Search results for: performance vs. security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15386

Search results for: performance vs. security

14246 The Impact of Health Tourism on Companies’ Performance: A Cross Country Analysis

Authors: Anna Paola Micheli, Carmelo Intrisano, Anna Maria Calce

Abstract:

This research focused on the capability of health tourism to improve the economic and financial performance of healthcare companies. It is assumed that health tourism companies have better profitability and financial efficiency because they can also count on cross-border demand differently from no health tourism companies. A three-level gap analysis was conducted: the first concerns health tourism companies located in Italy and in the other EU28 states; in the second Italian and EU28, no health tourism companies were compared; the third level is about the Italian system with a comparison between health tourism and no health tourism companies. Findings highlighted that Italian healthcare companies have better profitability performance if compared to European ones, but they present weaknesses in the financial position given the illiquidity and excessive leverage. Furthermore, studying the Italian system, we found that health tourism companies are more profitable than no health tourism companies.

Keywords: financial performance, gap analysis, health tourism, profitability performance, value creation

Procedia PDF Downloads 229
14245 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy

Authors: J.T. Chivanga

Abstract:

This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.

Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora

Procedia PDF Downloads 242
14244 The Influence of Strategic Networks and Logistics Integration on Company Performance among Small and Medium Enterprises

Authors: Jeremiah Madzimure

Abstract:

In order to stay competitive in business and improve performance, Small and Medium Enterprises (SMEs) need to make use of business networking and logistics integration. Strategic networking and logistics integration in business companies have become critical as they allow supplier partnering, exchange of vital information/ access to valuable resources allowing innovation, gaining access to additional resources, sharing risks and costs which is required for enhancing company performance. The purpose of this study was to examine the influence of strategic networks and logistics integration on company performance: the case of small and medium enterprises in South Africa. A quantitative research design was adopted in this study, and 137 SMEs owners and managers completed and returned the survey questionnaire. Confirmatory Factor Analysis (CFA) was conducted using the Analysis of Moment Structures (AMOS), version 24.0 to assess psychometric properties of the measurement scales. Path modelling techniques were used to test the proposed hypothesis. Three research hypotheses were postulated. The results indicate that strategic networks had a positive and significant influence on logistics integration and company performance. As well logistics integration had a strong positive and significant influence on company performance. This study provides a useful model for analysing the relationship between strategic networks and logistics integration on company performance. Moreover, the findings of the study provide useful insights into how SMEs should benefit from business networking and logistics integration so as to improve their performance. The implications of the study are discussed, and finally, limitations and recommendations are indicated.

Keywords: strategic networking, logistics integration, company performance, SMEs

Procedia PDF Downloads 299
14243 Board of Directors' Structure and Corporate Restructuring: A Preliminary Evidences

Authors: Norazlan Alias, Mohd. Hasimi Yaacob

Abstract:

This study examines the impact of governance structure via corporate restructuring decision on selected firm characteristics and performance. Results of selected ratios that represent corporate decision, governance structure and performance in pre and post restructuring are analyzed for some conclusions. This study uses annual data of companies that are consistently listed on the Main Board of Bursa Malaysia and announced completed corporate restructuring. The results show that only debt ratio is significantly different before and after asset restructuring. This study concludes that firms do not view corporate restructuring namely asset restructuring as an opportunity to simultaneous enhance governance structure that could also contribute enhance firm performance and board of directors’ structure subsequent to asset restructuring only has significantly influence on changing capital structure but not on firm performance.

Keywords: board of directors, capital structure, corporate restructuring, performance

Procedia PDF Downloads 403
14242 Mindfulness, Reinvestment, and Rowing under Pressure: Evidence for Moderated Moderation of the Anxiety-Performance Relationship

Authors: Katherine Sparks, Christopher Ring

Abstract:

This study aimed to investigate whether dispositional sport-specific mindfulness moderated the moderation effect of conscious processing on the relationship between anxiety and rowing race performance. Using a sport-specific (Rowing-Specific) Reinvestment Scale (RSRS) to measure state conscious processing, we examined the effects of trait sport-related mindfulness on the conscious processes of rowers under competitive racing pressure at a number of UK regattas. 276 rowers completed a survey post competitive race. The survey included the RSRS, mindfulness, a perceived performance rating scale, demographic and race information to identify and record the rower’s actual race performance. Results from the research demonstrated that high levels of dispositional mindfulness are associated with a superior performance under pressure. In relation to the moderating moderation effect, conscious processing amplifies the detrimental effects of anxiety on performance. However, mindfulness, mindful awareness, and mindful non-judgement all proved to attenuate this amplification effect by moderating the conscious processing moderation on the anxiety-performance relationship. Therefore, this study provides initial support for the speculation that dispositional mindfulness can help prevent the deleterious effects of rowing-specific reinvestment under pressure.

