Search results for: public order and security act
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20567

Search results for: public order and security act

19307 Perceived Procedural Justice and Organizational Citizenship Behavior: Evidence from a Security Organization

Authors: Noa Nelson, Orit Appel, Rachel Ben-ari

Abstract:

Organizational Citizenship Behavior (OCB) is voluntary employee behavior that contributes to the organization beyond formal job requirements. It can take different forms, such as helping teammates (OCB toward individuals; hence, OCB-I), or staying after hours to attend a task force (OCB toward the organization; hence, OCB-O). Generally, OCB contributes substantially to organizational climate, goals, productivity, and resilience, so organizations need to understand what encourages it. This is particularly challenging in security organizations. Security work is characterized by high levels of stress and burnout, which is detrimental to OCB, and security organizational design emphasizes formal rules and clear hierarchies, leaving employees with less freedom for voluntary behavior. The current research explored the role of Perceived Procedural Justice (PPJ) in enhancing OCB in a security organization. PPJ refers to how fair decision-making processes are perceived to be. It involves the sense that decision makers are objective, attentive to everyone's interests, respectful in their communications and participatory - allowing individuals a voice in decision processes. Justice perceptions affect motivation, and it was specifically suggested that PPJ creates an attachment to one's organization and personal interest in its success. Accordingly, PPJ had been associated with OCB, but hardly any research tested their association with security organizations. The current research was conducted among prison guards in the Israel Prison Service, to test a correlational and a causal association between PPJ and OCB. It differentiated between perceptions of direct commander procedural justice (CPJ), and perceptions of organization procedural justice (OPJ), hypothesizing that CPJ would relate to OCB-I, while OPJ would relate to OCB-O. In the first study, 336 prison guards (305 male) from 10 different prisons responded to questionnaires measuring their own CPJ, OPJ, OCB-I, and OCB-O. Hierarchical linear regression analyses indicated the significance of commander procedural justice (CPJ): It associated with OCB-I and also associated with OPJ, which, in turn, associated with OCB-O. The second study tested CPJ's causal effects on prison guards' OCB-I and OCB-O; 311 prison guards (275 male) from 14 different prisons read scenarios that described either high or low CPJ, and then evaluated the likelihood of that commander's prison guards performing OCB-I and OCB-O. In this study, CPJ enhanced OCB-O directly. It also contributed to OCB-I, indirectly: CPJ enhanced the motivation for collaboration with the commander, which respondents also evaluated after reading scenarios. Collaboration, in turn, associated with OCB-I. The studies demonstrate that procedural justice, especially commander's PJ, promotes OCB in security work environments. This is important because extraordinary teamwork and motivation are needed to deal with emergency situations and with delicate security challenges. Following the studies, the Israel Prison Service implemented personal procedural justice training for commanders and unit level programs for procedurally just decision processes. From a theoretical perspective, the studies extend the knowledge on PPJ and OCB to security work environments and contribute evidence on PPJ's causal effects. They also call for further research, to understand the mechanisms through which different types of PPJ affect different types of OCB.

Keywords: organizational citizenship behavior, perceived procedural justice, prison guards, security organizations

Procedia PDF Downloads 221
19306 Geothermal Resources to Ensure Energy Security During Climate Change

Authors: Debasmita Misra, Arthur Nash

Abstract:

Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.

Keywords: exploration, geothermal, renewable energy, sustainable

Procedia PDF Downloads 155
19305 Correlates of Modes of Transportation to Work among Working Adults in Ernakulam District, Kerala

Authors: Anjaly Joseph, Elezebeth Mathews

Abstract:

