is formulated to analyze the performance of the wavy channel. The numerical results show that the wave amplitude and the channel aspect ratio have significant effects on the thermal performance. It can improve the performance of the wavy channels by increasing wave amplitude or decreasing the channel aspect ratio. Increasing wavelengths have no significant effects on the heat transfer performance.Keywords: wavy channel, genetic algorithm, optimization, numerical simulation
Procedia PDF Downloads 30114343 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 18314342 Deep Learning-Based Object Detection on Low Quality Images: A Case Study of Real-Time Traffic Monitoring
Authors: Jean-Francois Rajotte, Martin Sotir, Frank Gouineau
Abstract:
The installation and management of traffic monitoring devices can be costly from both a financial and resource point of view. It is therefore important to take advantage of in-place infrastructures to extract the most information. Here we show how low-quality urban road traffic images from cameras already available in many cities (such as Montreal, Vancouver, and Toronto) can be used to estimate traffic flow. To this end, we use a pre-trained neural network, developed for object detection, to count vehicles within images. We then compare the results with human annotations gathered through crowdsourcing campaigns. We use this comparison to assess performance and calibrate the neural network annotations. As a use case, we consider six months of continuous monitoring over hundreds of cameras installed in the city of Montreal. We compare the results with city-provided manual traffic counting performed in similar conditions at the same location. The good performance of our system allows us to consider applications which can monitor the traffic conditions in near real-time, making the counting usable for traffic-related services. Furthermore, the resulting annotations pave the way for building a historical vehicle counting dataset to be used for analysing the impact of road traffic on many city-related issues, such as urban planning, security, and pollution.Keywords: traffic monitoring, deep learning, image annotation, vehicles, roads, artificial intelligence, real-time systems
Procedia PDF Downloads 20014341 Exploring the Impact of Asset Diversification on Financial Performance: An Explanatory Study of Ethiopian Commercial Banks
Authors: Mitku Malede Ymer
Abstract:
The study was mainly intended to explore the impact of asset diversification on the financial performance of thirteen purposely selected Ethiopian commercial banks with seven consecutive years of data for the period 2011-2017, considering the availability of data. An explanatory research design has been employed to determine the impact of asset diversification on financial performance. In the meantime, a quantitative approach was used to construct the empirical model. Banks’ financial performance was measured using return on asset, and the four variables used to measure asset diversification were cash holding, fixed assets, foreign deposits, and NBE Bills, which were predictor variables. Again, the size of the bank was considered as a control variable. Then, a pooled panel regression model was employed to analyze the collected data. The result pretends that cash holding has a positive but marginally insignificant effect on financial performance, fixed assets, and foreign bank deposits have a positive and significant effect on financial performance, and NBE Bills have a negative and significant effect on banks' financial performance. Ultimately, it has been concluded that asset diversification has a significant effect on financial performance in the Ethiopian commercial banking sector. Hence, a researcher suggests that banks need to optimize their asset diversification so as to realize maximum profit and minimize the cost of funds based on the result of the study.Keywords: asset diversification, financial performance, role, commercial banks
Procedia PDF Downloads 2014340 Performance-Based Quality Evaluation of Database Conceptual Schemas
Authors: Janusz Getta, Zhaoxi Pan
Abstract:
Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing
Procedia PDF Downloads 29314339 Assessment and Evaluation of Football Performance
Authors: Bulus Kpame, Mukhtar Mohammed Alhaji, Garba Jibril
Abstract:
In any team sport, the most important variables that should be used to measure performance are physical condition, and technical and tactical performance. In a complex game like football, it is extremely difficult to measure the relative importance of each of these variables. However, physical fitness itself has been shown to consist of several components, like endurance, strength, flexibility, agility, coordination and speed. Each of these components has been shown to consist of several subcomponents. This paper attempts to describe a test battery to assess and evaluate physical performance in football players. This battery comprises a functional, structured training session of about 2.5hrs. it consists of quality rating of the warm-up procedure, tests of flexibility, football skills, power, speed, and endurance. Acceptable values for performance in each of the tests are also presented under each test. It is hoped that this battery of tests will be helpful to the coach in determining the effect of a specific training program. It would also be helpful to train physician and trainer, to monitor progress during rehabilitation after sustaining any injury.Keywords: assessment, evaluation, performance, programs
Procedia PDF Downloads 40814338 Thermohydraulic Performance Comparison of Artificially Roughened Rectangular Channels
Authors: Narender Singh Thakur, Sunil Chamoli
Abstract:
The use of roughness geometry in the rectangular channel duct is an effective technique to enhance the rate of heat transfer to the working fluid. The present research concentrates on the performance comparison of a rectangular channel with different roughness geometry of the test plate. The performance enhancement is compared by considering the statistical correlations developed by the various investigators for Nusselt number and friction factor. Among all the investigated geometries multiple v-shaped rib roughened rectangular channel found thermo hydraulically better than other investigated geometries under similar current and operating conditions.Keywords: nusselt number, friction factor, thermohydraulic, performance parameter
Procedia PDF Downloads 422