Search results for: private integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2452

Search results for: private integrity

1402 Financial Development and Economic Growth of Sub-Saharan Africa Using System GMM Analysis

Authors: Temesgen Yaekob Ergano, Sure Pulla Rao

Abstract:

The study on financial development and economic growth in Sub-Saharan Africa utilizes System GMM analysis to investigate the relationship between financial development indicators and economic performance in the region. The research findings reveal significant impacts of various financial indicators on economic growth, such as the positive influence of bank liquid reserves to bank assets ratio (R/A), trade openness, and the broad money to total reserves ratio (M/R) on the economic growth of Sub-Saharan Africa. Additionally, the study highlights the negative impact of domestic credit provided to the private sector by banks (D_bank) on economic growth, emphasizing the importance of prudent credit allocation to avoid over-indebtedness and financial crises. These results provide valuable insights for policymakers aiming to foster sustainable economic growth in the region by leveraging financial development effectively.

Keywords: financial development, economic growth, Sub-Saharan Africa, system GMM analysis, financial indicators.

Procedia PDF Downloads 33
1401 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment

Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad

Abstract:

According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.

Keywords: security, electronic banking, one time password, information technology

Procedia PDF Downloads 434
1400 Mass Media and Electoral Conflict Management in Kogi State, Nigeria

Authors: Okpanachi Linus Odiji, Chris Ogwu Attah

Abstract:

Election is no doubt widely assumed as one of the most suitable means of resolving political quagmires even though it has never been bereft of conflict which can manifest before, during, or after polls. What, however, advances democracy and promotes electoral integrity is the existence and effectiveness of institutional frameworks for electoral conflict management. Electoral conflicts are no doubt unique in the sense that they represent the struggles of people over the control of public resources. In most cases, the stakes involved are high and emotional that they do not only undermine inter-group relationship but also threaten national security. The need, therefore, for an effectively functional conflict management apparatus becomes imperative. While at the State level, there exist numerous governmental initiatives at various electoral stages aimed at managing conflicts, this paper examines the activities of the mass media, which is another prominent stakeholder in the electoral process. Even though media influence has increased tremendously in the last decade, researchers are yet to agree on its utility in the management of conflicts. Guided by the social responsibility theory of media reporting and drawing data from observed trends in Kogi state, the paper, which context analyses the 2019 gubernatorial election coverage in the state, observes both conflict escalation and de-escalation roles in the media. To mitigate conflict reporting misrepresentation, therefore, a common approach to conflict reporting should be designed and ordered by the National Broadcasting Commission as well as the Nigerian Press Council. This should be garnished with the training of journalists on conflict reporting and development of a standard conflict reporting procedure.

Keywords: conflict management, electoral conflict, mass media, media reporting

Procedia PDF Downloads 127
1399 Pressure Relief in Prosthetic Sockets through Hole Implementation Using Different Materials

Authors: Gabi N. Nehme

Abstract:

Below-knee amputees commonly experience asymmetrical gait patterns. It is generally believed that ischemia is related to the formation of pressure sores due to uneven distribution of forces. Micro-vascular responses can reveal local malnutrition. Changes in local skin blood supply under various external loading conditions have been studied for a number of years. Radionuclide clearance, photo-plethysmography, trans-cutaneous oxygen tension along with other studies showed that the blood supply would be influenced by the epidermal forces, and the rate and the amount of blood supply would decrease with increased epidermal loads being shear forces or normal forces. Several cases of socket designs were investigated using Finite Element Model (FEM) and Design of Experiment (DOE) to increase flexibility and minimize the pressure at the limb/socket interface using ultra high molecular weight polyethylene (UHMWPE) and polyamide 6 (PA6) or Duraform. The pressure reliefs at designated areas where reducing thickness is involved are seen to be critical in determination of amputees’ comfort and are very important to clinical applications. Implementing a hole between the Patellar Tendon (PT) and Distal Tibia (DT) would decrease stiffness and increase prosthesis range of motion where flexibility is needed. In addition, displacement and prosthetic energy storage increased without compromising mechanical efficiency and prosthetic design integrity.

