Search results for: publicly traded corporations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 444

Search results for: publicly traded corporations

354 Evaluation of NoSQL in the Energy Marketplace with GraphQL Optimization

Authors: Michael Howard

Abstract:

The growing popularity of electric vehicles in the United States requires an ever-expanding infrastructure of commercial DC fast charging stations. The U.S. Department of Energy estimates 33,355 publicly available DC fast charging stations as of September 2023. In 2017, 115,370 gasoline stations were operating in the United States, much more ubiquitous than DC fast chargers. Range anxiety is an important impediment to the adoption of electric vehicles and is even more relevant in underserved regions in the country. The peer-to-peer energy marketplace helps fill the demand by allowing private home and small business owners to rent their 240 Volt, level-2 charging facilities. The existing, publicly accessible outlets are wrapped with a Cloud-connected microcontroller managing security and charging sessions. These microcontrollers act as Edge devices communicating with a Cloud message broker, while both buyer and seller users interact with the framework via a web-based user interface. The database storage used by the marketplace framework is a key component in both the cost of development and the performance that contributes to the user experience. A traditional storage solution is the SQL database. The architecture and query language have been in existence since the 1970s and are well understood and documented. The Structured Query Language supported by the query engine provides fine granularity with user query conditions. However, difficulty in scaling across multiple nodes and cost of its server-based compute have resulted in a trend in the last 20 years towards other NoSQL, serverless approaches. In this study, we evaluate the NoSQL vs. SQL solutions through a comparison of Google Cloud Firestore and Cloud SQL MySQL offerings. The comparison pits Google's serverless, document-model, non-relational, NoSQL against the server-base, table-model, relational, SQL service. The evaluation is based on query latency, flexibility/scalability, and cost criteria. Through benchmarking and analysis of the architecture, we determine whether Firestore can support the energy marketplace storage needs and if the introduction of a GraphQL middleware layer can overcome its deficiencies.

Keywords: non-relational, relational, MySQL, mitigate, Firestore, SQL, NoSQL, serverless, database, GraphQL

Procedia PDF Downloads 34
353 Risk-Realistic Decision Support Intervention for Women in the Workplace

Authors: Joshua Midha

Abstract:

This paper provides an evaluation of an intervention designed to promote a risk-realistic environment for women in the workplace and regulate their risk-related decision-making. In past research, women -specifically women of color- are highly risk-averse, and this may prove to be an innate obstacle in gender progress in corporations. By helping women see the risks and the benefits and increasing potential benefits, we can increase the chances of success in the workplace. Our intervention was a success and significantly increased comfort, trust, and frequency in the use of decision-making skills in the workplace. In this paper, we explore the intervention, the methods, the results, and the implications.

Keywords: behavioral economics, decision support, risk, gender equality

Procedia PDF Downloads 198
352 CSR: Corporate Social Responsibility Performance of Indian Automobiles Companies

Authors: Jagbir Singh Kadyan

Abstract:

This research paper critically analyse the performance of those Indian Automobile Companies which are listed and traded on the National Stock Exchange (NSE) of India and which are also included in the NSE nifty auto Index. In India, CSR–Corporate Social Responsibility is mandatory for certain qualifying companies under the Indian Companies Act 2013, which replaces the erstwhile Companies Act 1956. There has been a significant shift in the focus and approaches of the Indian Corporates towards their CSR obligations with the insertion of section 135, revision of section 198 and introduction of schedule VII of the Indian Companies Act 2013. Every such qualifying companies are required to mandatorily spend at least 2% of their annual average net profit of the immediately preceding three financial years on such CSR activities as specified under schedule VII of the Companies act 2013. This research paper analyzes the CSR performance of such Indian companies. This research work is originally based on the secondary data. The annual reports of the selected Indian automobile companies have been extensively used and considered for this research work.

