Search results for: access funding
2684 Network Security Attacks and Defences
Authors: Ranbir Singh, Deepinder Kaur
Abstract:
Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.Keywords: network security, attacks, denial, authenticating
Procedia PDF Downloads 4042683 Development of Highly Repellent Silica Nanoparticles Treatment for Protection of Bio-Based Insulation Composite Material
Authors: Nadia Sid, Alan Taylor, Marion Bourebrab
Abstract:
The construction sector is on the critical path to decarbonise the European economy by 2050. In order to achieve this objective it must enable reducing its CO2 emission by 90% and its energy consumption by as much as 50%. For this reason, a new class of low environmental impact construction materials named “eco-material” are becoming increasingly important in the struggle against climate change. A European funded collaborative project ISOBIO coordinated by TWI is aimed at taking a radical approach to the use of bio-based aggregates to create novel construction materials that are usable in high volume in using traditional methods, as well as developing markets such as exterior insulation of existing house stocks. The approach taken for this project is to use finely chopped material protected from bio-degradation through the use of functionalized silica nanoparticles. TWI is exploring the development of novel inorganic-organic hybrid nano-materials, to be applied as a surface treatment onto bio-based aggregates. These nanoparticles are synthesized by sol-gel processing and then functionalised with silanes to impart multifunctionality e.g. hydrophobicity, fire resistance and chemical bonding between the silica nanoparticles and the bio-based aggregates. This talk will illustrate the approach taken by TWI to design the functionalized silica nanoparticles by using a material-by-design approach. The formulation and synthesize process will be presented together with the challenges addressed by those hybrid nano-materials. The results obtained with regards to the water repellence and fire resistance will be displayed together with preliminary public results of the ISOBIO project. (This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 641927).Keywords: bio-sourced material, composite material, durable insulation panel, water repellent material
Procedia PDF Downloads 2372682 Enhanced Dielectric and Ferroelectric Properties in Holmium Substituted Stoichiometric and Non-Stoichiometric SBT Ferroelectric Ceramics
Authors: Sugandha Gupta, Arun Kumar Jha
Abstract:
A large number of ferroelectric materials have been intensely investigated for applications in non-volatile ferroelectric random access memories (FeRAMs), piezoelectric transducers, actuators, pyroelectric sensors, high dielectric constant capacitors, etc. Bismuth layered ferroelectric materials such as Strontium Bismuth Tantalate (SBT) has attracted a lot of attention due to low leakage current, high remnant polarization and high fatigue endurance up to 1012 switching cycles. However, pure SBT suffers from various major limitations such as high dielectric loss, low remnant polarization values, high processing temperature, bismuth volatilization, etc. Significant efforts have been made to improve the dielectric and ferroelectric properties of this compound. Firstly, it has been reported that electrical properties vary with the Sr/ Bi content ratio in the SrBi2Ta2O9 compsition i.e. non-stoichiometric compositions with Sr-deficient / Bi excess content have higher remnant polarization values than stoichiometic SBT compositions. With the objective to improve structural, dielectric, ferroelectric and piezoelectric properties of SBT compound, rare earth holmium (Ho3+) was chosen as a donor cation for substitution onto the Bi2O2 layer. Moreover, hardly any report on holmium substitution in stoichiometric SrBi2Ta2O9 and non-stoichiometric Sr0.8Bi2.2Ta2O9 compositions were available in the literature. The holmium substituted SrBi2-xHoxTa2O9 (x= 0.00-2.0) and Sr0.8Bi2.2Ta2O9 (x=0.0 and 0.01) compositions were synthesized by the solid state reaction method. The synthesized specimens were characterized for their structural and electrical properties. X-ray diffractograms reveal single phase layered perovskite structure formation for holmium content in stoichiometric SBT samples up to x ≤ 0.1. The granular morphology of the samples was investigated using scanning electron microscope (Hitachi, S-3700 N). The dielectric measurements were carried out using a precision LCR meter (Agilent 4284A) operating at oscillation amplitude of 1V. The variation of dielectric constant with temperature shows that the Curie temperature (Tc) decreases on increasing the holmium content. The specimen with x=2.0 i.e. the bismuth free specimen, has very low dielectric constant and does not show any appreciable variation with temperature. The dielectric loss reduces significantly with holmium substitution. The polarization–electric field (P–E) hysteresis loops were recorded using a P–E loop tracer based on Sawyer–Tower circuit. It is observed that the ferroelectric property improve with Ho substitution. Holmium substituted specimen exhibits enhanced value of remnant polarization (Pr= 9.22 μC/cm²) as compared to holmium free specimen (Pr= 2.55 μC/cm²). Piezoelectric co-efficient (d33 values) was measured using a piezo meter system (Piezo Test PM300). It is observed that holmium substitution enhances piezoelectric coefficient. Further, the optimized holmium content (x=0.01) in stoichiometric SrBi2-xHoxTa2O9 composition has been substituted in non-stoichiometric Sr0.8Bi2.2Ta2O9 composition to obtain further enhanced structural and electrical characteristics. It is expected that a new class of ferroelectric materials i.e. Rare Earth Layered Structured Ferroelectrics (RLSF) derived from Bismuth Layered Structured Ferroelectrics (BLSF) will generate which can be used to replace static (SRAM) and dynamic (DRAM) random access memories with ferroelectric random access memories (FeRAMS).Keywords: dielectrics, ferroelectrics, piezoelectrics, strontium bismuth tantalate