Keywords: patellar tendon, distal tibia, prosthetic socket relief areas, hole implementation

Procedia PDF Downloads 396
1398 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 117
1397 Corporate Social Responsibility: A Comparative Study of Two Largest Banks in India

Authors: Navdeep Kaur

Abstract:

Corporate Social Responsibility is the process through which the organizations execute their philanthropic visions for social welfare. This paper considers the data of one Public Sector Bank–State Bank of India (SBI) and one Private Sector Bank-Industrial Credit and Investment Corporation of India (ICICI) from the year 2008 to 2016. The study is based on descriptive research design, and secondary data collected from the annual report of respective bank from website and different literature are reviewed. Least Square Method is used for estimating CSR spending for the financial year 2017-18. The analysis shows that these banks are making efforts for the implementation of CSR, but are not spending their 2% share of profits on CSR. There is a need for better CSR activities by the banks, which is possible by concentrating more on the prevailing social issues. The finding reveals that the percentage of profit after tax spends for CSR by SBI is more compare to ICICI. The estimated Spending for CSR for 2017-18 is also more in SBI as compared to ICICI.

Keywords: banking sector, corporate social responsibility in India, financial institution, public sector banks, SBI, ICICI

Procedia PDF Downloads 177
1396 Comparative Fragility Analysis of Shallow Tunnels Subjected to Seismic and Blast Loads

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground structures are crucial components which required detailed analysis and design. Tunnels, for instance, are massively constructed as transportation infrastructures and utilities network especially in urban environments. Considering their prime importance to the economy and public safety that cannot be compromised, thus any instability to these tunnels will be highly detrimental to their performance. Recent experience suggests that tunnels become vulnerable during earthquakes and blast scenarios. However, a very limited amount of studies has been carried out to study and understanding the dynamic response and performance of underground tunnels under those unpredictable extreme hazards. In view of the importance of enhancing the resilience of these structures, the overall aims of the study are to evaluate probabilistic future performance of shallow tunnels subjected to seismic and blast loads by developing detailed fragility analysis. Critical non-linear time history numerical analyses using sophisticated finite element software Midas GTS NX have been presented about the current methods of analysis, taking into consideration of structural typology, ground motion and explosive characteristics, effect of soil conditions and other associated uncertainties on the tunnel integrity which may ultimately lead to the catastrophic failure of the structures. The proposed fragility curves for both extreme loadings are discussed and compared which provide significant information the performance of the tunnel under extreme hazards which may beneficial for future risk assessment and loss estimation.

Keywords: fragility analysis, seismic loads, shallow tunnels, blast loads

Procedia PDF Downloads 322
1395 The Impact of Employee Assistance Program on New Hire Well Being and Turnover

Authors: Steffira Anjani, Agnes Dessyana, Luciyana Lesmana

Abstract:

Employee well-being has been a major factor for an employee to deliver optimal performance in the workplace. During the COVID-19 pandemic, there has been a major concern for organizations to develop Employee Assistance Program as an approach to maintain employees’ well-being. However, there is little published evidence assessing the effectiveness of Employee Assistance Program for the employee’s well-being. The purpose of this paper is to advance theory and practice by understanding how the Employee Assistance Program (EAP) impacts to new hire well-being and turnover, especially in private organization. This paper provides an intervention framework used for new employees. The intervention program (onboarding and support group) is carried out to improve new hire well-being and to make them stay at the organization. The intervention is delivered to 36 new hire employees that were recruited from January 2021 to still ongoing 2022. The result of level 1 evaluation shows that new hire employees give a good rating to the intervention program. Next, the result of level 2 evaluation shows that the intervention has a significant difference in new hire well-being before and after the intervention program (Z=-2,11, p<0.05) and increases the percentage of recruitment quality index (RQI = 10%).

Keywords: Employee Assistance Program, well-being, turnover, intervention program

Procedia PDF Downloads 151
1394 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 71
1393 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 173
1392 Developing Norms for Sit and Reach Test in the Local Environment of Khyber Pakhtunkhwa, Pakistan

Authors: Hazratullah Khattak, Abdul Waheed Mughal, Inamullah Khattak

Abstract:

This study is envisaged as vital contribution as it intends to develop norms for the Sit and Reach Test in the Local Environment of Khyber Pakhtunkhwa Pakistan, for the age group between 12-14 years which will be used to measure the flexibility level of early adolescents (12-14 years). Sit and Reach test was applied on 2000 volunteers, 400 subjects from each selected district (Five (5) Districts, Peshawar, Nowshera, Karak, Dera Ismail Khan and Swat (20% percent of the total 25 districts) using convenient sampling technique. The population for this study is comprised of all the early adolescents aging 12-14 years (Age Mean 13 + 0.63, Height 154 + 046, Weight 46 + 7.17, BMI 19 + 1.45) representing various public and private sectors educational institutions of the Khyber Pakhtunkhwa. As for as the norms developed for Sit and Reach test, the score below 6.8 inches comes in the category of poor, 6.9 to 9.6 inches (below Average), 9.7 to 10.8 inches (Average), 10.9 to 13 inches (Above average) and above 13 inches score is considered as Excellent.

