Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9347

Search results for: employee security behavior

8177 Workplace Development Programmes for Small and Medium-Sized Enterprises in Europe and Singapore: A Conceptual Study

Authors: Zhan Jie How

Abstract:

With the heightened awareness of workplace learning and its impact on improving organizational performance and developing employee competence, governments and corporations around the world are forced to intensify their cooperation to establish national workplace development programmes to guide these corporations in fostering engaging and collaborative workplace learning cultures. This conceptual paper aims to conduct a comparative study of existing workplace development programmes for small and medium-sized enterprises (SMEs) in Europe and Singapore, focusing primarily on the Swedish Production Leap, Finnish TEKES Liideri Programme, and Singapore SkillsFuture SME Mentors Programme. The study carries out a systematic review of the three workplace development programmes to examine the roles of external mentors or coaches in influencing the design and implementation of workplace learning strategies and practices in SMEs. Organizational, personal and external factors that promote or inhibit effective workplace mentorship are also scrutinized, culminating in a critical comparison and evaluation of the strengths and weaknesses of the aforementioned programmes. Based on the findings from the review and analyses, a heuristic conceptual framework is developed to illustrate the complex interrelationships among external workplace development programmes, internal learning and development initiatives instituted by the organization’s higher management, and employees' continuous learning activities at the workplace. The framework also includes a set of guiding principles that can be used as the basis for internal mediation between the competing perspectives of mentors and mentees (employers and employees of the organization) regarding workplace learning conditions, practices and their intended impact on the organization. The conceptual study provides a theoretical blueprint for future empirical research on organizational workplace learning and the impact of government-initiated workplace development programmes.

Keywords: employee competence, mentorship, organizational performance, workplace development programme, workplace learning culture

Procedia PDF Downloads 127
8176 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 127
8175 Vehicle Timing Motion Detection Based on Multi-Dimensional Dynamic Detection Network

Authors: Jia Li, Xing Wei, Yuchen Hong, Yang Lu

Abstract:

Detecting vehicle behavior has always been the focus of intelligent transportation, but with the explosive growth of the number of vehicles and the complexity of the road environment, the vehicle behavior videos captured by traditional surveillance have been unable to satisfy the study of vehicle behavior. The traditional method of manually labeling vehicle behavior is too time-consuming and labor-intensive, but the existing object detection and tracking algorithms have poor practicability and low behavioral location detection rate. This paper proposes a vehicle behavior detection algorithm based on the dual-stream convolution network and the multi-dimensional video dynamic detection network. In the videos, the straight-line behavior of the vehicle will default to the background behavior. The Changing lanes, turning and turning around are set as target behaviors. The purpose of this model is to automatically mark the target behavior of the vehicle from the untrimmed videos. First, the target behavior proposals in the long video are extracted through the dual-stream convolution network. The model uses a dual-stream convolutional network to generate a one-dimensional action score waveform, and then extract segments with scores above a given threshold M into preliminary vehicle behavior proposals. Second, the preliminary proposals are pruned and identified using the multi-dimensional video dynamic detection network. Referring to the hierarchical reinforcement learning, the multi-dimensional network includes a Timer module and a Spacer module, where the Timer module mines time information in the video stream and the Spacer module extracts spatial information in the video frame. The Timer and Spacer module are implemented by Long Short-Term Memory (LSTM) and start from an all-zero hidden state. The Timer module uses the Transformer mechanism to extract timing information from the video stream and extract features by linear mapping and other methods. Finally, the model fuses time information and spatial information and obtains the location and category of the behavior through the softmax layer. This paper uses recall and precision to measure the performance of the model. Extensive experiments show that based on the dataset of this paper, the proposed model has obvious advantages compared with the existing state-of-the-art behavior detection algorithms. When the Time Intersection over Union (TIoU) threshold is 0.5, the Average-Precision (MP) reaches 36.3% (the MP of baselines is 21.5%). In summary, this paper proposes a vehicle behavior detection model based on multi-dimensional dynamic detection network. This paper introduces spatial information and temporal information to extract vehicle behaviors in long videos. Experiments show that the proposed algorithm is advanced and accurate in-vehicle timing behavior detection. In the future, the focus will be on simultaneously detecting the timing behavior of multiple vehicles in complex traffic scenes (such as a busy street) while ensuring accuracy.