Keywords: board of directors, corporate social responsibility, CSR committees, Indian automobile companies, Indian companies act 2013, national stock exchange

Procedia PDF Downloads 517
351 UAV Based Visual Object Tracking

Authors: Vaibhav Dalmia, Manoj Phirke, Renith G

Abstract:

With the wide adoption of UAVs (unmanned aerial vehicles) in various industries by the government as well as private corporations for solving computer vision tasks it’s necessary that their potential is analyzed completely. Recent advances in Deep Learning have also left us with a plethora of algorithms to solve different computer vision tasks. This study provides a comprehensive survey on solving the Visual Object Tracking problem and explains the tradeoffs involved in building a real-time yet reasonably accurate object tracking system for UAVs by looking at existing methods and evaluating them on the aerial datasets. Finally, the best trackers suitable for UAV-based applications are provided.

Keywords: deep learning, drones, single object tracking, visual object tracking, UAVs

Procedia PDF Downloads 131
350 Share Pledging and Financial Constraints in China

Authors: Zijian Cheng, Frank Liu, Yupu Sun

Abstract:

The relationship between the intensity of share pledging activities and the level of financial constraint in publicly listed firms in China is examined in this paper. Empirical results show that the high financial constraint level may motivate insiders to use share pledging as an alternative funding source and an expropriation mechanism. Share collateralization can cause a subsequently more constrained financing condition. Evidence is found that share pledging made by the controlling shareholder is likely to mitigate financial constraints in the following year. Research findings are robust to alternative measures and an instrumental variable for dealing with endogeneity problems.

Keywords: share pledge, financial constraint, controlling shareholder, dividend policy

Procedia PDF Downloads 145
349 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 141
348 An Enhanced Support Vector Machine Based Approach for Sentiment Classification of Arabic Tweets of Different Dialects

Authors: Gehad S. Kaseb, Mona F. Ahmed

Abstract:

Arabic Sentiment Analysis (SA) is one of the most common research fields with many open areas. Few studies apply SA to Arabic dialects. This paper proposes different pre-processing steps and a modified methodology to improve the accuracy using normal Support Vector Machine (SVM) classification. The paper works on two datasets, Arabic Sentiment Tweets Dataset (ASTD) and Extended Arabic Tweets Sentiment Dataset (Extended-AATSD), which are publicly available for academic use. The results show that the classification accuracy approaches 86%.

Keywords: Arabic, classification, sentiment analysis, tweets

Procedia PDF Downloads 122
347 Analysis of the Content of Sugars, Vitamin C, Preservatives, Synthetic Dyes, Sweeteners, Sodium and Potassium and Microbiological Purity in Selected Products Made From Fruit and Vegetables in Small Regional Factories and in Large Food Corporations

Authors: Katarzyna Miśkiewicz, Magdalena Lasoń-Rydel, Małgorzata Krępska, Katarzyna Sieczyńska, Iwona Masłowska-Lipowicz, Katarzyna Ławińska

Abstract:

The aim of the study was to analyse a selection of 12 pasteurised products made from fruit and vegetables, such as fruit juices, fruit drinks, jams, marmalades and jam produced by small regional factories as well as large food corporations. The research was carried out as part of the project "Innovative system of healthy and regional food distribution", funded by the Ministry of Education and Science (Poland), which aims to create an economically and organisationally strong agri-food industry in Poland through effective cooperation between scientific and socio-economic actors. The main activities of the project include support for the creation of new distribution channels for regional food products and their easy access to a wide group of potential customers while maintaining the highest quality standards. One of the key areas of the project is food quality analyses conducted to indicate the competitive advantage of regional products. Presented here are studies on the content of sugars, vitamin C, preservatives, synthetic colours, sweeteners, sodium and potassium, as well as studies on the microbiological purity of selected products made from fruit and vegetables. The composition of products made from fruit and vegetables varies greatly and depends on both the type of raw material and the way it is processed. Of the samples tested, fruit drinks contained the least amount of sugars, and jam and marmalade made by large producers and bought in large chain stores contained the most. However, the low sugar content of some fruit drinks is due to the presence of the sweetener sucralose in their composition. The vitamin C content of the samples varied, being higher in products where it was added during production. All products made in small local factories were free of food additives such as preservatives, sweeteners and synthetic colours, indicating their superiority over products made by large producers. Products made in small local factories were characterised by a relatively high potassium content. The microbiological purity of commercial products was confirmed - no Salmonella spp. were detected, and the number of mesophilic bacteria, moulds, yeasts, and β-glucuronidase-positive E. coli was below the limit of quantification.