Transportation and urban planning is the least recognised area for physical activity promotion in India, unlike developed regions. Identifying the preferred transportation modalities and factors associated with it is essential to address these lacunae. The objective of the study was to assess the prevalence of modes of transportation to work, and its correlates among working adults in Ernakulam District, Kerala. A cross sectional study was conducted among 350 working individuals in the age group of 18-60 years, selected through multi-staged stratified random sampling in Ernakulam district of Kerala. The inclusion criteria were working individuals 18-60 years, workplace at a distance of more than 1 km from the home and who worked five or more days a week. Pregnant women/women on maternity leave and drivers (taxi drivers, autorickshaw drivers, and lorry drivers) were excluded. An interview schedule was used to capture the modes of transportation namely, public, private and active transportation, socio demographic details, travel behaviour, anthropometric measurements and health status. Nearly two-thirds (64 percent) of them used private transportation to work, while active commuters were only 6.6 percent. The correlates identified for active commuting compared to other modes were low socio-economic status (OR=0.22, CI=0.5-0.85) and presence of a driving license (OR=4.95, CI= 1.59-15.45). The correlates identified for public transportation compared to private transportation were female gender (OR= 17.79, CI= 6.26-50.31), low income (OR=0.33, CI= 0.11-0.93), being unmarried (OR=5.19, CI=1.46-8.37), presence of no or only one private vehicle in the house (OR=4.23, CI=1.24-20.54) and presence of convenient public transportation facility to workplace (OR=3.97, CI= 1.66-9.47). The association between body mass index (BMI) and public transportation were explored and found that public transport users had lesser BMI than private commuters (OR=2.30, CI=1.23-4.29). Policies that encourage active and public transportation needs to be introduced such as discouraging private vehicle through taxes, introduction of convenient and safe public transportation facility, walking/cycling paths, and paid parking facility.

Keywords: active transportation, correlates, India, public transportation, transportation modes

Procedia PDF Downloads 166
19304 Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure

Authors: Jiri F. Urbanek, Jiri Barta, Oldrich Svoboda, Jiri J. Urbanek

Abstract:

The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/ business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply-customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling.

Keywords: added value, DYVELOP, controlling, environments, process approach

Procedia PDF Downloads 414
19303 Semilocal Convergence of a Three Step Fifth Order Iterative Method under Hölder Continuity Condition in Banach Spaces

Authors: Ramandeep Behl, Prashanth Maroju, S. S. Motsa

Abstract:

In this paper, we study the semilocal convergence of a fifth order iterative method using recurrence relation under the assumption that first order Fréchet derivative satisfies the Hölder condition. Also, we calculate the R-order of convergence and provide some a priori error bounds. Based on this, we give existence and uniqueness region of the solution for a nonlinear Hammerstein integral equation of the second kind.

Keywords: Holder continuity condition, Frechet derivative, fifth order convergence, recurrence relations

Procedia PDF Downloads 613
19302 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 94
19301 A Second Order Genetic Algorithm for Traveling Salesman Problem

Authors: T. Toathom, M. Munlin, P. Sugunnasil

Abstract:

The traveling salesman problem (TSP) is one of the best-known problems in optimization problem. There are many research regarding the TSP. One of the most usage tool for this problem is the genetic algorithm (GA). The chromosome of the GA for TSP is normally encoded by the order of the visited city. However, the traditional chromosome encoding scheme has some limitations which are twofold: the large solution space and the inability to encapsulate some information. The number of solution for a certain problem is exponentially grow by the number of city. Moreover, the traditional chromosome encoding scheme fails to recognize the misplaced correct relation. It implies that the tradition method focuses only on exact solution. In this work, we relax some of the concept in the GA for TSP which is the exactness of the solution. The proposed work exploits the relation between cities in order to reduce the solution space in the chromosome encoding. In this paper, a second order GA is proposed to solve the TSP. The term second order refers to how the solution is encoded into chromosome. The chromosome is divided into 2 types: the high order chromosome and the low order chromosome. The high order chromosome is the chromosome that focus on the relation between cities such as the city A should be visited before city B. On the other hand, the low order chromosome is a type of chromosome that is derived from a high order chromosome. In other word, low order chromosome is encoded by the traditional chromosome encoding scheme. The genetic operation, mutation and crossover, will be performed on the high order chromosome. Then, the high order chromosome will be mapped to a group of low order chromosomes whose characteristics are satisfied with the high order chromosome. From the mapped set of chromosomes, the champion chromosome will be selected based on the fitness value which will be later used as a representative for the high order chromosome. The experiment is performed on the city data from TSPLIB.

Keywords: genetic algorithm, traveling salesman problem, initial population, chromosomes encoding

Procedia PDF Downloads 273
19300 Raising Intercultural Awareness in Colombia Classrooms: A Descriptive Review

Authors: Angela Yicely Castro Garces

Abstract:

Aware of the relevance that intercultural education has gained in foreign language learning and teaching, and acknowledging the need to make it part of our classroom practices, this literature review explores studies that have been published in the Colombian context from the years 2012 to 2019. The inquiry was done in six national peer-reviewed journals, in order to examine the population benefited, types of studies and most recurrent topics of concern for educators. The findings present a promising panorama as teacher educators from public universities are leading the way in conducting research projects aimed at fostering intercultural awareness and building a critical intercultural discourse. Nonetheless, more studies that involve the different stakeholders and contexts need to be developed, in order to make intercultural education more visible in Colombian elementary and high school classrooms.

