Search results for: transformation and security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9257

Search results for: transformation and security challenges

7997 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 203
7996 Interpreting Some Transformational Aspects of Pentatonicism in Post-tonal Chinese Music on Dual Interval Space

Authors: Man-Ching Yu

Abstract:

In Chinese music, pentatonic collection is central in constituting all the harmonic and melodic elements; most of the traditional Chinese musicians particularly emphasize the importance of the smoothness between pentatonic collections when one collection modulates to another collection, articulating the roles of the pentatonic common tones. On the contrary, in post-tonal Chinese music the central features of the pentatonic modulations tend to reflect a larger number of semitonal relationships with a lesser number of common tones. This paper offers an analytical account of the transformations between pentatonic collections that arise in post-tonal Chinese music by adopting the methodology of the Tonnetz, in particular, Dual Interval Space (DIS), to elaborate and reexamine pentatonicism by focusing on the transformations between pentatonic elements, especially semitonal motion and common tones. In the essay, various pentatonic passages will be analyzed by means of DIS for highlighting the transformation of the collections. It will be shown that the pentatonic collections that are in semitonal, third, and augmented fourth relationships exhibit the maximum number of semitonal shifts.

Keywords: tonnetz, pentatonicism, post-tonal Chinese music, dual interval space, transformation

Procedia PDF Downloads 555
7995 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 134
7994 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 107
7993 Demand-Side Financing for Thai Higher Education: A Reform Towards Sustainable Development

Authors: Daral Maesincee, Jompol Thongpaen

Abstract:

Thus far, most of the decisions made within the walls of Thai higher education (HE) institutions have primarily been supply-oriented. With the current supply-driven, itemized HE financing systems, the nation is struggling to systemically produce high-quality manpower that serves the market’s needs, often resulting in education mismatches and unemployment – particularly in science, technology, and innovation (STI)-related fields. With the COVID-19 pandemic challenges widening the education inequality (accessibility and quality) gap, HE becomes even more unobtainable for underprivileged students, permanently leaving some out of the system. Therefore, Thai HE needs a new financing system that produces the “right people” for the “right occupations” through the “right ways,” regardless of their socioeconomic backgrounds, and encourages the creation of non-degree courses to tackle these ongoing challenges. The “Demand-Side Financing for Thai Higher Education” policy aims to do so by offering a new paradigm of HE resource allocation via two main mechanisms: i) standardized formula-based unit-cost subsidizations that is specific to each study field and ii) student loan programs that respond to the “demand signals” from the labor market and the students, that are in line with the country’s priorities. Through in-dept reviews, extensive studies, and consultations with various experts, education committees, and related agencies, i) the method of demand signal analysis is identified, ii) the unit-cost of each student in the sample study fields is approximated, iii) the method of budget analysis is formulated, iv) the interagency workflows are established, and v) a supporting information database is created to suggest the number of graduates each HE institution can potentially produce, the study fields and skillsets that are needed by the labor market, the employers’ satisfaction with the graduates, and each study field’s employment rates. By responding to the needs of all stakeholders, this policy is expected to steer Thai HE toward producing more STI-related manpower in order to uplift Thai people’s quality of life and enhance the nation’s global competitiveness. This policy is currently in the process of being considered by the National Education Transformation Committee and the Higher Education Commission.

Keywords: demand-side financing, higher education resource, human capital, higher education

Procedia PDF Downloads 196
7992 The States of Stage Indigenous Operatic Production in Nigeria

Authors: David Bolaji

Abstract:

Operatic production in Nigeria emanates from the traditional theatrical performances rooted in the ritual festival and traditional religious ceremonies among different cultures in Nigeria. The existence and the performative continuum of opera in Nigeria have been in the limelight of stage productions and diverse performances before the presence of Europeans in Nigeria. However, the transformation of this musical genre evolved from an indigenous concept into an art form that is acceptable within the circumference theatrical platform globally. The present state of stage operatic production has gone into extinction as the result of diverse factors, which include: a lack of scripted operatic works by Nigerian art composers, disconnection and lack of continuation from the artistic, theatrical contributions of the foremost folk operatic practitioners in Nigeria and lack of progressive transformation of stage operatic production into screen production in Nigeria. The bibliography method was employed in this study. Also, the use of interviews and questionnaires was adopted. Findings reveal that the extinction of operatic production can be corrected through the intentional act of composing scripted operatic works by Nigerian art composers; by establishing a collaborative effort between the scriptwriters (librettists) and the Nigerian art composers, operatic stage performance could be transformed in screen production to create more awareness of it in the society.