Procedia PDF Downloads 2092681 Deregulation of Turkish State Railways Based on Public-Private Partnership Approaches
Authors: S. Shakibaei, P. Alpkokin
Abstract:
The railway network is one of the major components of a transportation system in a country which may be an indicator of the country’s level of economic improvement. Since 2000s on, revival of national railways and development of High Speed Rail (HSR) lines are one of the most remarkable policies of Turkish government in railway sector. Within this trend, the railway age is to be revived and coming decades will be a golden opportunity. Indubitably, major infrastructures such as road and railway networks require sizeable investment capital, precise maintenance and reparation. Traditionally, governments are held responsible for funding, operating and maintaining these infrastructures. However, lack or shortage of financial resources, risk responsibilities (particularly cost and time overrun), and in some cases inefficacy in constructional, operational and management phases persuade governments to find alternative options. Financial power, efficient experiences and background of private sector are the factors convincing the governments to make a collaboration with private parties to develop infrastructures. Public-Private Partnerships (PPP or 3P or P3) and related regulatory issues are born considering these collaborations. In Turkey, PPP approaches have attracted attention particularly during last decade and these types of investments have been accelerated by government to overcome budget limitations and cope with inefficacy of public sector in improving transportation network and its operation. This study mainly tends to present a comprehensive overview of PPP concept, evaluate the regulatory procedure in Europe and propose a general framework for Turkish State Railways (TCDD) as an outlook on privatization, liberalization and deregulation of railway network.Keywords: deregulation, high-speed railway, liberalization, privatization, public-private partnership
Procedia PDF Downloads 1712680 Repository Blockchain for Collaborative Blockchain Ecosystem
Authors: Razwan Ahmed Tanvir, Greg Speegle
Abstract:
Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction security. We provide a model that uses a repository blockchain to manage hard forks within a collaborative system such that a single process (assuming that it has knowledge of the requirements of each fork) can access all of the blocks within the system. The repository blockchain replaces the need for Inter Blockchain Communication (IBC) within the ecosystem by navigating the networks. The resulting construction resembles a tree instead of a chain. A proof-of-concept implementation performs a depth-first search on the new structure.Keywords: hard fork, shared governance, inter blockchain communication, blockchain ecosystem, regular research paper
Procedia PDF Downloads 172679 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 3202678 Factors Associated with Involvement in Physical Activity among Children (Aged 6-18 Years) Training at Excel Soccer Academy in Uganda
Authors: Syrus Zimaze, George Nsimbe, Valley Mugwanya, Matiya Lule, Edgar Watson, Patrick Gwayambadde
Abstract:
Physical inactivity is a growing global epidemic, also recognised as a major public health challenge. Globally, there are alarming rates of children reported with cardiovascular disease and obesity with limited interventions. In Sub Saharan Africa, there is limited information about involvement in physical activity especially among children aged 6 to 18 years. The aim of this study was to explore factors associated with involvement in physical activity among children in Uganda. Methods: We included all parents with children aged 6 to 18 years training with Excel Soccer Academy between January 2017 and June 2018. Physical activity definition was time spent participating in routine soccer training at the academy for more than 30 days. Each child's attendance was recorded, and parents provided demographic and social economic data. Data on predictors of physical activity involvement were collected using a standardized questionnaire. Descriptive statistics and frequency were used. Binary logistic regression was used at the multi variable level adjusting for education, residence, transport means and access to information technology. Results: Overall 356 parents were interviewed; Boys 318 (89.3%) engaged more in physical activity than girls. The median age for children was 13 years (IQR:6-18) and 42 years (IQR:37-49) among parents. The median time spent at the Excel soccer academy was 13.4 months (IQR: 4.6-35.7) Majority of the children attended formal education, p < 0.001). Factors associated with involvement in physical activity included: owning a permanent house compared to a rented house (odds ratio [OR] :2.84: 95% CI: 2.09-3.86, p < 0.0001), owning a car compared to using public transport (OR: 5.64 CI: 4.80-6.63, p < 0.0001), a parent having received formal education compared to non-formal education (OR: 2.93 CI: 2.47-3.46, p < 0.0001) and daily access to information technology (OR:0.40 CI:0.25-0.66, p < 0.001). Parent’s age and gender were not associated to involvement in physical activity. Conclusions: Socioeconomic factors were positively associated with involvement in physical activity with boys participating more than girls in soccer activities. More interventions are required geared towards increasing girl’s participation in physical activity and those targeting children from less privilege homes.Keywords: physical activity, Sub-Saharan Africa, social economic factors, children