Keywords: Colombian scholarship, foreign language learning, foreign language teaching, intercultural awareness

Procedia PDF Downloads 145
19299 State of Emergency in Turkey (July 2016-July 2018): A Case of Utilization of Law as a Political Instrument

Authors: Neslihan Cetin

Abstract:

In this study, we will aim to analyze how the period of the state of emergency in Turkey lead to gaps in law and the formation of areas in which there was a complete lack of supervision. The state of emergency that was proclaimed following the coup attempt of July 15, 2016, continued until July 18, 2018, that is to say, 2 years, without taking into account whether the initial circumstances persisted. As part of this work, we claim that the state of emergency provided the executive power with important tools for governing, which it took constant use. We can highlight how the concern for security at the center of the basic considerations of the people in a city was exploited as a foundation by the military power in Turkey to interfere in the political, legal, and social spheres. The constitutions of 1924, 1961, and 1982 entrusted the army with the role of protector of the integrity of the state. This became an instrument at the hands of the military to legitimize their interventions in the name of public security. Its interventions in the political field are indeed politically motivated. The constitution, the legislative, and regulatory systems are modified and monopolized by the military power that dominates the legislative, regulatory, and judicial power, leading to a state of exception. With the political convulsions over a decade, the government was able to usurp the instrument called the state of exception. In particular, the decree-laws of the state of emergency, which the executive makes frequent and generally abusive use, became instruments in the hands of the government to take measures that it wishes to escape from the rules and the pre-established control mechanisms. Thus the struggle against the political opposition becomes more unbalanced and destructive. To this must also be added the ineffectiveness of ex-post controls and domestic remedies. This research allows us to stress how a legal concept, such as ‘the state of emergency’ can be politically exploited to make it a legal weapon that continues to produce victims.

Keywords: constitutional law, state of emergency, rule of law, instrumentalization of law

Procedia PDF Downloads 145
19298 Residential Satisfaction and Public Perception of Socialized Housing Projects in Davao City, Philippines

Authors: Micah Amor P. Yares

Abstract:

Aside from the provision of adequate housing, the Philippine government faces the challenge of ensuring that the housing units provided conform to the Filipino’s ambition to self as manifested by owning a small house on a big lot. The study aimed to explore the levels of satisfaction of end-users and the public perception towards socialized housing in Davao City, Philippines. The residential satisfaction survey includes three types of respondents, which are end-users of single-detached, duplex and rowhouse socialized housing units. Respondents were asked to rate their level of satisfaction and perception to the following housing components: Dwelling Unit; Public Facilities; Social Environment; Neighborhood Facilities; Management Systems; and Acquisition and Financing. The data were subjected to Exploratory Factor Analysis to determine if variables can be grouped together, and Confirmatory Factor Analysis to measure if the model fits the construct. In determining which component affects the level of perception and satisfaction, a Multiple Linear Regression Analysis was employed. Lastly, an Individual Samples T-Test was performed to compare the levels of satisfaction and perception among respondents. Results revealed that residents of socialized housing were highly satisfied with their living conditions despite concerns on management systems, public and neighborhood facilities. Residents' satisfaction is primarily influenced by the Social Environment, Acquisition and Financing, and the Dwelling Unit. However, a significant difference in residential satisfaction level was observed among different types of housing with rowhouse residents recording the lowest satisfaction level compared to single-detached and duplex units. Moreover, the general public perceived Socialized housing as moderately satisfactory having the same determinant as the end-users aside from the Public Facilities. This study recommends revisiting the current Socialized Housing policies by considering the feedback from the end-users based on their lived experience and the public according to their perception.