Keywords: fitness, flexibility, norms, sit and reach

Procedia PDF Downloads 263
1391 Numerical Modal Analysis of a Multi-Material 3D-Printed Composite Bushing and Its Application

Authors: Paweł Żur, Alicja Żur, Andrzej Baier

Abstract:

Modal analysis is a crucial tool in the field of engineering for understanding the dynamic behavior of structures. In this study, numerical modal analysis was conducted on a multi-material 3D-printed composite bushing, which comprised a polylactic acid (PLA) outer shell and a thermoplastic polyurethane (TPU) flexible filling. The objective was to investigate the modal characteristics of the bushing and assess its potential for practical applications. The analysis involved the development of a finite element model of the bushing, which was subsequently subjected to modal analysis techniques. Natural frequencies, mode shapes, and damping ratios were determined to identify the dominant vibration modes and their corresponding responses. The numerical modal analysis provided valuable insights into the dynamic behavior of the bushing, enabling a comprehensive understanding of its structural integrity and performance. Furthermore, the study expanded its scope by investigating the entire shaft mounting of a small electric car, incorporating the 3D-printed composite bushing. The shaft mounting system was subjected to numerical modal analysis to evaluate its dynamic characteristics and potential vibrational issues. The results of the modal analysis highlighted the effectiveness of the 3D-printed composite bushing in minimizing vibrations and optimizing the performance of the shaft mounting system. The findings contribute to the broader field of composite material applications in automotive engineering and provide valuable insights for the design and optimization of similar components.

Keywords: 3D printing, composite bushing, modal analysis, multi-material

Procedia PDF Downloads 81
1390 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 495
1389 Down-Regulated Gene Expression of GKN1 and GKN2 as Diagnostic Markers for Gastric Cancer

Authors: Amer A. Hasan, Mehri Igci, Ersin Borazan, Rozhgar A. Khailany, Emine Bayraktar, Ahmet Arslan

Abstract:

Gastric cancer (GC) has high morbidity and fatality rate in various countries and is still one of the most frequent and deadly diseases. Novel mitogenic and motogenic Gastrokine1 (GKN1) and Gastrokine 2 (GKN2) genes that are highly expressed in the normal stomach epithelium and plays an important role in maintaining the integrity and homeostasis of stomach mucosal epithelial cells. Significant loss of copy number and mRNA transcript of GKN1 and GKN2 gene expression were frequently observed in all types of gastric cancer. In this study, 47 paired samples that were grouped according to the types of gastric cancer and the clinical characteristics of the patients, including gender and average of age were investigated with gene expression analysis and mutation screening by monetering RT-PCR, SSCP and nucleotide sequencing techniques. Both GKN1 and GKN2 genes were observed significantly reduced found by (Wilcoxon signed rank test; p<0.05). As a result of gene screening, no mutation (no different genotype) was detected. It is considered that gene mutations are not the cause of inactivation of gastrokines. In conclusion, the mRNA expression level of GKN1 and GKN2 genes statistically was decreased regardless the gender, age or cancer type of patients. Reduced of gastrokine genes seems to occur at the initial steps of cancer development. In order to understand the investigation between gastric cancer and diagnostic biomarker; further analysis is necessary.

Keywords: gastric cancer, diagnostic biomarker, nucleotide sequencing, semi-quantitative RT-PCR

Procedia PDF Downloads 465
1388 Analysis of Digitized Stories Authored by a Struggling Grade 1 Reader

Authors: Daphne Dean C. Arenos, Glorificacion L. Quinopez

Abstract:

This study has been conducted to describe the digitized stories authored by a Grade 1 pupil struggling in reading. The main goal was to find out the effect of authoring digital stories on the reading skill of a grade 1 pupil in terms of vocabulary and sequencing skills. To be able to explicate the data collected, a case study approach has been chosen. This case study focused on a 6 years old Filipino child born and raised in Spain and has just transferred to a private school a year ago. The pupil’s struggles in reading, as well as her experiences with digitized stories, were further described. The findings revealed that authoring digital stories facilitate the reading progress of a struggling pupil. The presence of literary elements in the pupil’s stories built her vocabulary and sequencing skills. Hence, authoring digital stories serve as an appropriate and effective scaffold for struggling readers.