Keywords: fruit and vegetable products, sugars, food additives, HPLC, ICP-OES

Procedia PDF Downloads 70
346 A Descriptive Approach towards the Understanding of the Central American Coffee Business Demography Phenomena

Authors: Jesus David Argueta Moreno, Justa Rufina Martel, Edith Gabriela Carrasco

Abstract:

The Central American Coffee small, medium, and large corporations search for excellence, sustainability, and continuous improvement, triggers in a still unknown scale the Local expansion, crusading, and franchising strategies towards a more suitable commercial opportunity, where the dynamics of the Central American business displacement can be explained through the markets permeability traits. By considering the previously mentioned, the present study aims to evaluate the franchising potentialities offered by Central American Coffee business scenario, in order to explain dynamics of the business demography phenomena and its relevance on the Central American competitiveness landscape.

Keywords: competitiveness, franchising, business demography, Central American Coffee

Procedia PDF Downloads 592
345 Welfare Estimation in a General Equilibrium Model with Cities

Authors: Oded Hochman

Abstract:

We first show that current measures of welfare changes in the whole economy do not apply to an economy with cities. In addition, since such measures are defined over a partial equilibrium, they capture only partially the effect of a welfare change. We then define a unique and additive measure that we term the modified economic surplus (mES) which fully captures the welfare effects caused by a change in the price of a nationally traded good. We show that the price change causes, on the one hand a change of land rents in the economy and, on the other hand, an equal change of mES that can be estimated by measuring areas in the price-quantity national demand and supply plane. We construct for each city a cost function from which we derive a city’s and, after aggregation, an economy-wide demand and supply functions of nationwide prices and of either the unearned incomes (Marshalian functions) or the utility levels (compensated functions).

Keywords: city cost function, welfare measures, modified compensated variation, modified economic surplus, unearned income function, differential land rents, city size

Procedia PDF Downloads 287
344 A Comparative Study of Corporate Cultural Values in Mergers and Acquisitions

Authors: Renzhong Peng, Weiping Wu

Abstract:

Based on the framework of Hofstede’s cultural dimension, this study conducted a comparative study on the similarities and differences between national cultures and corporate cultural values, analyzed and interpreted the reasons why Chinese overseas Mergers and Acquisitions (M&A) cultural integration results in the success or failure. The findings of this study indicate that in the process of M&A, the corporate cultural values from Chinese and western corporations are proved to be quite different as a result of their diversities of national cultures, and the strategies for the integration of cultural corporate values are of vital importance and can determine the effects of the M&A, which can be referential to managers who intend to have the idea of M&A and those who have cultural integration in the process of M&A.

Keywords: comparative study, cultural integration, corporate cultural values, Mergers and Acquisitions

Procedia PDF Downloads 370
343 Intangible Capital and Stock Prices: A Study of Jordanian Companies

Authors: Almoutassem Bellah Nasser

Abstract:

This paper is aimed at calculating the intangible assets of Jordanian economy. This effort is a response to the demand from corporations for these services which reflects a perceived gap in internal and external financial reporting on intangible investments. The main conclusion of the paper is to suggest that the way forward to a standardized, more comparable approach to measuring intangible capital is to employ CIV method of valuation. Published macroeconomic data traditionally exclude most intangible investment from measured GDP. This situation is beginning to change as some attempts have been made to measure the amount of intangible assets. It was found that intangible assets account for $164.20 million in all the listed companies of Jordan. All this money does not appear on the balance sheets of these companies and hence requires special attention of policy makers for better utilization.

Keywords: intangible capital, stock prices, Amman Stock Exchange

Procedia PDF Downloads 358
342 Accurate HLA Typing at High-Digit Resolution from NGS Data

Authors: Yazhi Huang, Jing Yang, Dingge Ying, Yan Zhang, Vorasuk Shotelersuk, Nattiya Hirankarn, Pak Chung Sham, Yu Lung Lau, Wanling Yang

Abstract:

Human leukocyte antigen (HLA) typing from next generation sequencing (NGS) data has the potential for applications in clinical laboratories and population genetic studies. Here we introduce a novel technique for HLA typing from NGS data based on read-mapping using a comprehensive reference panel containing all known HLA alleles and de novo assembly of the gene-specific short reads. An accurate HLA typing at high-digit resolution was achieved when it was tested on publicly available NGS data, outperforming other newly-developed tools such as HLAminer and PHLAT.

