Search results for: private cloud
1221 Granger Causal Nexus between Financial Development and Energy Consumption: Evidence from Cross Country Panel Data
Authors: Rudra P. Pradhan
Abstract:
This paper examines the Granger causal nexus between financial development and energy consumption in the group of 35 Financial Action Task Force (FATF) Countries over the period 1988-2012. The study uses two financial development indicators such as private sector credit and stock market capitalization and seven energy consumption indicators such as coal, oil, gas, electricity, hydro-electrical, nuclear and biomass. Using panel cointegration tests, the study finds that financial development and energy consumption are cointegrated, indicating the presence of a long-run relationship between the two. Using a panel vector error correction model (VECM), the study detects both bidirectional and unidirectional causality between financial development and energy consumption. The variation of this causality is due to the use of different proxies for both financial development and energy consumption. The policy implication of this study is that economic policies should recognize the differences in the financial development-energy consumption nexus in order to maintain sustainable development in the selected 35 FATF countries.Keywords: energy consumption, financial development, FATF countries, Panel VECM
Procedia PDF Downloads 2641220 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit
Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana
Abstract:
Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification
Procedia PDF Downloads 1531219 Infrastructure Change Monitoring Using Multitemporal Multispectral Satellite Images
Authors: U. Datta
Abstract:
The main objective of this study is to find a suitable approach to monitor the land infrastructure growth over a period of time using multispectral satellite images. Bi-temporal change detection method is unable to indicate the continuous change occurring over a long period of time. To achieve this objective, the approach used here estimates a statistical model from series of multispectral image data over a long period of time, assuming there is no considerable change during that time period and then compare it with the multispectral image data obtained at a later time. The change is estimated pixel-wise. Statistical composite hypothesis technique is used for estimating pixel based change detection in a defined region. The generalized likelihood ratio test (GLRT) is used to detect the changed pixel from probabilistic estimated model of the corresponding pixel. The changed pixel is detected assuming that the images have been co-registered prior to estimation. To minimize error due to co-registration, 8-neighborhood pixels around the pixel under test are also considered. The multispectral images from Sentinel-2 and Landsat-8 from 2015 to 2018 are used for this purpose. There are different challenges in this method. First and foremost challenge is to get quite a large number of datasets for multivariate distribution modelling. A large number of images are always discarded due to cloud coverage. Due to imperfect modelling there will be high probability of false alarm. Overall conclusion that can be drawn from this work is that the probabilistic method described in this paper has given some promising results, which need to be pursued further.Keywords: co-registration, GLRT, infrastructure growth, multispectral, multitemporal, pixel-based change detection
Procedia PDF Downloads 1331218 Improving Waste Recycling and Resource Productivity by Integrating Smart Resource Tracking System
Authors: Atiq Zaman
Abstract:
The high contamination rate in the recycling waste stream is one of the major problems in Australia. In addition, a lack of reliable waste data makes it even more difficult for designing and implementing an effective waste management plan. This article conceptualizes the opportunity to improve resource productivity by integrating smart resource tracking system (SRTS) into the Australian household waste management system. The application of the smart resource tracking system will be implemented through the following ways: (i) mobile application-based resource tracking system used to measure the household’s material flow; (ii) RFID, smart image and weighing system used to track waste generation, recycling and contamination; (iii) informing and motivating manufacturer and retailers to improve their problematic products’ packaging; and (iv) ensure quality and reliable data through open-sourced cloud data for public use. The smart mobile application, imaging, radio-frequency identification (RFID) and weighing technologies are not new, but the very straightforward idea of using these technologies in the household resource consumption, waste bins and collection trucks will open up a new era of accurately measuring and effectively managing our waste. The idea will bring the most urgently needed reliable, data and clarity on household consumption, recycling behaviour and waste management practices in the context of available local infrastructure and policies. Therefore, the findings of this study would be very important for decision makers to improve resource productivity in the waste industry by using smart resource tracking system.Keywords: smart devices, mobile application, smart sensors, resource tracking, waste management, resource productivity