Keywords: vehicle behavior detection, convolutional neural network, long short-term memory, deep learning

Procedia PDF Downloads 113
8174 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security

Authors: Chandanee Wasana Kalansooriya

Abstract:

Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.

Keywords: diabetes, food security, glycemic index, rice consumption

Procedia PDF Downloads 84
8173 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 222
8172 Development of Interaction Factors Charts for Piled Raft Foundation

Authors: Abdelazim Makki Ibrahim, Esamaldeen Ali

Abstract:

This study aims at analysing the load settlement behavior and predict the bearing capacity of piled raft foundation a series of finite element models with different foundation configurations and stiffness were established. Numerical modeling is used to study the behavior of the piled raft foundation due to the complexity of piles, raft, and soil interaction and also due to the lack of reliable analytical method that can predict the behavior of the piled raft foundation system. Simple analytical models are developed to predict the average settlement and the load sharing between the piles and the raft in piled raft foundation system. A simple example to demonstrate the applications of these charts is included.

Keywords: finite element, pile-raft foundation, method, PLAXIS software, settlement

Procedia PDF Downloads 542
8171 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 176
8170 Influence of the Eccentricity of a Concentrated Load on the Behavior of Multilayers Slabs

Authors: F. Bouzeboudja, K. Ait-Tahar

Abstract:

The method of strengthening of concrete works by composite materials is a practice which knows currently an important development. From this perspective, we propose to make a contribution to the analysis of the behavior of concrete slabs reinforced with composite fabrics, arranged in parallel folds according to the thickness of the slab. The analysis of experimentally obtained modes of failure confirms, generally, that the ruin of the structure occurs essentially by punching. Accordingly, our work is directed to the analysis of the behavior of reinforced slabs towards the punching. An experimental investigation is realized. For that purpose, a set of trial specimens was made. The reinforced specimens are subjected to an essay of punching, by making vary the direction of the eccentricity. The first experimental results show that the ultimate loads, as well as the transition from the flexion failure mode to the punching failure mode, are governed essentially by the eccentricity.

Keywords: composites, concrete slabs, failure, laminate, punching

Procedia PDF Downloads 225
8169 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 190
8168 Dissocial Personality in Adolescents

Authors: Tsirekidze M., Aprasidze T.

Abstract:

Introduction: The problem of dissocial behavior is at the heart of the social sciences and psychiatry; however, it should be noted that its psychiatric aspect is little studied, and some issues of the problem are still controversial. This is complicated by the diversity of terminological concepts in defining “dissocial behavior”, “behavioral disorder”, “abnormal behavior”, “deviant behavior”, “delinquent behavior”, etc. In literature, there is no comprehensive definition of the essence of dissociative behavior. Numerous attempts to systematize dissociative disorders should also be considered unsatisfactory, which is primarily related to the lack of solid criteria for defining this group of disorders. According to the clinical classification, dissocial behavior is divided into psychotic and non-psychotic forms. Such differentiation is conditional in nature since it is not always possible to draw precise, clear distinctions between these forms, and in addition, there is a transition of a behavior disorder or so-called intermediate forms. One group of authors distinguishes two main forms of deviant behavior in terms of both theoretical and practical significance - non-pathological and pathological. In recent years, especially, the non-pathological form of behavior disorder has become topical. It refers to a large group of forms of deviant behavior, the emergence of which is associated with psychologically full-fledged reactions of children and adolescents to stressful situations and extreme conditions. According to the authors, its concept is understandable-it is difficult to draw a line between psychologically understandable reactions and psychogenically induced reactive states. In addition, the concept of "normal" child and adolescent is, to some extent, a vague concept, as in medicine, any definition of the norm. From a practical (more precisely, pragmatic) point of view, the term "abnormal behavioral disorder" undoubtedly makes sense, especially for the purpose of forensic psychiatric examination. Non-pathological deviation mainly includes transient situational reactions, microsocial-pedagogical backwardness, and character accentuation.Deviant behavior was predominantly manifested in a non-pathological form, which, in our opinion, is due to the difficult socio-economic situation of the country, moral-ethical deprivation, and expressed frustration. By itself, society is an indicator of deviation. Add to this situation complicated factors such as micro-social-pedagogical leave, unfavorable family environment, and parenting defects. Consideration is also given to the connection of acceptable deviation with the personal structural features of the adolescent. Aim: The topic of our discussion is the dissocial behavior of the non-psychotic register. Methods: We surveyed 120 adolescents with deviant behaviors. 61% of them were diagnosed with various neuropsychiatric disorders. Results: Abnormal forms of deviant behavior were observed in 13%, and non-pathological forms in -69%. A combination of non-pathological and pathological forms was present in 10% of cases. In the case of non-pathological deviation, microsocial-pedagogical acceptance was revealed in 62%, character accentuation in 22%; during the pathological forms, pathological reactions were observed in 21%, and abnormal formation of the person -21%. Conclusion: It should be emphasized that in case of any of the above defects, if the so-called family psychosis, and medical and pedagogical habilitation measures for the adolescent, it is quite possible to prevent the abnormal development of the child's personality, correct his character, regulate behavior and develop positive labor-social relations.