Keywords: public perception, residential satisfaction, rowhouse, socialized housing

Procedia PDF Downloads 241
19297 Methodology of Personalizing Interior Spaces in Public Libraries

Authors: Baharak Mousapour

Abstract:

Creating public spaces which are tailored for the specific demands of the individuals is one of the challenges for the contemporary interior designers. Improving the general knowledge as well as providing a forum for all walks of life to exploit is one of the objectives of a public library. In this regard, interior design in consistent with the demands of the individuals is of paramount importance. Seemingly, study spaces, in particular, those in close relation to the personalized sector, have proven to be challenging, according to the literature. To address this challenge, attributes of individuals, namely, perception of people from public spaces and their interactions with the so-called spaces, should be analyzed to provide interior designers with something to work on. This paper follows the analytic-descriptive research methodology by outlining case study libraries which have personalized public libraries with the investigation of the type of personalization as its primary objective and (I) recognition of physical schedule and the know-how of the spatial connection in indoor design of a library and (II) analysis of each personalized space in relation to other spaces of the library as its secondary objectives. The significance of the current research lies in the concept of personalization as one of the most recent methods of attracting people to libraries. Previous research exists in this regard, but the lack of data concerning personalization makes this topic worth investigating. Hence, this study aims to put forward approaches through real-case studies for the designers to deal with this concept.

Keywords: interior design, library, library design, personalization

Procedia PDF Downloads 150
19296 Future of E-Democracy in Polarized Politics and Role of Government with Perspective of E-Leadership in Pakistan

Authors: Kousar Shaheen

Abstract:

The electoral process of Pakistan always remains underestimated due to malpractices claimed by the political leaders. The democratic system relies on public decision, selectorial process, transparent arrangements made by public administration, and governance system. Political polarization plays a vital role in any democratic system, which depends upon the way of applying leadership capabilities. In modern societies, public engagement is playing a key role in changing political polarization and implementation of the newest technologies, e-leadership and e-governance to bring e-democracy. The Overseas Pakistanis are unable to cast their votes in the selectorial process of Pakistan. To align this issue with civil society, efforts were made to implement modernized services and facilities by intervening in the Supreme Court. However, the results were found insignificant because of ineffective citizen engagement, IT-based, governance and public administration. which proved that the shifting to advanced society is crucial in Pakistan due to the elected Officials of current democratic system. It is an empirical study to involve Pakistani nationals (overseas) in the democratic process by utilizing the digital facility of vote casting. The role of Government. The role of e-leadership in changing the political polarization for the implementation of e-election will be measured by collecting data from different sources.

Keywords: e-democracy, e-leadership, political polarization, public engagement

Procedia PDF Downloads 44
19295 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 355
19294 Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study

Authors: Omojokun G. Aju, Adedayo O. Sule

Abstract:

ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks.

Keywords: home monitoring, IEEE 802.14.5, topology, wireless security, wireless sensor network (WSN), ZigBee

Procedia PDF Downloads 385
19293 Nudge Plus: Incorporating Reflection into Behavioural Public Policy

Authors: Sanchayan Banerjee, Peter John

Abstract:

Nudge plus is a modification of the toolkit of behavioural public policy. It incorporates an element of reflection¾the plus¾into the delivery of a nudge, either blended in or made proximate. Nudge plus builds on recent work combining heuristics and deliberation. It may be used to design pro-social interventions that help preserve the autonomy of the agent. The argument turns on seminal work on dual systems, which presents a subtler relationship between fast and slow thinking than commonly assumed in the classic literature in behavioural public policy. We review classic and recent work on dual processes to show that a hybrid is more plausible than the default interventionist or parallel competitive framework. We define nudge plus, set out what reflection could entail, provide examples, outline causal mechanisms, and draw testable implications.

Keywords: nudge, nudge plus, think, dual process theory

Procedia PDF Downloads 194
19292 Risk Management Approach for a Secure and Performant Integration of Automated Drug Dispensing Systems in Hospitals

Authors: Hind Bouami, Patrick Millot

Abstract:

Medication dispensing system is a life-critical system whose failure may result in preventable adverse events leading to longer patient stays in hospitals or patient death. Automation has led to great improvements in life-critical systems as it increased safety, efficiency, and comfort. However, critical risks related to medical organization complexity and automated solutions integration can threaten drug dispensing security and performance. Knowledge about the system’s complexity aspects and human machine parameters to control for automated equipment’s security and performance will help operators to secure their automation process and to optimize their system’s reliability. In this context, this study aims to document the operator’s situation awareness about automation risks and parameters involved in automation security and performance. Our risk management approach has been deployed in the North Luxembourg hospital center’s pharmacy, which is equipped with automated drug dispensing systems since 2009. With more than 4 million euros of gains generated, North Luxembourg hospital center’s success story was enabled by the management commitment, pharmacy’s involvement in the implementation and improvement of the automation project, and the close collaboration between the pharmacy and Sinteco’s firm to implement the necessary innovation and organizational actions for automated solutions integration security and performance. An analysis of the actions implemented by the hospital and the parameters involved in automated equipment’s integration security and performance has been made. The parameters to control for automated equipment’s integration security and performance are human aspects (6.25%), technical aspects (50%), and human-machine interaction (43.75%). The implementation of an anthropocentric analysis system before automation would have prevented and optimized the control of risks related to automation.