Procedia PDF Downloads 1431217 Hegemonic Salaryman Masculinity: Case Study of Transitional Male Gender Roles in Today's Japan
Authors: D. Norton
Abstract:
This qualitative study focuses on the lived experience and displacement of young white-collar masculinities in Japan. In recent years, the salaryman lifestyle has undergone significant disruption - increased competition for regular employment, rise in non-regular structurings of labour across public/private sectors, and shifting role expectations within the home. Despite this, related scholarship hints at a continued reinforcement of the traditional male gender role - that the salaryman remains a key benchmark of Japanese masculine identity. For those in structural proximity to these more ‘normative’ performativities, interest lies their engagement with such narratives - how they make sense of their masculinity in response to stated changes. In light of the historical emphasis on labour and breadwinning logics, notions of respective security or precarity generated as a result remain unclear. Similarly, concern extends to developments within the private sphere - by what means young white-collar men construct ideas of singlehood and companionship according to traditional gender ideologies or more contemporary, flexible readings. The influence of these still-emergent status distinctions on the logics of the social group in question is yet to be explored in depth by gender scholars. This project, therefore, focuses on a salaryman archetype as hegemonic - its transformation amidst these changes and socialising mechanisms that continue to legitimate unequal gender hierarchies. For data collection, a series of ethnographic interviews were held over a period of 12 months with university-educated, white-collar male employees from both Osaka and the Greater Tokyo Area. Findings suggest a modern salaryman ideal reflecting both continuities and shifts within white-collar employment. Whilst receptive to more contemporary workplace practices, the narratives of those interviewed remain imbued with logics supporting patterns of internal hegemony. Regular/non-regular distinction emerged as the foremost variable for both material and discursive patterns of white-collar stratification, with variants of displacement for each social group. Despite the heightened valorisation of stable employment, regular workers articulated various concerns over a model of corporate masculinity seen to be incompatible with recent socioeconomic developments. Likewise, non-regular employees face detachment owing to a still-inflexible perception of their working masculinity as marginalized amidst economic precarity. In seeking to negotiate respective challenges, those interviewed demonstrated an engagement with various concurrent social changes that would often either accommodate, reinforce, or expand upon traditional role behaviours. Few of these narratives offered any notable transgression of said ideal, however, suggesting that within the spectre of white-collar employment in Japan for the near future, any substantive transformation of corporate masculinity remains dependant upon economic developments, less so the agency of those involved.Keywords: gender ideologies, hegemonic masculinity, Japan, white-collar employment
Procedia PDF Downloads 1221216 Extracting Terrain Points from Airborne Laser Scanning Data in Densely Forested Areas
Authors: Ziad Abdeldayem, Jakub Markiewicz, Kunal Kansara, Laura Edwards
Abstract:
Airborne Laser Scanning (ALS) is one of the main technologies for generating high-resolution digital terrain models (DTMs). DTMs are crucial to several applications, such as topographic mapping, flood zone delineation, geographic information systems (GIS), hydrological modelling, spatial analysis, etc. Laser scanning system generates irregularly spaced three-dimensional cloud of points. Raw ALS data are mainly ground points (that represent the bare earth) and non-ground points (that represent buildings, trees, cars, etc.). Removing all the non-ground points from the raw data is referred to as filtering. Filtering heavily forested areas is considered a difficult and challenging task as the canopy stops laser pulses from reaching the terrain surface. This research presents an approach for removing non-ground points from raw ALS data in densely forested areas. Smoothing splines are exploited to interpolate and fit the noisy ALS data. The presented filter utilizes a weight function to allocate weights for each point of the data. Furthermore, unlike most of the methods, the presented filtering algorithm is designed to be automatic. Three different forested areas in the United Kingdom are used to assess the performance of the algorithm. The results show that the generated DTMs from the filtered data are accurate (when compared against reference terrain data) and the performance of the method is stable for all the heavily forested data samples. The average root mean square error (RMSE) value is 0.35 m.Keywords: airborne laser scanning, digital terrain models, filtering, forested areas