Keywords: human leukocyte antigens, next generation sequencing, whole exome sequencing, HLA typing

Procedia PDF Downloads 642
341 Random Matrix Theory Analysis of Cross-Correlation in the Nigerian Stock Exchange

Authors: Chimezie P. Nnanwa, Thomas C. Urama, Patrick O. Ezepue

Abstract:

In this paper we use Random Matrix Theory to analyze the eigen-structure of the empirical correlations of 82 stocks which are consistently traded in the Nigerian Stock Exchange (NSE) over a 4-year study period 3 August 2009 to 26 August 2013. We apply the Marchenko-Pastur distribution of eigenvalues of a purely random matrix to investigate the presence of investment-pertinent information contained in the empirical correlation matrix of the selected stocks. We use hypothesised standard normal distribution of eigenvector components from RMT to assess deviations of the empirical eigenvectors to this distribution for different eigenvalues. We also use the Inverse Participation Ratio to measure the deviation of eigenvectors of the empirical correlation matrix from RMT results. These preliminary results on the dynamics of asset price correlations in the NSE are important for improving risk-return trade-offs associated with Markowitz’s portfolio optimization in the stock exchange, which is pursued in future work.

Keywords: correlation matrix, eigenvalue and eigenvector, inverse participation ratio, portfolio optimization, random matrix theory

Procedia PDF Downloads 316
340 Offshore Outsourcing: Global Data Privacy Controls and International Compliance Issues

Authors: Michelle J. Miller

Abstract:

In recent year, there has been a rise of two emerging issues that impact the global employment and business market that the legal community must review closer: offshore outsourcing and data privacy. These two issues intersect because employment opportunities are shifting due to offshore outsourcing and some States, like the United States, anti-outsourcing legislation has been passed or presented to retain jobs within the country. In addition, the legal requirements to retain the privacy of data as a global employer extends to employees and third party service provides, including services outsourced to offshore locations. For this reason, this paper will review the intersection of these two issues with a specific focus on data privacy.

Keywords: outsourcing, data privacy, international compliance, multinational corporations

Procedia PDF Downloads 386
339 The Rise of Far-Right Political Parties: Future of Multiculturalism in Europe

Authors: Bharti Yadav

Abstract:

Global migration and the rise of far-right parties have expanded the significance of political discussions enclosing multiculturalism. This research paper will focus on the rise of far-right political parties in Europe over the last nearly two decades and how right-wing politics affect multiculturalism in a detrimental way; major European leaders have publicly stated that multiculturalism in their countries has failed. This paper also discusses the main reasons for right-wing politics is normalizing in Europe. Far-right political parties are the fastest-growing parties in Europe, and multiculturalism is an unescapable significant political issue. The rise of far-right anti-immigrant parties diminishes mainstream party support for multiculturalism. Mainstream parties are more receptive to both increasing in ethnic minorities’ electoral power and the rise of far-right parties.

Keywords: political parties, far-right, migration, multiculturalism

Procedia PDF Downloads 65
338 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 121
337 An Examination of Earnings Management by Publicly Listed Targets Ahead of Mergers and Acquisitions

Authors: T. Elrazaz

Abstract:

This paper examines accrual and real earnings management by publicly listed targets around mergers and acquisitions. Prior literature shows that earnings management around mergers and acquisitions can have a significant economic impact because of the associated wealth transfers among stakeholders. More importantly, acting on behalf of their shareholders or pursuing their self-interests, managers of both targets and acquirers may be equally motivated to manipulate earnings prior to an acquisition to generate higher gains for their shareholders or themselves. Building on the grounds of information asymmetry, agency conflicts, stewardship theory, and the revelation principle, this study addresses the question of whether takeover targets employ accrual and real earnings management in the periods prior to the announcement of Mergers and Acquisitions (M&A). Additionally, this study examines whether acquirers are able to detect targets’ earnings management, and in response, adjust the acquisition premium paid in order not to face the risk of overpayment. This study uses an aggregate accruals approach in estimating accrual earnings management as proxied by estimated abnormal accruals. Additionally, real earnings management is proxied for by employing widely used models in accounting and finance literature. The results of this study indicate that takeover targets manipulate their earnings using accruals in the second year with an earnings release prior to the announcement of the M&A. Moreover, in partitioning the sample of targets according to the method of payment used in the deal, the results are restricted only to targets of stock-financed deals. These results are consistent with the argument that targets of cash-only or mixed-payment deals do not have the same strong motivations to manage their earnings as their stock-financed deals counterparts do additionally supporting the findings of prior studies that the method of payment in takeovers is value relevant. The findings of this study also indicate that takeover targets manipulate earnings upwards through cutting discretionary expenses the year prior to the acquisition while they do not do so by manipulating sales or production costs. Moreover, in partitioning the sample of targets according to the method of payment used in the deal, the results are restricted only to targets of stock-financed deals, providing further robustness to the results derived under the accrual-based models. Finally, this study finds evidence suggesting that acquirers are fully aware of the accrual-based techniques employed by takeover targets and can unveil such manipulation practices. These results are robust to alternative accrual and real earnings management proxies, as well as controlling for the method of payment in the deal.

Keywords: accrual earnings management, acquisition premium, real earnings management, takeover targets

Procedia PDF Downloads 96
336 The Effective Operations Competitive Advantages of Mobile Phone Service Providers across Countries: The Case of Middle East Region

Authors: Yazan Khalid Abed-Allah Migdadi

Abstract:

The aim of this study is identifying the effective operations competitive advantages of mobile phone service providers across countries. All Arab countries in the Middle East region were surveyed except Syria, and 27 out of 31 service providers were surveyed. Data collected from corporations’ annual reports, websites and other professional institutions published sources. Multiple linear regression analysis test was used to identify the relationship between operations competitive advantages and market share. The effective operations competitive advantages were; diversity of offers and service accessibility

Keywords: competitive advantage, mobile telecommunication operations, Middle East, service provider

Procedia PDF Downloads 376
335 Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks

Authors: Parul Khanna, Pavol Zavarsky, Dale Lindskog

Abstract:

Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize organization’s architecture which helps in determining weak links within the organization. This paper discusses limitations of Maltego Chlorine CE 3.6.0 and suggests measures as to how organizations can use these tools to protect themselves from doxing attacks.

Keywords: advanced persistent threat, FOCA, OSINT, PII

Procedia PDF Downloads 234
334 Human Rights on Digital Platforms

Authors: Niina Meriläinen

Abstract:

Digital platforms are arenas for dialogue, various kinds of political debates, information and news gathering, policymaking, and social change processes. Human rights serve as examples of social and political issues that are universally noted as principles and yet often violated on digital platforms as well as in the analog world. Digital platforms in this study are different Internet sites, blogs, discussion platforms, social media apps, and gaming. Various actors, from human rights activists and non-governmental organizations to individual people, governments, and corporations, use digital platforms along with analog arenas to discuss and defend human rights, while violators can find new victims and continue violating rights on the same platforms. Digital platforms create opportunities for various women and minorities to empower themselves and others and to be active in various arenas of society and policymaking. At the same time, digital platforms pose threats to human rights globally, especially to women, girls, and minorities. The results of this meta-study of n=120 academic case studies indicate that more research is needed to determine the framework of human rights and human rights on digital platforms. A broad discussion must be had on what human rights require in the digital realm and how ICTs may enhance or threaten our ability to respect, protect, and fulfill a wide variety of human rights while various digital platforms pose multiple threats to human rights. This relates to the willingness of political decision-makers to act upon various crimes committed on and with online platforms. More research is needed to determine the framework of digital human rights and human rights on digital platforms in relation to political communication and decision-making. It is important to develop a framework in which these are defined. It must be discussed who participates in this process: those whose rights are violated, companies that profit by selling our personal data, activists, governments, and some unknown actors. In the end, the question comes back to who has the power to define what we talk about, when, and where. This use of power plays a big role. Digital platforms illustrate the darker side of technological progress, which, on the one hand, has given various people the possibility to engage in society, empower themselves, and take ownership of their rights globally. At the same time, the platforms enable others to use the same platforms to find victims, abuse them, and exploit them. Bullying, harassment, and violence are rampant on various digital platforms, where minorities and people with limited support are victims. There is indeed a need for a discussion of normative values in the era of fake news, the power of influencers, Trumpism, and institutionalized disregard for human rights, gender equality, and the elimination of gender-based violence online. Attention and obligations must be placed on politicians and internet architecture, such as corporations, and their roles in human rights and their violations online.