Keywords: dissocial personality, deviant behavior, dissocial, delinquent behavior

Procedia PDF Downloads 200
8167 Understanding the Association between Altruism, Personality, and Birth Order among Indian Young Adults

Authors: Shruti Soudi, Anushka Nayak

Abstract:

Altruism is a voluntary helping behavior that is not motivated by rewards. The empathy-altruism hypothesis states that altruistic behavior results from empathy, a constant emotional response between the helper and the individual in need. Individual variances in familiar ways of thinking, feeling, and acting are called personalities. The personality of an individual determines their behavior. More importantly, Adler was among the first psychologists to document the importance of birth order on personality. The present study aims to understand the influence of personality and birth order on altruism. A questionnaire consisting of standardized tools to measure altruism (Hindi Self Report Altruism Scale) and personality (Big Five Personality Inventory) will aid in studying the relationship between these variables among young adults in India. A statistical analysis of the data will be completed using ANOVA and T-Test in the SPSS Software.

Keywords: altruism, personality, birth order, ANOVA, young adults

Procedia PDF Downloads 57
8166 Influence of Behavior Models on the Response of a Reinforced Concrete Frame: Multi-Fiber Approach

Authors: A. Kahil, A. Nekmouche, N. Khelil, I. Hamadou, M. Hamizi, Ne. Hannachi

Abstract:

The objective of this work is to study the influence of the nonlinear behavior models of the concrete (concrete_BAEL and concrete_UNI) as well as the confinement brought by the transverse reinforcement on the seismic response of reinforced concrete frame (RC/frame). These models as well as the confinement are integrated in the Cast3m finite element calculation code. The consideration of confinement (TAC, taking into account the confinement) provided by the transverse reinforcement and the non-consideration of confinement (without consideration of containment, WCC) in the presence and absence of a vertical load is studied. The application was made on a reinforced concrete frame (RC/frame) with 3 levels and 2 spans. The results show that on the one hand, the concrete_BAEL model slightly underestimates the resistance of the RC/frame in the plastic field, whereas the concrete_uni model presents the best results compared to the simplified model "concrete_BAEL", on the other hand, for the concrete-uni model, taking into account the confinement has no influence on the behavior of the RC/frame under imposed displacement up to a vertical load of 500 KN.

Keywords: reinforced concrete, nonlinear calculation, behavior laws, fiber model confinement, numerical simulation

Procedia PDF Downloads 152
8165 Study of Magnetic Properties on the Corrosion Behavior and Influence of Temperature in Permanent Magnet (Nd-Fe-B) Used in PMSM

Authors: N. Yogal, C. Lehrmann

Abstract:

The use of Permanent magnet (PM) is increasing in the Permanent magnet synchronous machines (PMSM) to fulfill the requirement of high efficiency machines in modern industry. PMSM is widely used in industrial application, wind power plant and automotive industry. Since the PMSM are used in different environment condition, the long-term effect of NdFeB-based magnets at high temperatures and corrosion behavior has to be studied due to irreversible loss of magnetic properties. In this paper, the effect of magnetic properties due to corrosion and increasing temperature in the climatic chamber has been presented. The magnetic moment and magnetic field of the magnet were studied experimentally.