Procedia PDF Downloads 1381215 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 101214 Pilot Study of the Psychometric Properties of the Test of Predisposition towards the Bullying
Authors: Rosana Choy, Fabiola Henostroza
Abstract:
Actual theory suggests social-ecological factors as the main framework of bullying. Most previous research in this phenomenon is focused on the identification of bullying attitudes and conducts in puberty and adolescence periods. For this reason, this study is considered as a contribution to the existing knowledge in measuring matters, because of its non-traditional way of evaluation (graphic items), and because of its approach to a distinctive age group, children from 7 to 9 years-old, not regularly examined in current studies in this field. The research used a transversal descriptive investigation design for the development of a graphic test for bullying predisposition. The process began with the operationalization of the variable bullying predisposition, the structuring of the factors and variable indicators of a pilot instrument, evaluation by experts of the items representation, and finally it continued with the test application to children of two types of regular school population in Lima-Peru: private and public schools. The reliability level was 0.85 and the validity of the test corroborated the three-factor structure proposed by the researchers.Keywords: bullying, graphic test, reliability, validity
Procedia PDF Downloads 2661213 Machine Learning Classification of Fused Sentinel-1 and Sentinel-2 Image Data Towards Mapping Fruit Plantations in Highly Heterogenous Landscapes
Authors: Yingisani Chabalala, Elhadi Adam, Khalid Adem Ali
Abstract:
Mapping smallholder fruit plantations using optical data is challenging due to morphological landscape heterogeneity and crop types having overlapped spectral signatures. Furthermore, cloud covers limit the use of optical sensing, especially in subtropical climates where they are persistent. This research assessed the effectiveness of Sentinel-1 (S1) and Sentinel-2 (S2) data for mapping fruit trees and co-existing land-use types by using support vector machine (SVM) and random forest (RF) classifiers independently. These classifiers were also applied to fused data from the two sensors. Feature ranks were extracted using the RF mean decrease accuracy (MDA) and forward variable selection (FVS) to identify optimal spectral windows to classify fruit trees. Based on RF MDA and FVS, the SVM classifier resulted in relatively high classification accuracy with overall accuracy (OA) = 0.91.6% and kappa coefficient = 0.91% when applied to the fused satellite data. Application of SVM to S1, S2, S2 selected variables and S1S2 fusion independently produced OA = 27.64, Kappa coefficient = 0.13%; OA= 87%, Kappa coefficient = 86.89%; OA = 69.33, Kappa coefficient = 69. %; OA = 87.01%, Kappa coefficient = 87%, respectively. Results also indicated that the optimal spectral bands for fruit tree mapping are green (B3) and SWIR_2 (B10) for S2, whereas for S1, the vertical-horizontal (VH) polarization band. Including the textural metrics from the VV channel improved crop discrimination and co-existing land use cover types. The fusion approach proved robust and well-suited for accurate smallholder fruit plantation mapping.Keywords: smallholder agriculture, fruit trees, data fusion, precision agriculture
Procedia PDF Downloads 531212 Gender-Based Violence Public Art Projects: An Analysis of the Value of Including Social Justice Topics in Tertiary Courses
Authors: F. Saptouw
Abstract:
This paper will examine the value of introducing social justice issues into the tertiary fine art curriculum at a first-year level. The paper will present detail of the conceptual impetus and the logistics related to the execution of a collaborative teaching project. The cohort of students was registered for the Fine Art Foundation course at the Michaelis School of Fine Art at the University of Cape Town. The course is dedicated to the development of critical thinking, communication skills, and varied approaches to knowledge construction within the first-year cohort. A core component of the course is the examination of the representation of gender, identity, politics, and power. These issues are examined within a range of public and private representations like art galleries, museum spaces, and contemporary popular culture. This particular project was a collaborative project with the Office of Inclusivity and Change, and the project leaders were Fabian Saptouw and Gabriel Khan. The paper will conclude by presenting an argument for the importance of such projects within the tertiary environment.Keywords: art, education, gender-based violence, social responsiveness
Procedia PDF Downloads 1361211 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 1831210 Research on the Public Governance of Urban Public Green Spaces from the Perspective of Institutional Economics
Authors: Zhang Xue
Abstract:
Urban public green spaces have evolved from classical private gardens and have expanded into multi-dimensional space value attributes such as scale and property rights. Among them, ecological, environmental value, social interaction value, and commercial, economic value have become consensual value characteristics. From the perspective of institutional economics, urban public green spaces, as a type of non-exclusive and non-competitive public good, express the social connotation of spatial "publicness" and multiple values are its important attributes. However, due to the positive externality characteristics of public green spaces, the cost-benefit functions between subjects are inconsistent, leading to issues such as the "anti-commons tragedy" of transitional management, lack of public sense of space responsibility, and weakened public nature. It is necessary to enhance the "publicness" of urban public green spaces through effective institutional arrangements, inclusive planning participation, and humane management measures, promoting urban public openness and the enhancement of multiple values.Keywords: public green spaces, publicness, governance, institutional economics
Procedia PDF Downloads 541209 Improved Processing Speed for Text Watermarking Algorithm in Color Images
Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari
Abstract:
Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.Keywords: steganography, watermarking, time complexity measurements, private keys
Procedia PDF Downloads 1421208 Sonic Therapeutic Intervention for Preventing Financial Fraud: A Phenomenological Study
Authors: Vasudev Das
Abstract:
In a global survey of more than 5,000 participants in 99 territories, PwC found a loss of $42 billion through fraud in the last 24 months. The specific problem is that private and public organizational leaders often do not understand the importance of sonic therapeutic intervention in preventing financial fraud. The study aimed to explore sonic therapeutic intervention practitioners' lived experiences regarding the value of sonic therapeutic intervention in preventing financial fraud. The data collection methods were semi-structured interviews of purposeful samples and documentary reviews, which were analyzed thematically. Four themes emerged from the analysis of interview transcription data: Sonic therapeutic intervention enabled self-control, pro-spiritual values, consequentiality mindset, and post-conventional consciousness. The itemized four themes helped non-engagement in financial fraud. Implications for positive social change include enhanced financial fraud management, more significant financial leadership, and result-oriented decision-taking in the financial market. Also, the study results can improve the increased de-escalation of anxiety/stress associated with defrauding.Keywords: consciousness, consequentiality, rehabilitation, reintegration
Procedia PDF Downloads 1591207 Unconscious Bias in Judicial Decisions: Legal Genealogy and Disgust in Cases of Private, Adult, Consensual Sexual Acts Leading to Injury
Authors: Susanna Menis
Abstract:
‘Unconscious’ bias is widespread, affecting society on all levels of decision-making and beyond. Placed in the law context, this study will explore the direct effect of the psycho-social and cultural evolution of unconscious bias on how a judicial decision was made. The aim of this study is to contribute to socio-legal scholarship by examining the formation of unconscious bias and its influence on the creation of legal rules that judges believe reflect social solidarity and protect against violence. The study seeks to understand how concepts like criminalization and unlawfulness are constructed by the common law. The study methodology follows two theoretical approaches: historical genealogy and emotions as sociocultural phenomena. Both methods have the ‘tracing back’ of the original formation of a social way of seeing and doing things in common. The significance of this study lies in the importance of reflecting on the ways unconscious bias may be formed; placing judges’ decisions under this spotlight forces us to challenge the status quo, interrogate justice, and seek refinement of the law.Keywords: legal geneology, emotions, disgust, criminal law
Procedia PDF Downloads 591206 Bio Ethanol Production From the Co-Mixture of Jatropha Carcus L. Kernel Cake and Rice Straw
Authors: Felix U. Asoiro, Daniel I. Eleazar, Peter O. Offor
Abstract:
As a result of increasing energy demands, research in bioethanol has increased in recent years all through the world, in abide to partially or totally replace renewable energy supplies. The first and third generation feedstocks used for biofuel production have fundamental drawbacks. Waste rice straw and cake from second generation feedstock like Jatropha curcas l. kernel (JC) is seen as non-food feedstock and promising candidates for the industrial production of bioethanol. In this study, JC and rice husk (RH) wastes were characterized for proximate composition. Bioethanol was produced from the residual polysaccharides present in rice husk (RH) and Jatropha seed cake by sequential hydrolytic and fermentative processes at varying mixing proportions (50 g JC/50 g RH, 100 g JC/10 g RH, 100 g JC/20 g RH, 100 g JC/50 g RH, 100 g JC/100 g RH, 100 g JC/200 