Keywords: literary elements, reading skill, scaffold, sequencing skill, vocabulary

Procedia PDF Downloads 121
1387 Informalization and Feminization of Labour Force in the Context of Globalization of Production: Case Study of Women Migrant Workers in Kinfra Apparel Park of India

Authors: Manasi Mahanty

Abstract:

In the current phase of globalization, the mobility of capital facilitates outsourcing and subcontracting of production processes to the developing economies for cheap and flexible labour force. In such process, the globalization of production networks operates at multi-locational points within the nation. Under the new quota regime in the globalization period, the Indian manufacturing exporters came under the influence of corporate buyers and large retailers from the importing countries. As part of such process, the garment manufacturing sector is expected to create huge employment opportunities and to expand the export market in the country. While following these, expectations, the apparel and garment industries mostly target to hire female migrant workers with a purpose of establishing more flexible industrial relations through the casual nature of employment contract. It leads to an increasing women’s participation in the labour market as well as the rise in precarious forms of female paid employment. In the context, the main objective of the paper is to understand the wider dynamics of globalization of production and its link with informalization, feminization of labour force and internal migration process of the country. For this purpose, the study examines the changing labour relations in the KINFRA Apparel Park at Kerala’s Special Economic Zone which operates under the scheme ‘Apparel Parks for Export’ (APE) of the Government of India. The present study was based on both quantitative and qualitative analysis. In the first, the secondary sources of data were collected from the source location (SEAM centre) and destination (KINFRA Park). The official figures and data were discussed and analyzed in order to find out the various dimensions of labour relations under globalization of production. In the second, the primary survey was conducted to make a comparative analysis of local and migrant female workers. The study is executed by taking 100 workers in total. The local workers comprised of 53% of the sample whereas the outside state workers were 47%. Even personal interviews with management staff, and workers were also made for collecting the information regarding the organisational structure, nature, and mode of recruitment, work environment, etc. The study shows the enormous presence of rural women migrant workers in KINFRA Apparel Park. A Public Private Partnership (PPP) arranged migration system is found as Skills for Employment in Apparel Manufacturing (SEAM) from where young women and girls are being sent to work in garment factories of Kerala’s KINFRA International Apparel Park under the guise of an apprenticeship based recruitment. The study concludes that such arrangements try to avoid standard employment relationships and strengthen informalization, casualization and contractualization of work. In this process, the recruitment of women migrant workers is to be considered as best option for the employers of private industries which could be more easily hired and fired.

Keywords: female migration, globalization, informalization, KINFRA apparel park

Procedia PDF Downloads 323
1386 Numerical and Experimental Analysis of Stiffened Aluminum Panels under Compression

Authors: Ismail Cengiz, Faruk Elaldi

Abstract:

Within the scope of the study presented in this paper, load carrying capacity and buckling behavior of a stiffened aluminum panel designed by adopting current ‘buckle-resistant’ design application and ‘Post –Buckling’ design approach were investigated experimentally and numerically. The test specimen that is stabilized by Z-type stiffeners and manufactured from aluminum 2024 T3 Clad material was test under compression load. Buckling behavior was observed by means of 3 – dimensional digital image correlation (DIC) and strain gauge pairs. The experimental study was followed by developing an efficient and reliable finite element model whose ability to predict behavior of the stiffened panel used for compression test is verified by compering experimental and numerical results in terms of load – shortening curve, strain-load curves and buckling mode shapes. While finite element model was being constructed, non-linear behaviors associated with material and geometry was considered. Finally, applicability of aluminum stiffened panel in airframe design against to composite structures was evaluated thorough the concept of ‘Structural Efficiency’. This study reveals that considerable amount of weight saving could be gained if the concept of ‘post-buckling design’ is preferred to the already conventionally used ‘buckle resistant design’ concept in aircraft industry without scarifying any of structural integrity under load spectrum.