Keywords: mindful, reinvestment, under pressure, performance, rowing

Procedia PDF Downloads 157
14241 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 61
14240 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 67
14239 Assessment of the Impact of CSR on the Business Performance of Australian Banks

Authors: Montoya C.A., Erina J., Erina I.

Abstract:

The purpose of this research is to assess the performance and impact of CSR on business in the banking sector in Australia by applying the financial indicators of 20 ASX banks for the period from 2016-2017. The authors carried out CSR assessment in several stages of research: 1) gathering the nonfinancial and financial indicators of 20 ASX listed banks (available were only 16) from the annual reports of Australian banks for 2016 and 2017; 2) calculation of bank performance indicators using such financial indicators as return on assets (ROA), return on equity (ROE), efficiency ratio and net interest margin; 3) analysis of financial data using cross-sectional regression and answers to the research questions. Based on the obtained research results, the authors obtained answers to the initially raised research questions and came to a conclusion that Q1 - Insignificant positive coefficient result - slight positive relationship between CSR disclosure and business performance 2016; Q2 - Insignificant negative coefficient result - slight negative relationship between CSR disclosure and business performance 2017; Q3 - Insignificant positive coefficient result - slight positive relationship between CSR disclosure and business performance.

Keywords: Australia, banks, business performance, CSR

Procedia PDF Downloads 75
14238 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 217
14237 The Potential of Small-Scale Urban Food Growing to Supplement Households’ Diets and Provide Health and Wellbeing Benefits

Authors: Bethany Leake, Samantha Caton, Paul Norman, Jill Edmondson

Abstract:

With the majority of the UK population residing in urban areas and with the pressures both environmentally and socially on rural agriculture, the role of urban food production, particularly urban horticulture (UH), is increasingly important in the future of UK food security. UH has the potential to provide an important contribution to urban diets and to provide additional benefits to human health and well-being. While allotments are the traditional focus of UH and play an important role, as access to this type of land is limited and unequal across cities, other forms of UH space, such as domestic growing, will need to be utilized to provide a significant contribution to urban diets. It is theorized that this smaller scale of growing may also be a more accessible way of engaging novice growers in UH. A collaborative research project, Urban Harvest, was designed between the University of Sheffield and Sheffield-based food organizations, which aimed to engage inexperienced gardeners in UH by providing them with home food-growing kits (Grow-Kits). Grow-Kits were provided to 189 participants across Sheffield in 2022, 48% of whom had never grown food before. Data collected through surveys and interviews will help us to evaluate the effect of small-scale food growing on health and wellbeing and the potential of this type of scheme to encourage future UH engagement. This data and increasing evidence on the co-benefits of UH have important implications not only for local food security but also for urban health inequalities and the potential use of this activity for preventative healthcare.

Keywords: urban horticulture, health and wellbeing, food security, nutrition

Procedia PDF Downloads 75
14236 The Mechanical Strength and Durability of High Performance Concrete Using Local Materials

Authors: I. Guemidi, Y. Abdelaziz, T. Rikioui

Abstract:

In this work, an experimental investigation was carried out to evaluate the mechanical and durability properties of high performance concretes (HPC) containing local southwest Algerian materials. The mechanical properties were assessed from the compressive strength and the flexural strength, whilst the durability characteristics were investigated in terms of sulphate attack. The results obtained allow us to conclude that it is possible to make a high performance concrete (HPC) based on existing materials in the local market, if these are carefully selected and properly mixed in such away to optimize grain size distribution.