g RH and 200 g JC/100 g RH) and particle sizes (0.25, 0.5 and 1.00 mm). Mixing proportions and particle size significantly affected both bioethanol yield and some bioethanol properties. Bioethanol yield (%) increased with an increase in particle size. The highest bioethanol (8.67%) was produced at a mixing proportion of 100 g JC/50g RH at 0.25 mm particle size. The bioethanol had the lowest values of specific gravity and density of 1.25 and 0.92 g cm-3 and the highest values of 1.57 and 0.97 g cm-3 respectively. The highest values of viscosity (4.64 cSt) were obtained with 200 g JC/100 g RH, at 1.00 mm particle size. The maximum flash point and cloud point values were 139.9 oC and 23.7oC (100 g JC/200 g RH) at 1 mm and 0.5 mm particle sizes respectively. The maximum pour point value recorded was 3.85oC (100 g JC/50 g RH) at 1 mm particle size. The paper concludes that bioethanol can be recovered from JC and RH wastes. JC and RH blending proportions as well as particle sizes are important factors in bioethanol production.Keywords: bioethanol, hydrolysis, Jatropha curcas l. kernel, rice husk, fermentation, proximate composition
Procedia PDF Downloads 941205 A Sociopreneur Based on Creative Services of Merchandise (Kedaikampus)
Authors: Wildan Maulana, M. Machfudz Sa'idi
Abstract:
Special Region of Yogyakarta (DIY) has more than one hundred campuses of State Universities, and private sector amounted to 137, of course, is not a small amount, from 137 universities in the province there are hundreds of thousands of students, therefore, many kinds of businesses and business opportunities can provide support facilities supporting the needs of students ranging from life support classes or students who come from various regions in Indonesia and Abroad can be fulfilled during his education in DI Yogyakarta including the need for primary and secondary needs. KedaiKampus present to facilitate the needs of students in providing secondary needs such as clothing Students and merchandise or trinkets typical college respectively, but the difference with the other, KedaiKampus is to provide distinctive products and clothing and merchandise every college respectively. One goal KedaiKampus presence is to create a culture of confidence in every student who is proud of the college with the products of KedaiKampus because not a few students who are not accepted at State Universities have not been able to forget. In producing a wide range of products, we work with young entrepreneurs engaged in creative services and souvenirs. In addition, we are also working with various designers reliable to make the best design.Keywords: markedplace, sociopreneur, merchandise, creative services
Procedia PDF Downloads 2531204 Emerging Threats and Adaptive Defenses: Navigating the Future of Cybersecurity in a Hyperconnected World
Authors: Olasunkanmi Jame Ayodeji, Adebayo Adeyinka Victor
Abstract:
In a hyperconnected world, cybersecurity faces a continuous evolution of threats that challenge traditional defence mechanisms. This paper explores emerging cybersecurity threats like malware, ransomware, phishing, social engineering, and the Internet of Things (IoT) vulnerabilities. It delves into the inadequacies of existing cybersecurity defences in addressing these evolving risks and advocates for adaptive defence mechanisms that leverage AI, machine learning, and zero-trust architectures. The paper proposes collaborative approaches, including public-private partnerships and information sharing, as essential to building a robust defence strategy to address future cyber threats. The need for continuous monitoring, real-time incident response, and adaptive resilience strategies is highlighted to fortify digital infrastructures in the face of escalating global cyber risks.Keywords: cybersecurity, hyperconnectivity, malware, adaptive defences, zero-trust architecture, internet of things vulnerabilities
Procedia PDF Downloads 191203 Syrian-Armenian Women Refugees: Crossing Borders between the Past and the Present, Negotiating between the Private and the Public
Authors: Ani Kojoyan
Abstract:
The Syrian refugee crisis has been a matter of worldwide concern during the recent years. And though refugees’ problems are contextualized in terms of time and space, the refugee crisis still remains a global issue to discuss. Since the start of the conflict, Armenia has welcomed thousands of Syrian refugees too. Taking into consideration Armenia’s current socio-economic and geopolitical situation, the flow of refugees is a challenge both for the country and for refugees themselves. However, these people are not simply refugees from Syria, they are Syrian-Armenian refugees; people whose ancestors were survivals of the Armenian Genocide, perpetrated by the Ottoman Turks in 1915, people whose ancestors became refugees a century ago in Syria and now, ironically, a century later they follow their ancestors’ paths, turning into refugees themselves in their historical homeland, facing various difficulties, among them socio-economic, socio-ideological, and identity and gender issues, the latter being the main topic of discussion in the present paper. The situation presented above makes us discuss