Keywords: Automated drug delivery systems, Hospitals, Human-centered automated system, Risk management

Procedia PDF Downloads 139
19291 Spatial Structure of First-Order Voronoi for the Future of Roundabout Cairo Since 1867

Authors: Ali Essam El Shazly

Abstract:

The Haussmannization plan of Cairo in 1867 formed a regular network of roundabout spaces, though deteriorated at present. The method of identifying the spatial structure of roundabout Cairo for conservation matches the voronoi diagram with the space syntax through their geometrical property of spatial convexity. In this initiative, the primary convex hull of first-order voronoi adopts the integral and control measurements of space syntax on Cairo’s roundabout generators. The functional essence of royal palaces optimizes the roundabout structure in terms of spatial measurements and the symbolic voronoi projection of 'Tahrir Roundabout' over the Giza Nile and Pyramids. Some roundabouts of major public and commercial landmarks surround the pole of 'Ezbekia Garden' with a higher control than integral measurements, which filter the new spatial structure from the adjacent traditional town. Nevertheless, the least integral and control measures correspond to the voronoi contents of pollutant workshops and the plateau of old Cairo Citadel with the visual compensation of new royal landmarks on top. Meanwhile, the extended suburbs of infinite voronoi polygons arrange high control generators of chateaux housing in 'garden city' environs. The point pattern of roundabouts determines the geometrical characteristics of voronoi polygons. The measured lengths of voronoi edges alternate between the zoned short range at the new poles of Cairo and the distributed structure of longer range. Nevertheless, the shortest range of generator-vertex geometry concentrates at 'Ezbekia Garden' where the crossways of vast Cairo intersect, which maximizes the variety of choice at different spatial resolutions. However, the symbolic 'Hippodrome' which is the largest public landmark forms exclusive geometrical measurements, while structuring a most integrative roundabout to parallel the royal syntax. Overview of the symbolic convex hull of voronoi with space syntax interconnects Parisian Cairo with the spatial chronology of scattered monuments to conceive one universal Cairo structure. Accordingly, the approached methodology of 'voronoi-syntax' prospects the future conservation of roundabout Cairo at the inferred city-level concept.

Keywords: roundabout Cairo, first-order Voronoi, space syntax, spatial structure

Procedia PDF Downloads 504
19290 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique

Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis

Abstract:

Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.

Keywords: children malnutrition, food security, Local community, participatory approach

Procedia PDF Downloads 278
19289 Design and Implementation of a Nano-Power Wireless Sensor Device for Smart Home Security

Authors: Chia-Chi Chang

Abstract:

Most battery-driven wireless sensor devices will enter in sleep mode as soon as possible to extend the overall lifetime of a sensor network. It is necessary to turn off unnecessary radio and peripheral functions, especially the radio unit always consumes more energy than other components during wireless communication. The microcontroller is the most important part of the wireless sensor device. It is responsible for the manipulation of sensing data and communication protocols. The microcontroller always has different sleep modes, each with a different level of energy usage. The deeper the sleep, the lower the energy consumption. Most wireless sensor devices can only enter the sleep mode: the external low-frequency oscillator is still running to wake up the sleeping microcontroller when the sleep timer expires. In this paper, our sensor device can enter the extended sleep mode: none of the oscillator is running and the wireless sensor device has the nanoampere consumption and self-awaking ability. Finally, these wireless sensor devices were deployed in a smart home security network.

Keywords: wireless sensor network, battery-driven, sleep mode, home security

Procedia PDF Downloads 310
19288 X-Ray Dynamical Diffraction Rocking Curves in Case of Third Order Nonlinear Renninger Effect

Authors: Minas Balyan

Abstract:

In the third-order nonlinear Takagi’s equations for monochromatic waves and in the third-order nonlinear time-dependent dynamical diffraction equations for X-ray pulses for forbidden reflections the Fourier-coefficients of the linear and the third order nonlinear susceptibilities are zero. The dynamical diffraction in the nonlinear case is related to the presence in the nonlinear equations the terms proportional to the zero order and the second order nonzero Fourier coefficients of the third order nonlinear susceptibility. Thus in the third order nonlinear Bragg diffraction case a nonlinear analogue of the well known Renninger effect takes place. In this work, the ‘third order nonlinear Renninger effect’ is considered theoretically and numerically. If the reflection exactly is forbidden the diffracted wave’s amplitude is zero both in Laue and Bragg cases since the boundary conditions and dynamical diffraction equations are compatible with zero solution. But in real crystals due to some percent of dislocations and other localized defects, the atoms are displaced with respect to their equilibrium positions. Thus in real crystals susceptibilities of forbidden reflection are by some order small than for usual not forbidden reflections but are not exactly equal to zero. The numerical calculations for susceptibilities two order less than for not forbidden reflection show that in Bragg geometry case the nonlinear reflection curve’s behavior is the same as for not forbidden reflection, but for forbidden reflection the rocking curves’ width, center and boundaries are two order sensitive on the input intensity value. This gives an opportunity to investigate third order nonlinear X-ray dynamical diffraction for not intense beams – 0.001 in the units of critical intensity.

Keywords: third order nonlinearity, Bragg diffraction, nonlinear Renninger effect, rocking curves

Procedia PDF Downloads 409
19287 First-Generation College Students and Persistence: A Phenomenological Study of Students’ Experiences in Indonesian Higher Education

Authors: Taufik Mulyadin

Abstract:

The tuition reform for public colleges that the Indonesian government initiated and has implemented since 2013 resulted in the growing number of college students from low-income families, many of whose parents did not attend college. This study sought to examine the experiences of persistence for Indonesian first-generation college students in public universities utilizing social capital as a framework. It is a qualitative study with a phenomenological approach primarily to capture the essence of how Indonesian first-generation college students interpret, process, and experience their persistence during college years. Fifteen Indonesian young college graduates were involved as well as questionnaire and interview were employed for data collection in this study. It revealed certain themes from the experiences that first-generation college students attributed to their persistence: (a) family encouragement, (b) support from friends, (c) guidance from faculty and staff, (d) fund of knowledge they bring with them, (e) financial aid availability, and (f) self-motivation. By examining first-generation college students’ voices, Indonesian public universities can better support, engage, and retain this group of students who were historically struggled to persist in college and complete their degree.

Keywords: first-generation student, Indonesian higher education, persistence, public universities

Procedia PDF Downloads 264
19286 Equity in Public Health: Perception from the Anti-Retroviral Therapy (ART) Program for HIV- Patients in India

Authors: Koko Wangjam, Naresh Kumar Sharma

Abstract:

The concern for most public health policies and decision- makers is the equitable distribution of health care resource of the nation. Also, in public health care system, the primary aim is assuaging the burden of the disease. Objective: This paper captures and evaluates some important theories in equity in health with its relevance with the ART program in India. Methodology: The paper is exploratory and descriptive study based on secondary data. The sources of secondary data are published official reports from NACO (National AIDS Control Organisation), United Nations AIDS Program (UNAIDS), World Health Organisation (WHO) etc. Observation: The roll-out of the ART program in 2004 by the Govt. of India made a paradigm shift in HIV/AIDS scenario in the country. Conclusion: There are many theoretical injunctions in most of the principles and approaches in existing theories of health equity. The enervation of HIV infection by taking ART drugs had helped in curbing the prevalence and the fact that it is provided at free of cost has proven this program to be an epitome in distributive justice in public health.

Keywords: art program, burden of the disease, health equity, hiv/aids

Procedia PDF Downloads 395
19285 Comparative Analysis of Teachers’ Performance in Private and Public Primary Schools in Oyo State

Authors: Babajide Solomon Faloore

Abstract:

This study on the comparative analysis of the performance of teachers in private and public schools was carried out in Ibadan North West Local Government Area of Oyo State. This study examined the justification for the claim that there is a difference in the performance of teachers in private and public primary schools and at the same time identified factors responsible for the difference in the performance of these teachers. A descriptive survey research design was used for the study. Data generated were analyzed using t-test and regression analysis. The findings of the study revealed that there is significance difference in the performance of teachers in private and private primary schools in Ibadan North West Local Government Area of Oyo State( t=64.09; df=459; p,.05). The findings also revealed that the method of teaching in private primary schools is significantly different from the method of teaching in public primary schools in Ibadan North West Local Government Area of Oyo State (t=73.08; df=459; p,.05). Findings revealed that school leadership and management have a significant contribution on the performance of private and public primary school teachers in Ibadan North West Local Area of Oyo State. Based on the finding, the following recommendations were made: Primary school teachers need to be motivated and rewarded for excellent performance. Primary schools should be properly equipped with teaching–aid facilities, laboratories, and libraries. The government should use the findings of this study to improve on teaching materials provided to the primary school teachers in Nigeria. Public primary schools should be designed by education planners, administrators, and government. Headmasters, proprietors, and teachers of primary schools should look inward and give a performance appraisal and evaluation of themselves from time to time based on the subject they taught. Finally, school administrators should be conscious of the way they manage the teachers in schools not only in informal situations but also in formal settings.