Keywords: durability, high performance concrete, high strength, local materials, Southwest Algerian, sulphate attack

Procedia PDF Downloads 391
14235 The Development of Speaking Using Folk Tales Based on Performance Activities for Early Childhood Student

Authors: Yaowaluck Ruampol, Suthakorn Wasupokin

Abstract:

The research on the development of speaking using folk tales based on performance activities aimed to (1) study the development of speaking skill for early- childhood students, and (2) evaluate the development of speaking skill before and after speaking activities. Ten students of Kindergarten level 2, who have enrolled in the subject of the research for speaking development of semester 2 in 2013 were purposively selected as the research cohort. The research tools were lesson plans for speaking activities and pre-post test for speaking development that were approved as content validity and reliability (IOC=.66-1.00,α=0.967). The research found that the development of speaking skill of the research samples before using performance activities on folk tales in developing speaking skill was in the normal high level. Additionally, the results appeared that the preschoolers after applying speaking skill on performance activities also imaginatively created their speaking skill.

Keywords: speaking development, folk tales, performance activities, early-childhood students

Procedia PDF Downloads 342
14234 Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security

Authors: Rosmini Yanti, Safira Aviolita, Marsetio

Abstract:

Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.

Keywords: archipelago state, maritime law, maritime security, traffic separation scheme

Procedia PDF Downloads 129
14233 Cash Flow Position and Corporate Performance: A Study of Selected Manufacturing Companies in Nigeria

Authors: Uzoma Emmanuel Igboji

Abstract:

The study investigates the effects of cash flow position on corporate performance in the manufacturing sector of Nigeria, using multiple regression techniques. The study involved a survey of five (5) manufacturing companies quoted on the Nigerian Stock Exchange. The data were obtained from the annual reports of the selected companies under study. The result shows that operating and financing cash flow have a significant positive relationship with corporate performance, while investing cash flow position have a significant negative relationship. The researcher recommended that the regulatory authorities should encourage external auditors of these quoted companies to use cash flow ratios in evaluating the performance of a company before expressing an independent opinion on the financial statement. The will give detailed financial information to existing and potential investors to make informed economic decisions.

Keywords: cash flow, financing, performance, operating

Procedia PDF Downloads 316
14232 Performance Evaluation of Production Schedules Based on Process Mining

Authors: Kwan Hee Han

Abstract:

External environment of enterprise is rapidly changing majorly by global competition, cost reduction pressures, and new technology. In these situations, production scheduling function plays a critical role to meet customer requirements and to attain the goal of operational efficiency. It deals with short-term decision making in the production process of the whole supply chain. The major task of production scheduling is to seek a balance between customer orders and limited resources. In manufacturing companies, this task is so difficult because it should efficiently utilize resource capacity under the careful consideration of many interacting constraints. At present, many computerized software solutions have been utilized in many enterprises to generate a realistic production schedule to overcome the complexity of schedule generation. However, most production scheduling systems do not provide sufficient information about the validity of the generated schedule except limited statistics. Process mining only recently emerged as a sub-discipline of both data mining and business process management. Process mining techniques enable the useful analysis of a wide variety of processes such as process discovery, conformance checking, and bottleneck analysis. In this study, the performance of generated production schedule is evaluated by mining event log data of production scheduling software system by using the process mining techniques since every software system generates event logs for the further use such as security investigation, auditing and error bugging. An application of process mining approach is proposed for the validation of the goodness of production schedule generated by scheduling software systems in this study. By using process mining techniques, major evaluation criteria such as utilization of workstation, existence of bottleneck workstations, critical process route patterns, and work load balance of each machine over time are measured, and finally, the goodness of production schedule is evaluated. By using the proposed process mining approach for evaluating the performance of generated production schedule, the quality of production schedule of manufacturing enterprises can be improved.

Keywords: data mining, event log, process mining, production scheduling

Procedia PDF Downloads 280
14231 Social Media Factor in Security Environment

Authors: Cetin Arslan, Senol Tayan

Abstract:

Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.

Keywords: democracy, disorder, security, Social Media

Procedia PDF Downloads 367
14230 The Effect of Sustainable Supply Chain Management on Performance of Agricultural Firms in Nigeria

Authors: Haruna Daddau

Abstract:

This study investigates the effect of sustainable supply chain management (SSCM) on the performance of agricultural firms in Nigeria. Green packaging, product design, waste reduction and supply chain design were examined. The ecological modernization theory, which suggests the economic benefit of the environment, was used to underpin the study. The research is quantitative in nature, and a survey research method was adopted where information was obtained using questionnaires distributed directly to the top managers of 6 agricultural firms in Nigeria. STATA and SPSS were used for the data analysis, and regression analysis was used to examine the effects. Findings showed that SSCM positively improves the performance of the firms. Also, detailed information about the study’s selected variables' effect on performance was provided. Additionally, the significant role of SSCM in accelerating the firms’ performance was highlighted. It is recommended that SSCM should be given serious attention by integrating it into the overall firm's business strategy.