certain questions within this study: how do Syrian-Armenian refugees define themselves and their status? Which are their gender roles in the socio-economic context? How do social and economic challenges re-shape Syrian-Armenian women refugees’ identities? The study applies qualitative research methods of analysis, which includes semi-structured and in-depth interviews with 15 participants (18-25, 26-40 age groups), and two focus group works, involving 8 participants (18-35 age group) for each focus group activity. The activities were carried out in October 2016, Yerevan, Armenia. The study also includes Secondary Data Analysis. In addition, in order to centralize refugee women’s experiences and identity issues, the study adopts a qualitative lens from a feminist standpoint position. It is based on the assumption that human activity structures and limits understanding, and that the distorted comprehension of events or activities has emerged from the male-oriented dominant judgement which can be discovered through uncovering the understanding of the situation from women’s activity perspectives. The findings suggest that identity is dynamic, complex, over-changing and sensitive to time and space, gender and class. The process of re-shaping identity is even more complicated and multi-layered and is based on internal and external factors, conditioned by individual and collective needs and interests. Refugees are mostly considered as people who lost their identity in the past since they have no longer connection anywhere and try to find it in the present. In turn, female refugees, being a more vulnerable class, go through more complicated identity re-formulating discourse negotiations. They stand between the borders of the old and new, borders of lost and re-found selves, borders of creating and self-fashioning, between illusions and the challenging reality. Particularly, refugee women become more sensitive within the discourses of the private and the public domains: some of them try to create a ‘new-self’, creating their space in a new society, whereas others try to negotiate their affective/emotional labour within their own family domains.Keywords: feminist standpoint position, gender, identity, refugee studies, Syrian-Armenian women refugees
Procedia PDF Downloads 2241202 Direct Growth Rates of the Information Model for Traffic at the Service of Sustainable Development of Tourism in Dubrovacko-Neretvanska County 2014-2020
Authors: Vinko Viducic, Jelena Žanic Mikulicic, Maja Racic, Kristina Sladojevic
Abstract:
The research presented in this paper has been focused on analyzing the impact of traffic on the sustainable development of tourism in Croatia's Dubrovacko-Neretvanska County by the year 2020, based on the figures and trends reported in 2014 and using the relevant variables that characterise the synergy of traffic and tourism in, speaking from the geographic viewpoint, the most problematic county in the Republic of Croatia. The basic hypothesis has been confirmed through scientifically obtained research results, through the quantification of the model's variables and the direct growth rates of the designed model. On the basis of scientific insights into the sustainable development of traffic and tourism in Dubrovacko-Neretvanska County, it is possible to propose a new information model for traffic at the service of the sustainable development of tourism in the County for the period 2014-2020.Keywords: environment protection, hotel industry, private sector, quantification
Procedia PDF Downloads 2781201 Nexus Between Library and Information Science Education Training and Practice in Nigeria: A Critical Assessment of the Synergy
Authors: Adebayo Emmanuel Layi
Abstract:
Library and Information Science Education is about six (6) decades old in Nigeria. The first Library School was established in 1962 at the University of Ibadan, and since then, several institutions have been running the programme under various certifications, providing the manpower needs of professionals for libraries. As at June 2023, Nigeria has close to a thousand (1000) tertiary institutions and all needing the services of librarians. Apart from the tertiary institutions, several libraries exit in various establishments, both government, private and non-governmental organisations. These has underscored the enormous need for trained librarians for the libraries in these places. The Nexus between LIS Education training and Practice is like a puzzle of egg and chick, which one came first and against this background, this paper examined the roles of the colonial masters in educational development in Africa and vis-à-vis the influence of great library educators such as Melvil Dewey and other educators and the journey through Nigeria institutions. Despite the sound footing of LIS Education, Noise which seems to be a major obstacle on the practice as well as mending the broken link were all examined in the paper. Strategies and the way forward for overall development are suggested.Keywords: nexus, education, training, synergy
Procedia PDF Downloads 911200 Transition to Hydrogen Cities in Korea and Japan
Authors: Minhee Son, Kyung Nam Kim
Abstract:
This study explores the plan of the Korean and Japanese governments to transition into the hydrogen economy. Two motor companies, Hyundai Motor Company from Korea and Toyota from Japan, released the Hydrogen Fuel Cell Vehicle to monopolize the green energy automobile market. Although, they are the main countries which emit greenhouse gas, hydrogen energy can bring from a certain industry places, such as chemical plants and steel mills. Recent, the two countries have been focusing on the hydrogen industry including a fuel cell vehicle, a hydrogen station, a fuel cell plant, a residential fuel cell. The purpose of this paper is to find out the differences of the policies in the two countries to be hydrogen societies. We analyze the behavior of the public and private sectors in Korea and Japan about hydrogen energy and fuel cells for the transition of the hydrogen economy. Finally we show the similarities and differences of both countries in hydrogen fuel cells. And some cities have feature such as Hydrogen cities. Hydrogen energy can make impact environmental sustainability.Keywords: fuel cell, hydrogen city, hydrogen fuel cell vehicle, hydrogen station, hydrogen energy
Procedia PDF Downloads 4861199 A Review of Information Systems Development in Developing Countries
Authors: B. N. Asare, O. A. Ajigini
Abstract:
Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model
Procedia PDF Downloads 3761198 Perceptions of Climate Change and Adaptation of Climate-Smart Technology by the Paddy Farmers: A Case Study of Kandy District in Sri Lanka
Authors: W. A. D. P. Wanigasundera, P. C. B. Alahakoon
Abstract:
Kandy district in Sri Lanka has small scale and rain-fed paddy farming, and highly vulnerable to climate change. In this study, the status of climate change was assessed using meteorological data and compared with the perceptions of paddy farming community. Factors affecting the adaptation to the climate smart farming were also assessed. Meteorological data for 33 years were collected and the changes over time compared with the perceptions of farmers. The temperature, rainfall and number of rainy days have increased in both locations. The onset of rains also has shifted. The perceptions of the majority of the farmers were in line with the actual changes. The knowledge and attitudes about the causes of climate change and adaptation were medium and related to level of adoption. Formulating effective communication strategies, and a collaborative approach involving state, private sector, civil society to make Sri Lankan agriculture ‘climate-smart’ is urgently needed.Keywords: adaptation of climate-smart technology, climate change, perception, rain-fed paddy
Procedia PDF Downloads 3301197 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network
Abstract:
Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering
Procedia PDF Downloads 1241196 Effect of Poly Naphthalene Sulfonate Superplasticizer on Constructibility of Roller-Compacted Concrete Pavement
Authors: Chamroeun Chhorn, Seong Jae Hong, Yoon-Ho Cho, Hyun Jong Lee, Seung Woo Lee
Abstract:
The use of Roller-Compacted Concrete Pavement (RCCP) in public and private applications has been increasing steadily in the past few decades due to its cost saving. This eco-concrete pavement shares construction characteristics from asphalt pavement and material characteristics from the conventional concrete pavement. Due to its low binder and water content, the consistency of Roller-Compacted Concrete (RCC) is typically very stiff. Thus, it is crucial to control the consistency of this concrete. Without appropriate consistency, required density may not be achieved in actual construction for RCCP. The purpose of this study is to investigate the effect on Poly Naphtalene Sulfonate (PNS) superplasticizer on the consistency of RCC as well as its compactibility in actual construction. From this study, it was found that PNS superplasticizer can effectively reduce the stiffness of an RCC mixture and maintain it for a sufficient amount of time without compromising its strength properties. Moreover, it was observed from field test specimens that the use of this admixture can also improve the compaction efficiency throughout the whole depth of pavement.Keywords: roller-compacted concrete, consistency, compactibility, poly naphthalene sulfonate superplasticizer
Procedia PDF Downloads 2501195 Exploring Acceptance of Artificial Intelligence Software Solution Amongst Healthcare Personnel: A Case in a Private Medical Centre
Authors: Sandra So, Mohd Roslan Ismail, Safurah Jaafar
Abstract:
With the rapid proliferation of data in healthcare has provided an opportune platform creation of Artificial Intelligence (AI). AI has brought a paradigm shift for healthcare professionals, promising improvement in delivery and quality. This study aims to determine the perception of healthcare personnel on perceived ease of use, perceived usefulness, and subjective norm toward attitude for artificial intelligence acceptance. A cross-sectional single institutional study of employees’ perception of adopting AI in the hospital was conducted. The survey was conducted using a questionnaire adapted from Technology Acceptance Model and a four-point Likert scale was used. There were 96 or 75.5% of the total population responded. This study has shown the significant relationship and the importance of ease of use, perceived usefulness, and subjective norm to the acceptance of AI. In the study results, it concluded that the determining factor to the strong acceptance of AI in their practices is mostly those respondents with the most interaction with the patients and clinical management.Keywords: artificial intelligence, machine learning, perceived ease of use, perceived usefulness, subjective norm