Procedia PDF Downloads 1662677 Review on Effective Texture Classification Techniques
Authors: Sujata S. Kulkarni
Abstract:
Effective and efficient texture feature extraction and classification is an important problem in image understanding and recognition. This paper gives a review on effective texture classification method. The objective of the problem of texture representation is to reduce the amount of raw data presented by the image, while preserving the information needed for the task. Texture analysis is important in many applications of computer image analysis for classification include industrial and biomedical surface inspection, for example for defects and disease, ground classification of satellite or aerial imagery and content-based access to image databases.Keywords: compressed sensing, feature extraction, image classification, texture analysis
Procedia PDF Downloads 4352676 Good Advice Is Hard to Come By: A Cross-Cultural Perspective on Opposing Views and Entrepreneurial Passion
Authors: Marcel Hechler
Abstract:
The purpose of this study is to understand the impact of entrepreneurs' receptiveness to opposing views on their entrepreneurial passion. Following a cross-cultural approach, we surveyed 1,228 entrepreneurs in seven developing and emerging countries. Besides a positive relationship between receptiveness to opposing views and harmonious passion for entrepreneurship, we found first evidence for a significant moderating effect of access to information reinforcing the positive main effect.Keywords: harmonious passion, developing and emerging countries, self-determination theory, receptiveness to opposing views
Procedia PDF Downloads 2102675 Crowdsensing Project in the Brazilian Municipality of Florianópolis for the Number of Visitors Measurement
Authors: Carlos Roberto De Rolt, Julio da Silva Dias, Rafael Tezza, Luca Foschini, Matteo Mura
Abstract:
The seasonal population fluctuation presents a challenge to touristic cities since the number of inhabitants can double according to the season. The aim of this work is to develop a model that correlates the waste collected with the population of the city and also allow cooperation between the inhabitants and the local government. The model allows public managers to evaluate the impact of the seasonal population fluctuation on waste generation and also to improve planning resource utilization throughout the year. The study uses data from the company that collects the garbage in Florianópolis, a Brazilian city that presents the profile of a city that attracts tourists due to numerous beaches and warm weather. The fluctuations are caused by the number of people that come to the city throughout the year for holidays, summer time vacations or business events. Crowdsensing will be accomplished through smartphones with access to an app for data collection, with voluntary participation of the population. Crowdsensing participants can access information collected in waves for this portal. Crowdsensing represents an innovative and participatory approach which involves the population in gathering information to improve the quality of life. The management of crowdsensing solutions plays an essential role given the complexity to foster collaboration, establish available sensors and collect and process the collected data. Practical implications of this tool described in this paper refer, for example, to the management of seasonal tourism in a large municipality, whose public services are impacted by the floating of the population. Crowdsensing and big data support managers in predicting the arrival, permanence, and movement of people in a given urban area. Also, by linking crowdsourced data to databases from other public service providers - e.g., water, garbage collection, electricity, public transport, telecommunications - it is possible to estimate the floating of the population of an urban area affected by seasonal tourism. This approach supports the municipality in increasing the effectiveness of resource allocation while, at the same time, increasing the quality of the service as perceived by citizens and tourists.Keywords: big data, dashboards, floating population, smart city, urban management solutions
Procedia PDF Downloads 2872674 The Influence of Activity Selection and Travel Distance on Forest Recreation Policies
Authors: Mark Morgan, Christine Li, Shuangyu Xu, Jenny McCarty
Abstract:
The National Wild and Scenic Rivers System was created by the U.S. Congress in 1968 (Public Law 90-542; 16 U.S.C. 1271 et seq.) to preserve outstanding natural, cultural, and recreational values of some U.S. rivers in a free-flowing condition for the enjoyment of present and future generations. This Act is notable for safeguarding the special character of these rivers while supporting management action that encourages public participation for co-creating river protection goals and strategies. This is not an easy task. To meet the challenges of modern ecosystem management, federal resource agencies must address many legal, environmental, economic, political, and social issues. The U.S. Forest Service manages a 44-mile section of the Eleven Point National Scenic River (EPR) in southern Missouri, mainly for outdoor recreation purposes. About half of the acreage is in private lands, while the remainder flows through the Mark Twain National Forest. Private land along the river is managed by scenic easements to ensure protection of scenic values and natural resources, without public access. A portion of the EPR lies adjacent to