Keywords: sustainable supply chain management, green packaging, product design, waste reduction, supply chain design and performance

Procedia PDF Downloads 48
14229 Performance Analysis of Photovoltaic Solar Energy Systems

Authors: Zakariyya Hassan Abdullahi, Zainab Suleiman Abdullahi, Nuhu Alhaji Muhammad

Abstract:

In this paper, a thorough review of photovoltaic and photovoltaic thermal systems is done on the basis of its performance based on electrical as well as thermal output. Photovoltaic systems are classified according to their use, i.e., electricity production, and thermal, Photovoltaic systems behave in an extraordinary and useful way, they react to light by transforming part of it into electricity useful way and unique, since photovoltaic and thermal applications along with the electricity production. The application of various photovoltaic systems is also discussed in detail. The performance analysis including all aspects, e.g., electrical, thermal, energy, and energy efficiency are also discussed. A case study for PV and PV/T system based on energetic analysis is presented.

Keywords: photovoltaic, renewable, performance, efficiency, energy

Procedia PDF Downloads 517
14228 A Critical Review of Mechanization in Rice Farming in Indonesia

Authors: K. Suheiti, P. Soni, Yardha

Abstract:

Challenges ahead of Indonesian agricultural development include increasing rural welfare, food needs, and the provision of employment through resource optimization that are laid out in agribusiness system. The agricultural system also responsive to the changing strategic environment. However, mounting pressure of population increase and changes in land-uses, require intensive use of agricultural land with modern agricultural machinery. Similarly, environmentally friendly technologies should continue to be developed in an effort to build and develop a good farming practice model. This paper explains the development of agricultural mechanization in Indonesia, particularly on rice production. The method of the research was analyze secondary data, tabulation and interpretation. The result showed, there was a variety of tools and agricultural machinery that have been produced and used by farmers to support national food security. The role of mechanization was needed to support national rice production and food security achievement.

Keywords: farming, Indonesia, mechanization, rice

Procedia PDF Downloads 496
14227 Performance Comparison of Reactive, Proactive and Hybrid Routing Protocols in Wireless Ad Hoc Networks

Authors: Kumar Manoj, Ramesh Kumar, Kumari Arti, Kumar Prashant

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper we compare AODV, DSDV, DSR and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyses these routing protocols by extensive simulations in OPNET simulator and show that how pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, data traffic sent, throughput, retransmission attempts.

Keywords: MANET, AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 680
14226 Secured Power flow Algorithm Including Economic Dispatch with GSDF Matrix Using LabVIEW

Authors: Slimane Souag, Amel Graa, Farid Benhamida

Abstract:

In this paper we present a new method for solving the secured power flow problem by the economic dispatch using DC power flow method and Generation Shift Distribution Factor (GSDF), in this work we create a graphical interface in LabVIEW as a virtual instrument. Hence the dc power flow reduces the power flow problem to a set of linear equations, which make the iterative calculation very fast and the GSFD matrix present the effects of single and multiple generator MW change on the transmission line. The effectiveness of the method developed is identified through its application to an IEEE-14 bus test system. The calculation results show excellent performance of the proposed method, in regard to computation time and quality of results.

Keywords: electrical power system security, economic dispatch, sensitivity matrix, labview

Procedia PDF Downloads 489
14225 Cognitive Behavioral Training to Enhance Performance and Well-Being in Collegiate Athletes

Authors: Angelina Tarabokija

Abstract:

This study looks into how cognitive behavioral training (CBT) techniques affect collegiate track and field athletes' anxiety related to performance, with a focus on distance runners. The goal of the research is to discover whether consistent use of cognitive behavioral therapy (CBT) methods, such as progressive muscle relaxation, yoga (Y-CBT), visualization, relaxed breathing, and meditation, can reduce performance anxiety and improve sports performance. Six runners from the Rider Track & Field team, aged eighteen to twenty-three, participated in the quantitative research design used in the technique. Prior to employing CBT techniques every day for two weeks, including before competitions or on race day, participants conducted baseline assessments using the Sport Anxiety Scale-2 (SAS-2). The SAS-2 was used in post-competition evaluations to track alterations in performance anxiety. The findings show that participants' total trait anxiety levels significantly decreased after utilizing CBT techniques for one week. However, after two weeks, a few participants' anxiety levels slightly increased, pointing to the need for more research and regular practice. The study indicates that CBT approaches can effectively reduce performance anxiety and increase athletic performance in collegiate track and field athletes, despite constraints related to participant motivation and potential confounding variables. Future areas for research could entail examining the precise impacts of worry, interruption of attention, and bodily anxiety on performance, as well as adding more controls. Overall, by providing insights into evidence-based strategies to maximize mental states and athletic performance in collegiate athletes, this study advances the area of sports psychology.

Keywords: cognitive behavioral training, performance, athletes, anxiety, well-being, SAS-2, Sport, trait anxiety, somatic anxiety

Procedia PDF Downloads 13
14224 Critical Factors of IFRS Adoption in Bank Industries In Middle East Countries

Authors: Benjamin Bae

Abstract:

This study investigates the relationship between the adoption of International Financial Reporting Standards (IFRS) and the performance of banks in a number of Middle East countries. We examine whether performance levels and audit qualities play any role in adopting the International Financial Reporting Standards (IFRS) in Middle East banks. This study hypothesizes that, in general, banks with high performance and audit quality measures tend to adopt the IFRS than low-performing banks, as the adoption of a new standard takes lots of time and expenses, which could be an additional burden to them. The results show that three hypotheses are strongly supported whereas the cultural factor hypothesis is not. Banks with high ROA and ROE tend to adopt IFRS than low-performing banks. Big banks are also more likely to adopt IFRS than small or medium-sized banks. Contrary to the hypothesis, the Islamic bank status as a cultural factor has some positive impact on the adoption of the banks in the region. Overall, this research adds to our understanding of the bank’s performance. First, evidence on the relationship between the adoption of IFRS and the bank’s performance should be useful to investors. Second, the findings of this study provide financial statement users with useful information about the bank’s performance measures.

Keywords: IFRS, financial performance, audit quality, culture, firm size

Procedia PDF Downloads 42
14223 Investigation of the Effects of Sampling Frequency on the THD of 3-Phase Inverters Using Space Vector Modulation

Authors: Khattab Al Qaisi, Nicholas Bowring

Abstract:

This paper presents the simulation results of the effects of sampling frequency on the total harmonic distortion (THD) of three-phase inverters using the space vector pulse width modulation (SVPWM) and space vector control (SVC) algorithms. The relationship between the variables was studied using curve fitting techniques, and it has been shown that, for 50 Hz inverters, there is an exponential relation between the sampling frequency and THD up to around 8500 Hz, beyond which the performance of the model becomes irregular, and there is an negative exponential relation between the sampling frequency and the marginal improvement to the THD. It has also been found that the performance of SVPWM is better than that of SVC with the same sampling frequency in most frequency range, including the range where the performance of the former is irregular.

Keywords: DSI, SVPWM, THD, DC-AC converter, sampling frequency, performance

Procedia PDF Downloads 485
14222 Role of MGNREGA(s) in Seasonal Labour Migration: Micro Evidence from Telangana State, India

Authors: Vijay Korra

Abstract:

The main focus of this paper is to examine the performance, outcomes and impacts of MGNREGA Scheme in particular on migrant beneficiary households. This article is based on a field survey carried out in 2010 in three randomly selected villages in Mahabubnagar district of Telangana State, India. It was found that majority of the job card holders are only able to get employment/work between 30-60 days and receive wages maximum between Rs.60 to 70 per day wherein wage discrimination was prevalent in line with gender. It concludes by saying that the government sponsored employment programme has indeed given rural poor a sense of hope about livelihood security through guaranteed employment. On the other hand, the scheme is defected in providing full employment days, wages, and thus unable to prevent the working class from migrating to cities/towns in search of employment mainly due to malpractices involved in the implementation of the scheme.