Keywords: post-buckling, stiffened panel, non-linear finite element method, aluminum, structural efficiency

Procedia PDF Downloads 129
1385 Selective Oxidation of 6Mn-2Si Advanced High Strength Steels during Intercritical Annealing Treatment

Authors: Maedeh Pourmajidian, Joseph R. McDermid

Abstract:

Advanced High Strength Steels are revolutionizing both the steel and automotive industries due to their high specific strength and ability to absorb energy during crash events. This allows manufacturers to design vehicles with significantly increased fuel efficiency without compromising passenger safety. To maintain the structural integrity of the fabricated parts, they must be protected from corrosion damage through continuous hot-dip galvanizing process, which is challenging due to selective oxidation of Mn and Si on the surface of this AHSSs. The effects of process atmosphere oxygen partial pressure and small additions of Sn on the selective oxidation of a medium-Mn C-6Mn-2Si advanced high strength steel was investigated. Intercritical annealing heat treatments were carried out at 690˚C in an N2-5%H2 process atmosphere under dew points ranging from –50˚C to +5˚C. Surface oxide chemistries, morphologies, and thicknesses were determined at a variety of length scales by several techniques, including SEM, TEM+EELS, and XPS. TEM observations of the sample cross-sections revealed the transition to internal oxidation at the +5˚C dew point. EELS results suggested that the internal oxides network was composed of a multi-layer oxide structure with varying chemistry from oxide core towards the outer part. The combined effect of employing a known surface active element as a function of process atmosphere on the surface structure development and the possible impact on reactive wetting of the steel substrates by the continuous galvanizing zinc bath will be discussed.

Keywords: 3G AHSS, hot-dip galvanizing, oxygen partial pressure, selective oxidation

Procedia PDF Downloads 383
1384 The Cadence of Proximity: Indigenous Resilience as Caring for Country-in-the-City

Authors: Jo Anne Rey

Abstract:

Caring for Country (Ngurrain Dharug language) is core to Aboriginal identity, Law/Lore, practice, and resilience within the continent called ‘Australia’. It is the basis of thousands of years of sustainability. However, when Ngurra is a city known as Sydney, due to 235 years of colonial impact, caring for the Country is limited, being controlled by the State and private ownership of the land title. Recent research indicates that localised Indigenous activism is most successful when community members are geographically proximate to the presences and places of connection, caring, and belonging. This article frames these findings through the cadence that proximity provides. This presentation is centred on the proximate agency that is being exercised by Dharug community through three significant sites within the Sydney basin. Those sites include, firstly, Shaw’s Creek Aboriginal Place, at the foot of the Blue Mountains in far western Sydney. Second inclusion is the site of Blacktown Native Institution, that was the part of the authoritarian colonial governance of British Governor Lachlan Macquarie (after who Macquarie University is named), which saw the beginnings of the removal of children from their families and culture to ‘civilize’ them. The third site is that of the so-called Brown’s Waterhole in the State government administered Lane Cove National Park. Each of these sites is being activated through Dharug and, more broadly, Aboriginalways of knowing, doing, and being. These ways involvethe land, water, wind, and star-based ecologies interwoven with traditional transgenerational storying of the presences (Ancestral and spiritual) creating them. Activations include, but are not limited to, the return of cultural fire for reviving plants, soils, animals, and birds. These fire practices have traditionally been at the basis of sustainable, regenerative biodiversity. These practices involve the literacy of reading Ngurra and the seasonal interactions across the ecologies. Together, they both care for the Country and support humanity, and have done so across thousands of years. However, when the cost of real-estate and rental accommodation prevents community members from being able to live on Dharug Ngurra when bureaucratic governance restricts and/or excludes traditional custodial relationships, and when private treaty land title destroys the presences and places while disconnecting people from their Ancestral practices, it becomes clear that caring for Country is only possible when the community can afford to live nearby. Recognising the cadence of proximityas the agency that underpinscaring for Country-in-the-city, sustainable change opportunities don’t have to only focus on regional and remote areas. Urban-based Aboriginal relationality offers an alternative to the unsustainable practices that underpin human-centric disconnection. Weaving Indigenous cadence offers opportunities for sustainable futures even when facing the extremes of climate changing catastrophes.