a 16,500-acre tract known as the Irish Wilderness. The spring-fed river has steep bluffs, deep pools, clear water, and a slow current, making it an ideal setting for outdoor enthusiasts. A 10-month visitor study was conducted at five access points along the EPR during 2019 so the US Forest Service could update their river management plan. A mail-back survey was administered to 560 on-site visitors, yielding a response rate of 53%. Although different types of visitors use the EPR, boating and fishing were the predominant forms of outdoor recreation. Some river use was from locals, but other visitors came from farther away. Formulating unbiased policies for outdoor recreation is difficult because managers must assign relative values to recreational activities and travel distance. Because policymaking is a subjective process, management decisions can affect user groups in different ways (i.e., boaters vs. fishers; proximate vs. distal visitors), as seen through a GIS analysis.Keywords: activity selection, forest recreation, policy, travel distance
Procedia PDF Downloads 1402673 Modeling Average Paths Traveled by Ferry Vessels Using AIS Data
Authors: Devin Simmons
Abstract:
At the USDOT’s Bureau of Transportation Statistics, a biannual census of ferry operators in the U.S. is conducted, with results such as route mileage used to determine federal funding levels for operators. AIS data allows for the possibility of using GIS software and geographical methods to confirm operator-reported mileage for individual ferry routes. As part of the USDOT’s work on the ferry census, an algorithm was developed that uses AIS data for ferry vessels in conjunction with known ferry terminal locations to model the average route travelled for use as both a cartographic product and confirmation of operator-reported mileage. AIS data from each vessel is first analyzed to determine individual journeys based on the vessel’s velocity, and changes in velocity over time. These trips are then converted to geographic linestring objects. Using the terminal locations, the algorithm then determines whether the trip represented a known ferry route. Given a large enough dataset, routes will be represented by multiple trip linestrings, which are then filtered by DBSCAN spatial clustering to remove outliers. Finally, these remaining trips are ready to be averaged into one route. The algorithm interpolates the point on each trip linestring that represents the start point. From these start points, a centroid is calculated, and the first point of the average route is determined. Each trip is interpolated again to find the point that represents one percent of the journey’s completion, and the centroid of those points is used as the next point in the average route, and so on until 100 points have been calculated. Routes created using this algorithm have shown demonstrable improvement over previous methods, which included the implementation of a LOESS model. Additionally, the algorithm greatly reduces the amount of manual digitizing needed to visualize ferry activity.Keywords: ferry vessels, transportation, modeling, AIS data
Procedia PDF Downloads 1762672 Context, Challenges, Constraints and Strategies of Non-Profit Organisations in Responding to the Needs of Asylum Seekers and Refugees in Cape Town, South Africa
Authors: C. O’Brien, Chloe Reiss
Abstract:
While South Africa has been the chosen host country for over 1,2 million asylum seekers/refugees it has at the same time, been struggling to address the needs of its own people who are still trapped in poverty with little prospects of employment. This limited exploratory, qualitative study was undertaken in Cape Town with a purposive sample of 21 key personnel from various NPOs providing a service to asylum seekers/refugees. Individual in-depth face to face interviews were carried out and the main findings were: Some of the officials at the Department of Home Affairs, health personnel, landlords, school principals, employers, bank officials and police officers were prejudicial in their practices towards asylum seekers/ refugees. The major constraints experienced by NPOs in this study were linked to a lack of funding and minimal government support, strained relationship with the Department of Home Affairs and difficulties in accessing refugees. And finally, the strategies adopted by these NPOs included networking with other service providers, engaging in advocacy, raising community awareness and liaising with government. Thus, more focused intervention strategies are needed to build social cohesion, address prejudices which fuels xenophobic attacks and raise awareness/educate various sectors about refugee rights. Given this burgeoning global problem, social work education and training should include curriculum content on migrant issues. Furthermore, larger studies using mixed methodology approaches would yield more nuanced data and provide for more strategic interventions.Keywords: refugees and asylum seekers, constraints of service delivery, non-profit organisations, refugee challenges
Procedia PDF Downloads 2052671 Solar-Electric Pump-out Boat Technology: Impacts on the Marine Environment, Public Health, and Climate Change
Authors: Joy Chiu, Colin Hemez, Emma Ryan, Jia Sun, Robert Dubrow, Michael Pascucilla
Abstract:
The popularity of recreational boating is on the rise in the United States, which raises numerous national-level challenges in the management of air and water pollution, aquatic habitat destruction, and waterway access. The need to control sewage discharge from recreational vessels underlies all of these challenges. The release of raw human waste into aquatic environments can lead to eutrophication and algal blooms; can increase human exposure to pathogenic viruses, bacteria, and parasites; can financially impact commercial shellfish harvest/fisheries and marine bathing areas; and can negatively affect access to recreational and/or commercial waterways to the detriment of local economies. Because of the damage that unregulated sewage discharge can do to environments and human health/marine life, recreational vessels in the United States are required by law to 'pump-out' sewage from their holding tanks into sewage treatment systems in all designated 'no discharge areas'. Many pump-out boats, which transfer waste out of recreational vessels, are operated and maintained using funds allocated through the Federal Clean Vessel Act (CVA). The East Shore District Health Department of Branford, Connecticut is protecting this estuary by pioneering the design and construction of the first-in-the-nation zero-emissions, the solar-electric pump-out boat of its size to replace one of its older traditional gasoline-powered models through a Connecticut Department of Energy and Environmental Protection CVA Grant. This study, conducted in collaboration with the East Shore District Health Department, the Connecticut Department of Energy and Environmental Protection, States Organization for Boating Access and Connecticut’s CVA program coordinators, had two aims: (1) To perform a national assessment of pump-out boat programs, supplemented by a limited international assessment, to establish best pump-out boat practices (regardless of how the boat is powered); and (2) to estimate the cost, greenhouse gas emissions, and environmental and public health impacts of solar-electric versus traditional gasoline-powered pump-out boats. A national survey was conducted of all CVA-funded pump-out program managers and selected pump-out boat operators to gauge best practices; costs associated with gasoline-powered pump-out boat operation and management; and the regional, cultural, and policy-related issues that might arise from the adoption of solar-electric pump-out boat technology. We also conducted life-cycle analyses of gasoline-powered and solar-electric pump-out boats to compare their greenhouse gas emissions; production of air, soil and water pollution; and impacts on human health. This work comprises the most comprehensive study into pump-out boating practices in the United States to date, in which information obtained at local, state, national, and international levels is synthesized. This study aims to enable CVA programs to make informed recommendations for sustainable pump-out boating practices and identifies the challenges and opportunities that remain for the wide adoption of solar-electric pump-out boat technology.Keywords: pump-out boat, marine water, solar-electric, zero emissions
Procedia PDF Downloads 1282670 Predicting Daily Patient Hospital Visits Using Machine Learning
Authors: Shreya Goyal
Abstract:
The study aims to build user-friendly software to understand patient arrival patterns and compute the number of potential patients who will visit a particular health facility for a given period by using a machine learning algorithm. The underlying machine learning algorithm used in this study is the Support Vector Machine (SVM). Accurate prediction of patient arrival allows hospitals to operate more effectively, providing timely and efficient care while optimizing resources and improving patient experience. It allows for better allocation of staff, equipment, and other resources. If there's a projected surge in patients, additional staff or resources can be allocated to handle the influx, preventing bottlenecks or delays in care. Understanding patient arrival patterns can also help streamline processes to minimize waiting times for patients and ensure timely access to care for patients in need. Another big advantage of using this software is adhering to strict data protection regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States as the hospital will not have to share the data with any third party or upload it to the cloud because the software can read data locally from the machine. The data needs to be arranged in. a particular format and the software will be able to read the data and provide meaningful output. Using software that operates locally can facilitate compliance with these regulations by minimizing data exposure. Keeping patient data within the hospital's local systems reduces the risk of unauthorized access or breaches associated with transmitting data over networks or storing it in external servers. This can help maintain the confidentiality and integrity of sensitive patient information. Historical patient data is used in this study. The input variables used to train the model include patient age, time of day, day of the week, seasonal variations, and local events. The algorithm uses a Supervised learning method to optimize the objective function and find the global minima. The algorithm stores the values of the local minima after each iteration and at the end compares all the local minima to find the global minima. The strength of this study is the transfer function used to calculate the number of patients. The model has an output accuracy of >95%. The method proposed in this study could be used for better management planning of personnel and medical resources.Keywords: machine learning, SVM, HIPAA, data
Procedia PDF Downloads 652669 Public Policy and Sexuality Education for Youth with Disabilities: Impact on Sexual Behavior and Outcomes
Authors: Alexandra M. Kriofske Mainella
Abstract:
This paper will examine the need for more aggressive public policies around bodily, reproductive and sexual health education for young people with disabilities in the United States. This paper will consider the policies around sexuality education for students in the United States and the recommendation for national standards around sexuality education. We will investigate the intersection of these policies and recommendations for students with disabilities and the Individuals with Disabilities Education Act (IDEA): what this means for students with disabilities’ access to comprehensive sexuality education and how it affects their behaviors and outcomes.Keywords: disability, sexuality, education, policy
Procedia PDF Downloads 4372668 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation
Authors: Suman Podder
Abstract:
As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.Keywords: consumer data right, innovation, open banking, privacy safeguards
Procedia PDF Downloads 1402667 Transportation Mode Choice Analysis for Accessibility of the Mehrabad International Airport by Statistical Models
Authors: Navid Mirzaei Varzeghani, Mahmoud Saffarzadeh, Ali Naderan, Amirhossein Taheri
Abstract:
Countries are progressing, and the world's busiest airports see year-on-year increases in travel demand. Passenger acceptability of an airport depends on the airport's appeals, which may include one of these routes between the city and the airport, as well as the facilities to reach them. One of the critical roles of transportation planners is to predict future transportation demand so that an integrated, multi-purpose system can be provided and diverse modes of transportation (rail, air, and land) can be delivered to a destination like an airport. In this study, 356 questionnaires were filled out in person over six days. First, the attraction of business and non-business trips was studied using data and a linear regression model. Lower travel costs, a range of ages more significant than 55, and other factors are essential for business trips. Non-business travelers, on the other hand, have prioritized using personal vehicles to get to the airport and ensuring convenient access to the airport. Business travelers are also less price-sensitive than non-business travelers regarding airport travel. Furthermore, carrying additional luggage (for example, more than one suitcase per person) undoubtedly decreases the attractiveness of public transit. Afterward, based on the manner and purpose of the trip, the locations with the highest trip generation to the airport were identified. The most famous district in Tehran was District 2, with 23 visits, while the most popular mode of transportation was an online taxi, with 12 trips from that location. Then, significant variables in separation and behavior of travel methods to access the airport were investigated for all systems. In this scenario, the most crucial factor is the time it takes to get to the airport, followed by the method's user-friendliness as a component of passenger preference. It has also been demonstrated that enhancing public transportation trip times reduces private transportation's market share, including taxicabs. Based on the responses of personal and semi-public vehicles, the desire of passengers to approach the airport via public transportation systems was explored to enhance present techniques and develop new strategies for providing the most efficient modes of transportation. Using the binary model, it was clear that business travelers and people who had already driven to the airport were the least likely to change.Keywords: multimodal transportation, demand modeling, travel behavior, statistical models
Procedia PDF Downloads 1732666 Big Data: Concepts, Technologies and Applications in the Public Sector
Authors: A. Alexandru, C. A. Alexandru, D. Coardos, E. Tudora
Abstract:
Big Data (BD) is associated with a new generation of technologies and architectures which can harness the value of extremely large volumes of very varied data through real time processing and analysis. It involves changes in (1) data types, (2) accumulation speed, and (3) data volume. This paper presents the main concepts related to the BD paradigm, and introduces architectures and technologies for BD and BD sets. The integration of BD with the Hadoop Framework is also underlined. BD has attracted a lot of attention in the public sector due to the newly emerging technologies that allow the availability of network access. The volume of different types of data has exponentially increased. Some applications of BD in the public sector in Romania are briefly presented.Keywords: big data, big data analytics, Hadoop, cloud
Procedia PDF Downloads 3112665 Key Concepts of 5th Generation Mobile Technology
Authors: Magri Hicham, Noreddine Abghour, Mohamed Ouzzif
Abstract:
The 5th generation of mobile networks is term used in various research papers and projects to identify the next major phase of mobile telecommunications standards. 5G wireless networks will support higher peak data rate, lower latency and provide best connections with QoS guarenty. In this article, we discuss various promising technologies for 5G wireless communication systems, such as IPv6 support, World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud Computing and cognitive radio technology.Keywords: WWWW, BDMA, DAWN, 5G, 4G, IPv6, Cloud Computing
Procedia PDF Downloads 5142664 Cross-Cultural Study of Stroop Interference among Juvenile Delinquents
Authors: Tanusree Moitra, Garga Chatterjee, Diganta Mukherjee, Anjali Ghosh
Abstract:
Stroop task is considered to be an important measure of selective attention. However, the color – word Stroop task cannot be administered to the illiterate population. Some of the participants in the present study are illiterate, therefore, object – color Stroop task was used among male juvenile delinquents of India and Bangladesh citizenship (IC & BC), housed in delinquent home in India. The purpose of the study is to test the hypothesis that over - selective attention is present among juvenile delinquents across both the countries. Eighty juvenile delinquents and matched control of 12 – 18 years (50 IC juvenile delinquents, 30 BC juvenile delinquents and 50 Indian control) were shown 24 familiar objects in both typical (e.g. a red apple) and atypical (e.g. a blue apple) color. Repeated – measure factorial ANOVA was used and it was found that all the three groups have taken longer response time in the atypical condition compared to the typical condition. However, contrary to the over - selective attention hypothesis, both groups of juvenile delinquents displayed higher Stroop interference in comparison to the matched control group. The findings of the study can be explained on the basis of anxiety score. IC and BC juvenile delinquents have high anxiety score compared to the control group which indicates that increased anxiety is correlated with the interference produced by the atypical color object stimuli when compared with the typical object stimuli. Funding acknowledgement: Authors acknowledge Department of Science and Technology, Government of India for financial support to the first author of the paper vide Reference no. SR/CSRI/PDF -01/2013 under Cognitive Science Research Initiative (CSRI) to carry out this work.Keywords: Bangladesh, India, male juvenile delinquent, objects - color Stroop task
Procedia PDF Downloads 3432663 Inappropriate Effects Which the Use of Computer and Playing Video Games Have on Young People
Authors: Maja Ruzic-Baf, Mirjana Radetic-Paic
Abstract:
The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games. The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games.Keywords: addiction to video games, behaviour, ICT, young people
Procedia PDF Downloads 5452662 International Relations and the Transformation of Political Regimes in Post-Soviet States
Authors: Sergey Chirun
Abstract:
Using of a combination of institutional analysis and network access has allowed the author to identify the characteristics of the informal institutions of regional political power and political regimes. According to the author, ‘field’ of activity of post-Soviet regimes, formed under the influence of informal institutions, often contradicts democratic institutional regional changes which are aimed at creating of a legal-rational type of political domination and balanced model of separation of powers. This leads to the gap between the formal structure of institutions and the real nature of power, predetermining the specific character of the existing political regimes.Keywords: authoritarianism, institutions, political regime, social networks, transformation
Procedia PDF Downloads 4912661 Study of Incubation Centres and Its Role in Fostering Entrepreneurship in India with Special Reference to Centres Set up in IIMs/IITs
Authors: Kalpeshkumar L. Gupta, Shivali Rathore
Abstract:
India is home to over 30 crore rural poor, aware of the criticality of the situation that has made to come with an innovative business idea. Entrepreneurship in India is on the verge of explosive growth and which is actually need of an hour for employment generation, poverty elevation at grass root through developmental intervention. India economic progress has started from the development of its small and medium scale enterprises to ensure that the sectors continues to stay competitive and achieve sustained growth in the era of global economy many incubators centers has been established with the mission to give the encouragement to many innovative ideas. If we define an Incubator, it is simply an enclosed apparatus in which premature small babies are placed and which provides a controlled and protective environment for their care this gives them a chance to adjust to outside environment, and grow stronger before they face the outside world. In a similar way the startup entrepreneur’s business idea is incubated in the incubation centers. Entrepreneurship has been conventionally rated as risky career, to break the myth and to augment the supply of new entrepreneurs through education; research training the incubation centers has been established, their goal is to help create and grow young businesses by providing them with necessary support and financial and technical services. The startup companies spend on an average two years in a business incubator during which numerous benefits like funding, office space, equipment’s etc. is provided by the incubators to the startup business. Present paper will study the background, role, objectives of different incubators set up in Indian Institute of Management (IIMs) and Indian Institute of Technology (IITs) for our study.Keywords: incubation centres, entrepreneurship, Indian Institute of Management, Indian Institute of Technology
Procedia PDF Downloads 2622660 Data Access, AI Intensity, and Scale Advantages
Authors: Chuping Lo
Abstract:
This paper presents a simple model demonstrating that ceteris paribus countries with lower barriers to accessing global data tend to earn higher incomes than other countries. Therefore, large countries that inherently have greater data resources tend to have higher incomes than smaller countries, such that the former may be more hesitant than the latter to liberalize cross-border data flows to maintain this advantage. Furthermore, countries with higher artificial intelligence (AI) intensity in production technologies tend to benefit more from economies of scale in data aggregation, leading to higher income and more trade as they are better able to utilize global data.Keywords: digital intensity, digital divide, international trade, scale of economics
Procedia PDF Downloads 682659 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 2062658 Legal Issues of Food Security in Republic of Kazakhstan