Procedia PDF Downloads 2251194 Effects of Using Interactive Whiteboards at High School Mathematics Classrooms
Authors: Huseyin Demir
Abstract:
This article is the results of a quantitative research about the effects of using interactive whiteboards in high school mathematics classroom. The aim of this article is to investigate the effects of using interactive whiteboards in high school mathematics classrooms. During the article the following questions are answered: 'What can we do with an interactive whiteboard?' and 'Do we really need those properties of the interactive whiteboard?' For the research part of the article, two groups of lessons are executed in Private Demirel College. In the first 6 weeks, the topics are taught on a normal blackboard. Starting from seventh week, we have used interactive whiteboard in the mathematics lessons. At the end of an eight week lectures with interactive whiteboards, a questionnaire is prepared and executed for the students. In the questionnaire 10 questions were asked about the benefits and differences of using the interactive whiteboards in mathematics lessons. By looking at the conclusion of the results of questionnaire and some discussions with the students we found some useful benefits of the usage of interactive whiteboards in mathematics lessons. This article will be helpful for the high school mathematics teachers.Keywords: mathematics education, interactive whiteboard, blackboard, using interactive whiteboard in mathematics lessons
Procedia PDF Downloads 2181193 Education in Technology for Sustainable Development Applied to School Gardens
Authors: Sara Blanc, José V. Benlloch-Dualde, Laura Grindei, Ana C. Torres, Angélica Monteiro
Abstract:
This paper presents a study that leads a new experience by introducing digital learning applied to a case study focused on primary and secondary school garden-based education. The approach represents an example of interaction among different education and research agents at different countries and levels, such as universities, public and private research, and schools, to get involved in the implementation of education for sustainable development that will make students become more sensible to natural environment, more responsible for their consumption, more aware about waste reduction and recycling, more conscious of the sustainable use of natural resources and, at the same time, more ‘digitally competent’. The experience was designed attending to the European digital education context and OECD directives in transversal skills education. The paper presents the methodology carried out in the study as well as outcomes obtained from experience.Keywords: school gardens, primary education, secondary education, science technology and innovation in education, digital learning, sustainable development goals, university, knowledge transference
Procedia PDF Downloads 1161192 Solar Energy Potential Studies of Sindh Province, Pakistan for Power Generation
Authors: M. Akhlaque Ahmed, Sidra A. Shaikh, Maliha Afshan Siddiqui
Abstract:
Solar radiation studies of Sindh province have been studied to evaluate the solar energy potential of the area. Global and diffuse solar radiation on horizontal surface over five cities namely Karachi, Hyderabad, Nawabshah, Chore and Padidan of Sindh province were carried out using sun shine hour data of the area to assess the feasibility of solar energy utilization. The result obtained shows a large variation of direct and diffuse component of solar radiation in winter and summer months. 50% direct and 50% diffuse solar radiation for Karachi and Hyderabad were observed and for Chore in summer month July and August the diffuse radiation is about 33 to 39%. For other areas of Sindh such as Nawabshah and Patidan the contribution of direct solar radiation is high throughout the year. The Kt values for Nawabshah and Patidan indicates a clear sky almost throughout the year. In Nawabshah area the percentage of diffuse radiation does not exceed more than 29%. The appearance of cloud is rare even in the monsoon months July and August whereas Karachi and Hyderabad and Chore has low solar potential during the monsoon months. During the monsoon period Karachi and Hyderabad can utilize hybrid system with wind power as wind speed is higher. From the point of view of power generation the estimated values indicate that Karachi and Hyderabad and chore has low solar potential for July and August while Nawabshah, and Padidan has high solar potential Throughout the year.Keywords: global and diffuse solar radiation, province of Sindh, solar energy potential, solar radiation studies for power generation
Procedia PDF Downloads 257