Keywords: operatic production, extinction, nigerian art music, and nigerian art composers

Procedia PDF Downloads 93
7991 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria

Authors: Temple Probyne Abali

Abstract:

Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).

Keywords: climate change, food security, fadama, world bank, agriculture, sdgs

Procedia PDF Downloads 86
7990 Early Childhood Care and Education in the North-West of Nigeria: Trends and Challenges

Authors: Muhammad Adamu Kwankwaso

Abstract:

Early childhood is a critical period of rapid physical, cognitive and psycho-social development of a child. The quality of care and Education which a child receives at this crucial age will determine to a great extent the level of his/her physical and cognitive development in the future. In Nigeria, Early Childhood Care and Education (ECCE) is a fundamental aspect or form of Education for children between the age of 3-6. It was started after independence as pre-primary Education or early child development as contained in the 1977 National Policy on Education. The trends towards ECCE in Nigeria and the northwestern part of the country in particular keep up changing as in the case of other part of the world. The current trends are now towards expansions, inclusiveness, redefinition, early literacy, increased government participation and the unprecedented societal response and awareness towards the Education of the younger children. While all hands are on deck to ensure successful implementation of the ECCE programme, it is unfortunate that, ECCE is facing some challenges. This paper therefore, examines the trends in Early Childhood Care and Education and the major challenges in the north west of Nigeria. Some of the major challenges include, inadequate trained ECCE teachers, lack of unified curriculum, teacher pupil’s ratio, and the medium of instructions and inadequate infrastructural and teaching facilities respectively. To improve the situation the paper offered the following recommendations; establishment of more ECCE classes, enforcement for the use of mothers’ tongue or the languages of the immediate community as a medium of instructions, and adequate provision of infrastructural facilities and the unified curriculum across the northwestern States of Nigeria.

Keywords: early childhood care, education, trends, challenges

Procedia PDF Downloads 466
7989 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model

Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud

Abstract:

Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.

Keywords: HMM, K-Means, Sobel, accuracy, face recognition

Procedia PDF Downloads 326
7988 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union

Authors: María Elena Menéndez Ibáñez

Abstract:

After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.

Keywords: border control, immigration, international cooperation, national security

Procedia PDF Downloads 130
7987 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites

Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar

Abstract:

Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.

Keywords: online information services, prediction, security and protection, web based services

Procedia PDF Downloads 352
7986 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 284
7985 The Secret Ingredient of Student Involvement: Applied Science Case Studies to Enhance Sustainability

Authors: Elizelle Juanee Cilliers

Abstract:

Recent planning thinking has laid the foundations for a general sense of best practice that aims to enhance the quality of life, suggesting an open and participatory process. It is accepted that integration of top-down and bottom-up approaches may lead to efficient action in environments and sustainable planning and development, although it is also accepted that such an integrated approach has various challenges of implementation. A flexible framework in which the strengths of both the top-down and bottom-up approaches were explored in this research, based on the EU Interreg VALUE Added project and five case studies where student education and student involvement played a crucial role within the participation process of the redesign of the urban environment. It was found that international student workshops were an effective tool to integrate bottom-up and top-down structures, as it acted as catalyst for communication, interaction, creative design, quick transformation from planning to implementation, building social cohesion, finding mutual ground between stakeholders and thus enhancing overall quality of life and quality of environments. It offered a good alternative to traditional participation modes and created a platform for an integrative planning approach. The role and importance of education and integration within the urban environment were emphasized.

Keywords: top-down, bottom-up, flexible, student involvement

Procedia PDF Downloads 207
7984 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features

Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed

Abstract:

Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.