Authors: G. T. Aigarinova
Abstract:
This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it.Keywords: food security, national security, agriculture, public resources, economic security
Procedia PDF Downloads 4252657 A Rapid Code Acquisition Scheme in OOC-Based CDMA Systems
Authors: Keunhong Chae, Seokho Yoon
Abstract:
We propose a code acquisition scheme called improved multiple-shift (IMS) for optical code division multiple access systems, where the optical orthogonal code is used instead of the pseudo noise code. Although the IMS algorithm has a similar process to that of the conventional MS algorithm, it has a better code acquisition performance than the conventional MS algorithm. We analyze the code acquisition performance of the IMS algorithm and compare the code acquisition performances of the MS and the IMS algorithms in single-user and multi-user environments.Keywords: code acquisition, optical CDMA, optical orthogonal code, serial algorithm
Procedia PDF Downloads 5402656 Barriers and Challenges to a Healthy Lifestyle for Postpartum Women and the Possibilities in an Information Technology-Based Intervention: A Qualitative Study
Authors: Pernille K. Christiansen, Mette Maria Skjøth, Line Lorenzen, Eva Draborg, Christina Anne Vinter, Trine Kjær, Mette Juel Rothmann
Abstract:
Background and aims: Overweight and obesity are an increasing challenge on a global level. In Denmark, more than one-third of all pregnant women are overweight or obese, and many women exceed the gestational weight gain recommendations from the Institute of Medicine. Being overweight or obese, is associated with a higher risk of adverse maternal and fetal outcomes, including gestational diabetes and childhood obesity. Thus, it is important to focus on the women’s lifestyles between their pregnancies to lower the risk of gestational weight retention in the long run. The objective of this study was to explorer what barriers and challenges postpartum women experience with respect to healthy lifestyles during the postpartum period and to access whether an Information Technology based intervention might be a supportive tool to assist and motivate postpartum women to a healthy lifestyle. Materials and methods: The method is inspired by participatory design. A systematic text condensation was applied to semi-structured focus groups. Five focus group interviews were carried out with a total of 17 postpartum women and two interviews with a total of six health professionals. Participants were recruited through the municipality in Svendborg, Denmark, and at Odense University Hospital in Odense, Denmark, during a four-month period in early 2018. Results: From the women’s perspective, better assistance is needed from the health professionals to obtain or maintain a healthy lifestyle. The women need tools that inform and help them understand and prioritise their own health-related risks, and to motivate them to plan and take care of their own health. As the women use Information Technology on a daily basis, the solution could be delivered through Information Technology. Finally, there is room for engaging the partner more in the communication related to the baby and family’s lifestyle. Conclusion: Postpartum women need tools that inform and motivate a healthy lifestyle postpartum. The tools should allow access to high-quality information from health care professionals, when the information is needed, and also allow engagement from the partner. Finally, Information Technology is a potential tool for delivering tools.Keywords: information technology, lifestyle, overweight, postpartum
Procedia PDF Downloads 1472655 Formation of the Investment Portfolio of Intangible Assets with a Wide Pairwise Comparison Matrix Application
Authors: Gulnara Galeeva
Abstract:
The Analytic Hierarchy Process is widely used in the economic and financial studies, including the formation of investment portfolios. In this study, a generalized method of obtaining a vector of priorities for the case with separate pairwise comparisons of the expert opinion being presented as a set of several equal evaluations on a ratio scale is examined. The author claims that this method allows solving an important and up-to-date problem of excluding vagueness and ambiguity of the expert opinion in the decision making theory. The study describes the authentic wide pairwise comparison matrix. Its application in the formation of the efficient investment portfolio of intangible assets of a small business enterprise with limited funding is considered. The proposed method has been successfully approbated on the practical example of a functioning dental clinic. The result of the study confirms that the wide pairwise comparison matrix can be used as a simple and reliable method for forming the enterprise investment policy. Moreover, a comparison between the method based on the wide pairwise comparison matrix and the classical analytic hierarchy process was conducted. The results of the comparative analysis confirm the correctness of the method based on the wide matrix. The application of a wide pairwise comparison matrix also allows to widely use the statistical methods of experimental data processing for obtaining the vector of priorities. A new method is available for simple users. Its application gives about the same accuracy result as that of the classical hierarchy process. Financial directors of small and medium business enterprises get an opportunity to solve the problem of companies’ investments without resorting to services of analytical agencies specializing in such studies.Keywords: analytic hierarchy process, decision processes, investment portfolio, intangible assets
Procedia PDF Downloads 265