Keywords: australian aboriginal, biocultural knowledges, climate change, dharug ngurra, sustainability, resilience

Procedia PDF Downloads 77
1383 SME Credit Financing, Financial Development and Economic Growth: A VAR Approach to the Nigerian Economy

Authors: A. Bolaji Adesoye, Alimi Olorunfemi

Abstract:

This paper examines the impact of small and medium-scale enterprises (SMEs) credit financing and financial market development and their shocks on the output growth of Nigeria. The study estimated a VAR model for Nigeria using 1970-2013 annual data series. Unit root tests and cointegration are carried out. The study also explores IRFs and FEVDs in a system that includes output, commercial bank loan to SMEs, domestic credit to private sector by banks, money supply, lending rate and investment. Findings suggest that shocks in commercial bank credit to SMEs has a major impact on the output changes of Nigeria. Money supply shocks also have a sizeable impact on output growth variations amidst other financial instruments. Lastly, neutrality of investment does not hold in Nigeria as it also has impact on output fluctuations.

Keywords: SMEs financing, financial development, investment, output, Nigeria

Procedia PDF Downloads 391
1382 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 195
1381 The Effect of User Comments on Traffic Application Usage

Authors: I. Gokasar, G. Bakioglu

Abstract:

With the unprecedented rates of technological improvements, people start to solve their problems with the help of technological tools. According to application stores and websites in which people evaluate and comment on the traffic apps, there are more than 100 traffic applications which have different features with respect to their purpose of usage ranging from the features of traffic apps for public transit modes to the features of traffic apps for private cars. This study focuses on the top 30 traffic applications which were chosen with respect to their download counts. All data about the traffic applications were obtained from related websites. The purpose of this study is to analyze traffic applications in terms of their categorical attributes with the help of developing a regression model. The analysis results suggest that negative interpretations (e.g., being deficient) does not lead to lower star ratings of the applications. However, those negative interpretations result in a smaller increase in star rate. In addition, women use higher star rates than men for the evaluation of traffic applications.

Keywords: traffic app, real–time information, traffic congestion, regression analysis, dummy variables

Procedia PDF Downloads 407
1380 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 56
1379 Highlighting Adverse Effects of Privatization of Heritage on Taj Mahal and Providing Solutions to Improve the Condition without Privatizing

Authors: Avani Saraswat

Abstract:

The paper studies the present condition of Taj Mahal (the UNESCO world heritage site) and the reasons behind deterioration. Analysis is done to explore the reasons behind this building to be included in the list of adopt heritage scheme, by the Government of India. The aim is to find out the future effects on Taj Mahal after being adopted by a private body. Finally, it suggests solutions which can lead to improvement of the present condition of the building. In order to establish a research, a further analysis is done through a case study of Red Fort, New Delhi (another UNESCO world heritage site). This monument was given to Dalmia Group of India Pvt. Ltd. for the tenure of 5 years. Paper discusses the consequences of privatization on Red Fort and then analyze it for Taj Mahal. It terms monument as riches of a heritage chest, not as a commercial tourist place. The study is concluded with the ideas and suggestions proposed for saving Taj Mahal and advantages on improving the health of the building.

Keywords: privatisation of heritage, heritage, Taj Mahal, adopt heritage scheme

Procedia PDF Downloads 129
1378 Traffic Congestion Problem and Possible Solution in Kabul City

Authors: Sayed Abdul Rahman Sadaat, Nsenda Lukumwena

Abstract:

Traffic congestion is a worldwide issue, especially in developing countries. This is also the case of Afghanistan, especially in Kabul-the capital city, whose rapid population growth makes it the fifth fastest growing city in the world. Traffic congestion affects not only the mobility of people and goods but also the air quality that leads to numerous deaths (3000 people) every year. There are many factors that contribute to traffic congestion. The insufficiency and inefficiency of public transportation system along with the increase of private vehicles can be considered among the most important contributing factors. This paper addresses the traffic congestion and attempts to suggest possible solutions that can help improve the current public transportation system in Kabul. To this end, the methodology used in this paper includes field work conducted in Kabul city and literature review. The outcome suggests that improving the public transportation system is likely to contribute to the reduction of traffic congestion and the improvement of air quality, thereby reducing the number of death related to air quality.

Keywords: air quality, Kabul, Afghanistan, public transportation system, improvements, traffic congestion

Procedia PDF Downloads 358
1377 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 27
1376 The Organizational Behavior that Affect to the Work Motivation in the Dusit Workplace

Authors: Suvimon Wajeetongratana, Prateep Wajeetongratana

Abstract:

The purpose of this research will study the organizational behavior including self-efficacy, hope, optimism, and resiliency that affect to the work motivation in the Dusit workplace and the sample consisted of the production workers in a private company in Dusit area for four hundred workers with approximately 10,000 employees and in this study will provide the multiple regression analysis was used to analyze the questionnaire survey data. The results of the analysis indicate the latent core confidence factor derived from the four components of self-efficacy, hope, optimism, and resiliency provided a significant positive impact on performance. The impact of the integrated latent core confidence factor was, in fact, more effective than derived from any one individual component, as well as any core trait-like self-evaluations such as self-esteem, general efficacy, internal locus of control, and emotional stability.