Keywords: permanent magnet (PM), NdFeB, corrosion behavior, temperature effect, Permanent magnet synchronous machine (PMSM)

Procedia PDF Downloads 381
8164 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 504
8163 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 157
8162 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 45
8161 Characterization of Structural Elements Concrete Metal Fibre

Authors: Benaouda Hemza

Abstract:

This work on the characterization of structural elements in metal fiber concrete is devoted to the study of recyclability, as reinforcement for concrete, of chips resulting from the machining of steel parts. We are interested in this study to the rheological behavior of fresh chips reinforced concrete and its mechanical behavior at a young age. The evaluation of the workability with the LCL workabilimeter shows that optimal sand gravel ratios (S/G) are S/G=0.8, and S/G=1. The study of the content chips (W%) influence on the workability of the concrete shows that the flow time and the S/G optimum increase with W%. For S/G=1.4, the flow time is practically insensitive to the variation of W%, the concrete behavior is similar to that of self-compacting concrete. Mechanical characterization tests (direct tension, compression, bending, and splitting) show that the mechanical properties of chips concrete are comparable to those of the two selected reference concretes (concrete reinforced with conventional fibers: EUROSTEEL fibers corrugated and DRAMIX fibers). Chips provide a significant increase in strength and some ductility in the post-failure behavior of the concrete. Recycling chips as reinforcement for concrete can be favorably considered.

Keywords: fiber concrete, chips, workability, direct tensile test, compression test, bending test, splitting test

Procedia PDF Downloads 435
8160 High Input Driven Factors in Idea Campaigns in Large Organizations: A Case Depicting Best Practices

Authors: Babar Rasheed, Saad Ghafoor

Abstract:

Introduction: Idea campaigns are commonly held across organizations for generating employee engagement. The contribution is specifically designed to identify and solve prevalent issues. It is argued that numerous organizations fail to achieve their desired goals despite arranging for such campaigns and investing heavily in them. There are however practices that organizations use to achieve higher degree of effectiveness, and these practices may be up for exploration by research to make them usable for the other organizations. Purpose: The aim of this research is to surface the idea management practices of a leading electric company with global operations. The study involves a large sized, multi site organization that is attributed to have added challenges in terms of managing ideas from employees, in comparison to smaller organizations. The study aims to highlight the factors that are looked at as the idea management team strategies for the campaign, sets terms and rewards for it, makes follow up with the employees and lastly, evaluate and award ideas. Methodology: The study is conducted in a leading electric appliance corporation that has a large number of employees and is based in numerous regions of the world. A total of 7 interviews are carried out involving the chief innovation officer, innovation manager and members of idea management and evaluation teams. The interviews are carried out either on Skype or in-person based on the availability of the interviewee. Findings: While this being a working paper and while the study is under way, it is anticipated that valuable information is being achieved about specific details on how idea management systems are governed and how idea campaigns are carried out. The findings may be particularly useful for innovation consultants as resources they can use to promote idea campaigning. The usefulness of the best practices highlighted as a result is, in any case, the most valuable output of this study.

Keywords: employee engagement, motivation, idea campaigns, large organizations, best practices, employees input, organizational output

Procedia PDF Downloads 159
8159 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 115
8158 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 177
8157 Numerical Modeling of a Retaining Wall in Soil Reinforced by Layers of Geogrids

Authors: M. Mellas, S. Baaziz, A. Mabrouki, D. Benmeddour

Abstract:

The reinforcement of massifs of backfill with horizontal layers of geosynthetics is an interesting economic solution, which ensures the stability of retaining walls. The mechanical behavior of reinforced soil by geosynthetic is complex, and requires studies and research to understand the mechanisms of rupture. The behavior of reinforcements in the soil and the behavior of the main elements of the system: reinforcement-wall-soil. The present study is interested in numerical modeling of a retaining wall in soil reinforced by horizontal layers of geogrids. This modeling makes use of the software FLAC3D. This work aims to analyze the effect of the length of the geogrid "L" where the soil massif is supporting a uniformly distributed surcharge "Q", taking into account the fixing elements rather than the layers of geogrids to the wall.

Keywords: retaining wall, geogrid, reinforced soil, numerical modeling, FLAC3D

Procedia PDF Downloads 468
8156 The Decrease of Collagen or Mineral Affect the Fracture in the Turkey Long Bones

Authors: P. Vosynek, T. Návrat, M. Peč, J. Pořízka, P. Diviš

Abstract:

Changes of mechanical properties and response behavior of bones is an important external sign of medical problems like osteoporosis, bone remodeling after fracture or surgery, osteointegration, or bone tissue loss of astronauts in space. Measuring of mechanical behavior of bones in physiological and osteoporotic states, quantified by different degrees of protein (collagen) and mineral loss, is thus an important topic in biomechanical research. This contribution deals with the relation between mechanical properties of the turkey long bone–tibia in physiological, demineralized, and deproteinized state. Three methods for comparison were used: densitometry, three point bending and harmonic response analysis. The results help to find correlations between the methods and estimate their possible application in medical practice.