Keywords: MGNREGA(s), labour, employment, wages, livelihood, seasonal migration

Procedia PDF Downloads 369
14221 Safe and Scalable Framework for Participation of Nodes in Smart Grid Networks in a P2P Exchange of Short-Term Products

Authors: Maciej Jedrzejczyk, Karolina Marzantowicz

Abstract:

Traditional utility value chain is being transformed during last few years into unbundled markets. Increased distributed generation of energy is one of considerable challenges faced by Smart Grid networks. New sources of energy introduce volatile demand response which has a considerable impact on traditional middlemen in E&U market. The purpose of this research is to search for ways to allow near-real-time electricity markets to transact with surplus energy based on accurate time synchronous measurements. A proposed framework evaluates the use of secure peer-2-peer (P2P) communication and distributed transaction ledgers to provide flat hierarchy, and allow real-time insights into present and forecasted grid operations, as well as state and health of the network. An objective is to achieve dynamic grid operations with more efficient resource usage, higher security of supply and longer grid infrastructure life cycle. Methods used for this study are based on comparative analysis of different distributed ledger technologies in terms of scalability, transaction performance, pluggability with external data sources, data transparency, privacy, end-to-end security and adaptability to various market topologies. An intended output of this research is a design of a framework for safer, more efficient and scalable Smart Grid network which is bridging a gap between traditional components of the energy network and individual energy producers. Results of this study are ready for detailed measurement testing, a likely follow-up in separate studies. New platforms for Smart Grid achieving measurable efficiencies will allow for development of new types of Grid KPI, multi-smart grid branches, markets, and businesses.

Keywords: autonomous agents, Distributed computing, distributed ledger technologies, large scale systems, micro grids, peer-to-peer networks, Self-organization, self-stabilization, smart grids

Procedia PDF Downloads 303
14220 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 81
14219 [Keynote Speaker]: Enhancing the Performance of a Photovoltaic Module Using Different Cooling Methods

Authors: Ahmed Amine Hachicha

Abstract:

Temperature effect on the performance of a photovoltaic module is one of the main concern that face this renewable energy, especially in the hot arid region, e.g United Arab Emirates. Overheating of the PV modules reduces the open circuit voltage and the efficiency of the modules dramatically. In this work, water cooling is developed to enhance the performance of PV modules. Different scenarios are tested under UAE weather conditions: front, back and double cooling. A spraying system is used for the front cooling whether a direct contact water system is used for the back cooling. The experimental results are compared to a non-cooling module and the performance of the PV module is determined for different situations. A mathematical model is presented to estimate the theoretical performance and validate the experimental results with and without cooling. The experimental results show that the front cooling is more effective than the back cooling and may decrease the temperature of the PV module significantly.

Keywords: PV cooling, solar energy, cooling methods, electrical efficiency, temperature effect

Procedia PDF Downloads 498
14218 Impacts of Sociological Dynamics on Entomophagy Practice and Food Security in Nigeria

Authors: O. B. Oriolowo, O. J. John

Abstract:

Empirical findings have shown insects to be nutritious and good source of food for man. However, human food preferences are not only determined by nutritional values of food consumed but, more importantly, by sociology and economic pressure. This study examined the interrelation between science and sociology in sustaining the acceptance of entomophagy among college students to combat food insecurity. A twenty items five Likert scale, College Students Entomophagy Questionnaire (CSEQ), was used to elucidate information from the respondents. The reliability coefficient was obtained to be 0.91 using Spearman-Brown Prophecy formula. Three research questions and three hypotheses were raised. Also, quantitative nutritional analysis of few insects and some established conventional protein sources were undertaking in order to compare their nutritional status. The data collected were analyzed using descriptive statistics of percentages and inferential statistics of correlation and Analysis of Variance (ANOVA). The results obtained showed that entomophagy has cultural heritage among different tribes in Nigeria and is an acceptable practice; it cuts across every social stratum and is practiced among both major religions. Moreover, insects compared favourably in term of nutrient contents when compared with the conventional animal protein sources analyzed. However, there is a gradual decline in the practice of entomophagy among students, which may be attributed to the influence of western civilization. This study, therefore, recommended an intensification of research and enlightenment of people on the usefulness of entomophagy so as to preserve its cultural heritage as well as boost human food security.

Keywords: entomophagy, food security, malnutrition, poverty alleviation, sociology

Procedia PDF Downloads 121
14217 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling

Procedia PDF Downloads 18