Keywords: firm performance effectiveness, organizational behavior, work motivation, Dusit workplace

Procedia PDF Downloads 361
1375 Organizational Socialization Levels in Nurses

Authors: Manar Aslan, Ayfer Karaaslan, Serap Selçuk

Abstract:

The research was conducted in order to determine the organizational socialization levels of nurses working in hospitals in the form of a descriptive study. The research population was composed of nurses employed in public and private sector hospitals in the province of Konya with 0-3 years of professional experience in the hospitals (N=1200); and the sample was composed of 495 nurses that accepted to take part in the study voluntarily. Organizational Socialization Scale which was developed by Haueter, Macan and Winter (2003) and whose validity-reliability in Turkish was analyzed by Ataman (2012) was used. Statistical evaluation of data was conducted in SPSS.16 software. The results of the study revealed that the total score taken by nurses at the organizational socialization scale was 262.95; and this was close to the maximum score. Particularly the departmental socialization sub-dimension proved to be higher in comparison to the other two dimensions (organization socialization and task socialization). Statistically meaningful differences were found in the levels of organization socialization in relation to the status of organizational orientation training, level of education and age group.

Keywords: nurses, newcomers, organizational socialization, total score

Procedia PDF Downloads 323
1374 An Artistic Study of Three Rare Tennded Copper Dishes from the Mamluk Circassian Period (784- 923 AH/ 1382- 1517 CE)

Authors: Tamer Mokhtar Mohamed Ahmed

Abstract:

The metalwork industry during the Mamluk period received the attention and care of the sultans and princes, thus helping in the prosperity of this industry during this period. We are fortunate that a huge number of metal artifacts from the industry of Egypt and Syria of this period have come down to us, many of which are preserved in Egyptian and international museums as well as private collections. Characterized by great diversity in its forms, sizes and functions, including the decorative designs executed on them, the artifacts reflected the extent of artistic creativity that characterized the arts in the two Mamluk period. This research paper aims to study three copper dishes from the Mamluk Circassian period and the rare documentary texts on them that have not been previously studied. These dishes date back to different decades from the 9th AH/15 AD century. One of them bears the name of Sultan Al-Muayyad Shaikh, and the second is the name of one of the great Mamluk princes in the Mamluk Circassian period, Prince Yashbak min Mahdi. The third dish is attributed to Prince Jan Balat Al-Ashrafie.

Keywords: metalwork, dishes, decorative, calligraphy, Mamluk Arts

Procedia PDF Downloads 64
1373 Structural and Modal Analyses of an s1223 High-Lift Airfoil Wing for Drone Design

Authors: Johnson Okoduwa Imumbhon, Mohammad Didarul Alam, Yiding Cao

Abstract:

Structural analyses are commonly employed to test the integrity of aircraft component systems in the design stage to demonstrate the capability of the structural components to withstand what it was designed for, as well as to predict potential failure of the components. The analyses are also essential for weight minimization and selecting the most resilient materials that will provide optimal outcomes. This research focuses on testing the structural nature of a high-lift low Reynolds number airfoil profile design, the Selig S1223, under certain loading conditions for a drone model application. The wing (ribs, spars, and skin) of the drone model was made of carbon fiber-reinforced polymer and designed in SolidWorks, while the finite element analysis was carried out in ANSYS mechanical in conjunction with the lift and drag forces that were derived from the aerodynamic airfoil analysis. Additionally, modal analysis was performed to calculate the natural frequencies and the mode shapes of the wing structure. The structural strain and stress determined the minimal deformations under the wing loading conditions, and the modal analysis showed the prominent modes that were excited by the given forces. The research findings from the structural analysis of the S1223 high-lift airfoil indicated that it is applicable for use in an unmanned aerial vehicle as well as a novel reciprocating-airfoil-driven vertical take-off and landing (VTOL) drone model.

Keywords: CFRP, finite element analysis, high-lift, S1223, strain, stress, VTOL

Procedia PDF Downloads 202