Keywords: bone properties, long bone, osteoporosis, response behavior

Procedia PDF Downloads 467
8155 Characterization of Structural Elements in Metal Fiber Concrete

Authors: Ammari Abdelhammid

Abstract:

This work on the characterization of structural elements in metal fiber concrete is devoted to the study of recyclability, as reinforcement for concrete, of chips resulting from the machining of steel parts. We're interested in this study to the Rheological behavior of fresh chips reinforced concrete and its mechanical behavior at a young age. The evaluation of the workability with the LCL workabilimeter shows that optimal sand gravel ratios ( S/G) are S/G = 0.8 and S/G = 1. The study of the content chips (W%) influence on the workability of the concrete shows that the flow time and the S/G optimum increase with W%. For S/G = 1.4, the flow time is practically insensitive to the variation of W%, the concrete behavior is similar to that of self-compacting concrete. Mechanical characterization tests (direct tension, compression, bending, and splitting) show that the mechanical properties of chips concrete are comparable to those of the two selected reference concretes (concrete reinforced with conventional fibers: Eurosteel fibers corrugated and Dramix fibers). Chips provide a significant increase in strength and some ductility in the post-failure behavior of the concrete. Recycling chips as reinforcement for concrete can be favorably considered.

Keywords: fiber concrete, chips, workability, direct tensile test, compression test, bending test, splitting test

Procedia PDF Downloads 425
8154 SMRF Seismic Response: Unequal Beam Depths

Authors: Babak H. Mamaqani, Alimohammad Entezarmahdi

Abstract:

There are many researches on parameters affecting seismic behavior of steel moment frames. Great deal of these researches considers cover plate connections with or without haunch and direct beam to column connection for exterior columns. Also there are experimental results for interior connections with equal beam depth on both sides but not much research has been performed on the seismic behavior of joints with unequal beam depth. Based on previous experimental results, a series of companion analyses have been set up considering different beam height and connection detailing configuration to investigate the seismic behavior of the connections. Results of this study indicate that when the differences between beams height on both side increases, use of haunch connection system leads to significant improvement in the seismic response whereas other configurations did not provide satisfying results.

Keywords: analytical modeling, Haunch connection, seismic design, unequal beam depth

Procedia PDF Downloads 405
8153 The Behavior and Satisfaction of Tourists Affecting the Sustainable Tourism at the Amphawa Floating Market in Samut Songkhram Province

Authors: Chanpen Meenakorn

Abstract:

This research aims to study; (1) behavior of the tourists affecting the satisfaction level of tourism at the Amphawa floating market in Samut Songkhram province, (2) to study the satisfaction level of tourism at the Amphawa floating market. The research method will use quantitative research; data was collected by questionnaires distributed to the tourist who visits the Amphawa floating market for 480 samples. Data was analyzed by SPSS software to process descriptive statistic including frequency, percentage, mean, standard deviation and inferential statistic is t-test, F-test, and chi-square. The results showed that the behavior of tourists had known tourist attractions in the province comes from the mouth of relatives and friends suggested that he come here before and the reasons to visit is to want to pay homage to the various temples for the frequency to visit travel an average of 2-4 times and  the satisfaction of the tourists in the province found that the satisfaction level of tourists in the province at the significant level of the place, convenient  and services have a high level of satisfaction.

Keywords: amphawa floating market behavior of the tourists, satisfaction level, sustainable tourism, Samut Songkhram province

Procedia PDF Downloads 350
8152 Effects of Aromatase Inhibitor (Fadrozole) Induced Sex-Reversal in Chicken (Gimmizah strain) on Morphology

Authors: Hatem Shreha

Abstract:

Aromatase inhibitors administered before sexual differentiation of the gonads can induce sex reversal in female chickens (phenotypic male). To analyze the process of sex reversal, we have followed for several months the changes induced by Fadrozole, a nonsteroidal aromatase inhibitor on the morphology of female sex-reversed and female sex-reversed supplemented with L-tyrosine which was previously shown to stimulate the release of Gn Rh. Fadrozole (1mg/egg) was injected into eggs on day four of incubation, phenotypic males and phenotypic males treated with L-tyrosine and males hatched from eggs injected Fadrozole were sacrificed by slaughtering at 16 weeks old and the remaining chicks were sacrificed at 28 weeks old. Both sexes from control chickens were sacrificed at the same age (16 &28 weeks). Hatchability, behavior, body weight, shank length, comb weight, testes weight, blood cells count and wattle weight of sex reversal were tested at 16 and 28 weeks. The results showed that body weight, comb weight, wattles weight and shank length of sex-reversed females were significantly different from control female. Behavior of phenotypic males and phenotypic males fed on L- tyrosine showed aggressive sexual behavior like that of control males and absence of laying behavior. In conclusion our results confirm that Fedrazole injection in eggs before sex differentiation produce a male behavior and morphological index of male in female chicken.

Keywords: sex reversal, fadrozole, phenotypic male, L- tyrosine

Procedia PDF Downloads 594
8151 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 126
8150 Radiation Safety Factor of Education and Research Institution in Republic of Korea

Authors: Yeo Ryeong Jeon, Pyong Kon Cho, Eun Ok Han, Hyon Chul Jang, Yong Min Kim

Abstract:

This study surveyed on recognition related to radiation safety for radiation safety managers and workers those who have been worked in Republic of Korea education and research institution. At present, South Korea has no guideline and manual of radiation safety for education and research institution. Therefore, we tried to find an educational basis for development of radiation safety guideline and manual. To check the level of knowledge, attitude, and behavior about radiation safety, we used the questionnaire that consisted of 29 questions against knowledge, attitude and behavior, 4 questions against self-efficacy and expectation based on four factors (radiation source, human, organizational and physical environment) of the Haddon's matrix. Responses were collected between May 4 and June 30, 2015. We analyzed questionnaire by means of IBM SPSS/WIN 15 which well known as statistical package for social science. The data were compared with mean, standard deviation, Pearson's correlation, ANOVA (analysis of variance) and regression analysis. 180 copies of the questionnaire were returned from 60 workplaces. The overall mean results for behavior level was relatively lower than knowledge and attitude level. In particular, organizational environment factor on the radiation safety management indicated the lowest behavior level. Most of the factors were correlated in Pearson’s correlation analysis, especially between knowledge of human factors and behavior of human factors (Pearson’s correlation coefficient 0.809, P<.01). When analysis performed in line with the main radiation source type, institutions where have been used only opened RI (radioisotope) behavior level was the lowest among all subjects. Finally, knowledge of radiation source factor (β=0.556, P<.001) and human factor(β=0.376, P<.001) had the greatest impact in terms of behavior practice. Radiation safety managers and workers think positively about radiation safety management, but are poorly informed organizational environment of their institution. Thus, each institution need to efforts to settlement of radiation safety culture. Also, pedagogical interventions for improving knowledge on radiation safety needs in terms of safety accident prevention.

Keywords: radiation safety management, factor analysis, SPSS, republic of Korea

Procedia PDF Downloads 350
8149 Behavior of an Elevated Liquid Storage Tank under Near-Fault Earthquakes

Authors: Koushik Roy, Sourav Gur, Sudib K. Mishra

Abstract:

Evidence of pulse type features in near-fault ground motions has raised serious concern to the structural engineering community, in view of their possible implications on the behavior of structures located on the fault regions. Studies in the recent past explore the effects of pulse type ground motion on the special structures, such as transmission towers in view of their high flexibility. Identically, long period sloshing of liquid in the storage tanks under dynamic loading might increase their failure vulnerability under near-fault pulses. Therefore, the behavior of the elevated liquid storage tank is taken up in this study. Simple lumped mass model is considered, with the bilinear force-deformation hysteresis behavior. Set of near-fault seismic ground acceleration time histories are adopted for this purpose, along with the far-field records for comparison. It has been demonstrated that pulse type motions lead to significant increase of the responses; in particular, sloshing of the fluid mass could be as high as 5 times, then the far field counterpart. For identical storage capacity, slender tanks are found to be more vulnerable than the broad ones.

Keywords: far-field motion, hysteresis, liquid storage tank, near fault earthquake, sloshing

Procedia PDF Downloads 387
8148 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 354