Keywords: private education, public education, school leadership, school management, teachers performance

Procedia PDF Downloads 391
19284 Determinants of Firm Financial Performance: An Empirical Investigation in Context of Public Limited Companies

Authors: Syed Hassan Amjad

Abstract:

In today’s competitive environment, in order for a company to exist, it must continually improve its Performance by reducing cost, improving quality and productivity, and easy access to market.The purpose of this thesis is to check the firm financial growth and performance and which type of factors affect the firm financial performance. This paper examines the key determinants of firm financial performance. We will differentiate between financial and non financial drivers of the firm financial performance. For the measurement of the firm financial performance there are many ways but all the measure had been taken in aggregation, such as debt, tax rate, operating expenses, earning per share and economic conditions. This study has also been done in developed countries but these researches show that foreign companies face many difficulties inimproving the firm financial performance. In findings we found that marketing expenditures and international diversification had a positive impact on firm valuation. In research also found that a firm's ownership composition, particularly the level of equity ownership by Domestic Financial Institutions and Dispersed Public Shareholders, and the leverage of the firm, tax rate and economic conditions were important factors affecting its financial performance.

Keywords: debt, tax rate, firm financial performance, operating expenses, dividend per share, economic conditions

Procedia PDF Downloads 344
19283 Designing Roudbar Residential Complex Inspired by Anti-Seismic Technologies

Authors: Sara Hadad Dabaghi

Abstract:

Iran is among the first five earthquake prone regions of the world. During the past 90 years, more than 85 catastrophic earthquakes have happened in Iran, leaving approximately 120000 casualties. Therefore, it is necessary to apply modern anti-seismic technologies to the construction of building such earthquake prone zones. This is especially the case with the northern regions of this country where the existence Khazar and Alborz Faults necessitate the observation of building construction security. Thus, the goal of this research is to solve this problem and to design earthquake resistant buildings. The present study is descriptive-analytical carried out on a mixed method platform. The study focuses on designing Roudbar Residential Complex adopting an anti-seismic approach. It is a cross-sectional applied research since its findings could be used to solve the security problems of Roudbar building with respect to earthquakes of the regions. The causality relationship in this research could be formulated as follows: the novel anti-seismic technologies increase security and reduce damages caused by earthquakes.

Keywords: design, residential complex, inspiration, anti-seismic technology, Roudbar

Procedia PDF Downloads 292
19282 Localization Problem in Optical Fiber Sensors

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The security industry is making many efforts to lower the costs of system installation. However, the dominant technique is the application of fiber optic sensors. It is necessary to determine the location of the disorder of long optical fiber cables. For a number of years, many research centers developed their own solutions. The article presents the construction of the sensor systems with the possibility of disorder location. We present a methodology for determining location of the disorder. The aim of investigations is to answer the question of which of optical sensor configuration offer the best performance for location of the disorder.

Keywords: fiber optic sensor, security sensor, fiber cables, system instillation

Procedia PDF Downloads 638
19281 Public Health Emergency Management (PHEM) to COVID-19 Pandemic in North-Eastern Part of Thailand

Authors: Orathai Srithongtham, Ploypailin Mekathepakorn, Tossaphong Buraman, Pontida Moonpradap, Rungrueng Kitpati, Chulapon Kratet, Worayuth Nak-ai, Suwaree Charoenmukkayanan, Peeranuch Keawkanya

Abstract:

The COVID-19 pandemic was effect to the health security of the Thai people. The PHEM principle was essential to the surveillance, prevention, and control of COVID-19. This study aimed to present the process of prevention and control of COVID-19 from February 29, 2021- April 30, 2022, and the factors and conditions influent the successful outcome. The study areas were three provinces. The target group was 37 people, composed of public health personnel. The data was collected in-depth, and group interviews followed the non-structure interview guide and were analyzed by content analysis. The components of COVID-19 prevention and control were found in the process of PHEM as follows; 1) Emergency Operation Center (EOC) with an incidence command system (ICS) from the district to provincial level and to propose the provincial measure, 2) Provincial Communicable Disease Committee (PCDC) to decide the provincial measure 3) The measure for surveillance, prevention, control, and treatment of COVID-19, and 4) outcomes and best practices for surveillance and control of COVID-19. The success factors of 4S and EC were as follows; Space: prepare the quarantine (HQ, LQ), Cohort Ward (CW), field hospital, and community isolation and home isolation to face with the patient and risky group, Staff network from various organization and group cover the community leader and Health Volunteer (HV), Stuff the management and sharing of the medical and non-medical equipment, System of Covid-19 respond were EOC, ICS, Joint Investigation Team (JIT) and Communicable Disease Control Unit (CDCU) for monitoring the real-time of surveillance and control of COVID-19 output, Environment management in hospital and the community with Infections Control (IC) principle, and Culture in term of social capital on “the relationship of Isan people” supported the patient provide the good care and support. The structure of PHEM, Isan’s Culture, and good preparation was a significant factor in the three provinces.

Keywords: public health, emergency management, covid-19, pandemic

Procedia PDF Downloads 82
19280 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 255
19279 Assessing Sustainability Dimensions of Transportation as a Critical Infrastructure: Jordan as a Case Study

Authors: Malak M. Shatnawi

Abstract:

Infrastructure is the fundamental facility that plays an important part in socio-economic development for modern societies, if such sector is well planned, managed by decision makers in a way that is compatible with the population growth, safety, and national security needs; it will enrich progress, prosperity, awareness, social and economic welfare for any country. Infrastructure is the most important aspect of life because it can provide materials, products, and services that will improve and facilitate living conditions and maintain sustainability at the same time, and in order to study critical infrastructure, in general, we must think sustainability. Otherwise there will be a significant gap. The planning processes for sustainability include urban infrastructure and public transportation are considered the most important sectors for economic development for both developed and developing countries as they are linked to the civilizational and urban development, meanwhile, choosing the appropriate transportation mode that will provide a good level of service, and increase the satisfaction of the potential users is a difficult task. This research paper tries to assess where is Jordan located vs. each transportation sustainability dimensions in aspects related to social, economic and environmental dimensions based on (Zietsman et al. 2006) adopted model for sustainability transportation infrastructure. Measures of performance indicators for each dimensional goal were traced and supported with needed data, figures and statistical findings. The study uses analytical, descriptive style and methodology based on different references and previous studies from secondary data sources to support the case. Recommendations for enhancing sustainability were concluded, and future reform directions were proposed which can be applied to Jordan and generalized for other developing countries with similar circumstances.

Keywords: infrastructure transportation sustainability, economic, social, environmental

Procedia PDF Downloads 251
19278 Automatic Lexicon Generation for Domain Specific Dataset for Mining Public Opinion on China Pakistan Economic Corridor

Authors: Tayyaba Azim, Bibi Amina

Abstract:

The increase in the popularity of opinion mining with the rapid growth in the availability of social networks has attracted a lot of opportunities for research in the various domains of Sentiment Analysis and Natural Language Processing (NLP) using Artificial Intelligence approaches. The latest trend allows the public to actively use the internet for analyzing an individual’s opinion and explore the effectiveness of published facts. The main theme of this research is to account the public opinion on the most crucial and extensively discussed development projects, China Pakistan Economic Corridor (CPEC), considered as a game changer due to its promise of bringing economic prosperity to the region. So far, to the best of our knowledge, the theme of CPEC has not been analyzed for sentiment determination through the ML approach. This research aims to demonstrate the use of ML approaches to spontaneously analyze the public sentiment on Twitter tweets particularly about CPEC. Support Vector Machine SVM is used for classification task classifying tweets into positive, negative and neutral classes. Word2vec and TF-IDF features are used with the SVM model, a comparison of the trained model on manually labelled tweets and automatically generated lexicon is performed. The contributions of this work are: Development of a sentiment analysis system for public tweets on CPEC subject, construction of an automatic generation of the lexicon of public tweets on CPEC, different themes are identified among tweets and sentiments are assigned to each theme. It is worth noting that the applications of web mining that empower e-democracy by improving political transparency and public participation in decision making via social media have not been explored and practised in Pakistan region on CPEC yet.

Keywords: machine learning, natural language processing, sentiment analysis, support vector machine, Word2vec

Procedia PDF Downloads 150