Keywords: human rights, digital platforms, violations, internet, social media

Procedia PDF Downloads 32
333 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 54
332 TDApplied: An R Package for Machine Learning and Inference with Persistence Diagrams

Authors: Shael Brown, Reza Farivar

Abstract:

Persistence diagrams capture valuable topological features of datasets that other methods cannot uncover. Still, their adoption in data pipelines has been limited due to the lack of publicly available tools in R (and python) for analyzing groups of them with machine learning and statistical inference. In an easy-to-use and scalable R package called TDApplied, we implement several applied analysis methods tailored to groups of persistence diagrams. The two main contributions of our package are comprehensiveness (most functions do not have implementations elsewhere) and speed (shown through benchmarking against other R packages). We demonstrate applications of the tools on simulated data to illustrate how easily practical analyses of any dataset can be enhanced with topological information.

Keywords: machine learning, persistence diagrams, R, statistical inference

Procedia PDF Downloads 56
331 Managing HR Knowledge in a Large Privately Owned Enterprise: An Empirical Case Analysis

Authors: Cindy Wang-Cowham, Judy Ningyu Tang

Abstract:

The paper contributes towards the development of scarce literature on HR knowledge management. Drawing literature from knowledge management, the authors define the meaning of HR knowledge and propose that there are social mechanisms in organizations that facilitate the management and sharing of HR knowledge. Instead of investigating the subject in large multinational corporations, the present paper examines it in a large Chinese privately owned enterprise, which has an international standing. The main finding of the case analysis is that communication and feedback plays a pivotal role when managing HR knowledge. Social mechanisms can stimulate the communication and feedback between employees, thus facilitate knowledge exchange.

Keywords: HR knowledge, knowledge management, large privately owned enterprises, China

Procedia PDF Downloads 506
330 Economic Benefit of Wild Animals: A Possible Threat to Conservation in Ovia Southwest, Edo State, Nigeria

Authors: B. G. Oguntuase, M. O. Olofinsae

Abstract:

This study was carried out to assess the contribution of bush meat to Edo people’s livelihood and the consequence of utilization on conservation. Five markets were selected in Ovia Southwest local government area of Edo State, twenty bush meat sellers were selected from each market. Direct observations were made to document the composition of wild animals under sale in the study area. A total of one hundred questionnaires were administered to the respondents. The questionnaires were all retrieved and analyzed using descriptive analysis. The results show that thirteen animal species are being traded in the area. The price for the animal species (whole animal) ranged from N200 to N9,520. Respondents reported that there is a decline in the animal population over time. Between 64% and 95% of the respondents acknowledged population decline in seven of the thirteen animal species available for sale compared to what it used to be some ten years ago. Sales of wild animal species could be regarded as a profitable business in the rural community, supporting livelihood of the community, but could have devastating effect on conservation as already observed in this study if harvesting of wild animals is not regulated on controlled or sustainable basis.

Keywords: conservation, economic benefits, hunting, population, wild animals

Procedia PDF Downloads 442
329 Use of DNA Barcoding and UPLC-MS to Authenticate Agathosma spp. in South African Herbal Products

Authors: E. Pretorius, A. M. Viljoen, M. van der Bank

Abstract:

Introduction: The phytochemistry of Agathosma crenulata and A. betulina has been studied extensively, while their molecular analysis through DNA barcoding remains virtually unexplored. This technique can confirm the identity of plant species included in a herbal product, thereby ensuring the efficacy of the herbal product and the accuracy of its label. Materials and methods: Authentic Agathosma reference material of A. betulina (n=16) and A. crenulata (n=10) were obtained. Thirteen commercial products were purchased from various health shops around Johannesburg, South Africa, using the search term “Agathosma” or “Buchu.” The plastid regions matK and ycf1 were used to barcode the Buchu products, and BRONX analysis confirmed the taxonomic identity of the samples. UPLC-MS analyses were also performed. Results: Only (30/60) 60% of the traded samples tested from 13 suppliers contained A. betulina in their herbal products. Similar results were also obtained for the UPLC-MS analysis. Conclusion: In this study, we demonstrate the application of DNA barcoding in combination with phytochemical analysis to authenticate herbal products claiming to contain Agathosma plants as an ingredient in their products. This supports manufacturing efforts to ensure that herbal products that are safe for the consumer.

Keywords: Buchu, substitution, barcoding, BRONX algorithm, matK, ycf1, UPLC-MS

Procedia PDF Downloads 110
328 A Comparative Synopsis of the Enforcement of Market Abuse Prohibition in Australia and South Africa

Authors: Howard Chitimira

Abstract:

In Australia, the market abuse prohibition is generally well accepted by the investing and non-investing public as well as by the government. This co-operative and co-ordinated approach on the part of all the relevant stakeholders has to date given rise to an increased awareness and commendable combating of market abuse activities in the Australian corporations, companies, and securities markets. It is against this background that this article seeks to comparatively explore the general enforcement approaches that are employed to combat market abuse (insider trading and market manipulation) activity in Australia and South Africa. In relation to this, the role of selected enforcement authorities and possible enforcement methods which may be learnt from both the Australian and South African experiences will be isolated where necessary for consideration by such authorities, especially, in the South African market abuse regulatory framework.

Keywords: insider trading, market abuse, market manipulation, regulation

Procedia PDF Downloads 279
327 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 269
326 Framework for Assessment of Non-financial Concentration Risk

Authors: Anchal Gupta

Abstract:

Amid the escalating digitalization and deployment of cross-border technological solutions, a significant portion of the industry and regulatory bodies have begun to pose queries concerning the formulation, computation, and contemplation of concentration risk. In the financial sector, well-established parameters exist for gauging the concentration of a portfolio and similar elements. However, a unified framework appears to be absent, which could guide industry and regulators pertaining to non-financial concentration risk. This paper introduces a framework, constructed on the foundation of multiple regulations where regulators are advocating for licensed corporations to evaluate their concentration risk. The lacuna lies in the fact that, while regulators delineate what constitutes concentration risk, unlike other domains, no guidelines are provided that could assist firms. This frequently results in ambiguity and individual corporate interpretation, which, from a risk management standpoint, is less than ideal.

Keywords: concentration risk, non-financial risk, government regulation, financial regulation, non-market risk, MAS, DORA, EDSP, SFC

Procedia PDF Downloads 11
325 Influence and Depiction of Power in an Urban Space

Authors: Kalpeshkumar Patel, Nikita Manvi

Abstract:

The paper is an attempt to understand the influence and depiction of power in an urban space by throwing light across a few examples across the architectural timeline. Power has been the medium through which ideologies function, as witnessed across the timeline. The center to understand this ideology is to apprehend how power is formed, captured, owned, traded, and distorted. Every urban space has power embedded in it, either for the people who are imposing it or for the public who are receiving it. The most fundamental question in the issue of power is who – who will judge, whose tastes will matter and whose interests are being served. Power is expressed and reinforced by regular means, a boundary and gates, a parade route, a dominant landmark, play of shape or scale in elevation, ceremonial axis, boulevards and avenues, the vista, bilateral symmetry, or regular order. Even if people accept the psychological efficacy of these forms, the way they perceive them may vary depending on the subject. They are cold devices of power used to make some people submit to others. Yet it is also true that these symbolic forms are attractive because they speak to the deep emotions of people. They do indeed give us a sense of security, stability and continuity, awe and pride. The Urban Space for mass assembly is an idea that continues to seduce dictators and democracies. It is a tradition as old as an agora and as manipulative as Baroque Rome.

Keywords: urban space, aggrandization, city planning, landscape, supremacy, democratic

Procedia PDF Downloads 107