Keywords: 3D printing, fluorescent, packaging, security

Procedia PDF Downloads 92
7983 Cultural Transformation in Interior Design in Commercial Space in India

Authors: Siddhi Pedamkar, Reenu Singh

Abstract:

This report is based on how a culture transforms from one era to another era in commercial space. This transformation is observed in commercial as well as residential spaces. The spaces have specific color concepts, surface detailing furniture, and function-specific layouts. But the cultural impact is very rarely seen in commercial spaces, mostly because the interior is divine by function to a large extent. Information was collected from books and research papers. A quantitative survey was conducted to understand people's perceptions about the impact of culture on design entities and how culture dictates the different types of space and their character. The survey also highlights the impact of types of interior lighting, colour schemes, and furniture types on the interior environment. The questionnaire survey helped in framing design parameters for contemporary interior design. The design parameters are used to propose design options for new-age furniture that can be used in co-working spaces. For the new and contemporary working spaces, new age design furniture, interior elements such as visual partition, semi-visual partition, lighting, and layout can be transformed by cultural changes in the working style of people and organization.

Keywords: commercial space, culture, environment, furniture, interior

Procedia PDF Downloads 104
7982 The Role of Knowledge Management in Global Software Engineering

Authors: Samina Khalid, Tehmina Khalil, Smeea Arshad

Abstract:

Knowledge management is essential ingredient of successful coordination in globally distributed software engineering. Various frameworks, KMSs, and tools have been proposed to foster coordination and communication between virtual teams but practical implementation of these solutions has not been found. Organizations have to face challenges to implement knowledge management system. For this purpose at first, a literature review is arranged to investigate about challenges that restrict organizations to implement KMS and then by taking in account these challenges a problem of need of integrated solution in the form of standardized KMS that can easily store tacit and explicit knowledge, has traced down to facilitate coordination and collaboration among virtual teams. Literature review has been already shown that knowledge is a complex perception with profound meanings, and one of the most important resources that contributes to the competitive advantage of an organization. In order to meet the different challenges caused by not properly managing knowledge related to projects among virtual teams in GSE, we suggest making use of the cloud computing model. In this research a distributed architecture to support KM storage is proposed called conceptual framework of KM as a service in cloud. Framework presented is enhanced and conceptual framework of KM is embedded into that framework to store projects related knowledge for future use.

Keywords: management, Globsl software development, global software engineering

Procedia PDF Downloads 518
7981 Analysis of Economic Development Challenges of Rapid Population Growth in Nigeria: Way Forward

Authors: Sabiu Abdullahi Yau

Abstract:

Nigeria is a high fertility country that experiences eye-popping population growth, with no end in sight. However, there is evidence that its large population inhibits government’s efforts in meeting the basic needs of the people. Moreover, past and present governments of Nigeria have been committing huge amount of financial resources to meet the basic infrastructural requirements capable of propelling growth and development. Despite the country’s large population and abundant natural resources, poverty, unemployment, rural-urban migration, deforestation and inadequate infrastructural facilities have been persistently on the increase resulting in consistent failure of government policies to impact positively on the economy. This paper, however, identifies and critically analyses the major development challenges caused by population growth in Nigeria using secondary data. The paper concludes that for the Nigeria’s economy to develop, all the identified challenges posed by rapid population growth must be promptly and squarely addressed.

Keywords: economic development, population, growth, Nigeria

Procedia PDF Downloads 320
7980 “Friction Surfaces” of Airport Emergency Plan

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes

Procedia PDF Downloads 513
7979 The Labor Market in Western Balcans

Authors: Lavdosh Lazemetaj

Abstract:

The labor market in W.B. Countries presents problems and challenges, this is dictated by different risk factors. The levels of unemployment in the region are high and the rates of its reduction are a challenge. This paper presents these challenges and problems that the countries face. of the BP region. The region as a whole and the countries in their particularity are analyzed, according to the specifics, the development trends related to the labor market are looked at. Conclusions are also given that emerge from the analysis of the labor markets prior to the monitoring done by the EU and the World Bank.

Keywords: Economic Development, European Union, Economic Growth, Labor Market

Procedia PDF Downloads 91
7978 Social Enterprises over Microfinance Institutions: The Challenges of Governance and Management

Authors: Dean Sinković, Tea Golja, Morena Paulišić

Abstract:

Upon the end of the vicious war in former Yugoslavia in 1995, international development community widely promoted microfinance as the key development framework to eradicate poverty, create jobs, increase income. Widespread claims were made that microfinance institutions would play vital role in creating a bedrock for sustainable ‘bottom-up’ economic development trajectory, thus, helping newly formed states to find proper way from economic post-war depression. This uplifting neoliberal narrative has no empirical support in the Republic of Croatia. Firstly, the type of enterprises created via microfinance sector are small, unskilled, labor intensive, no technology and with huge debt burden. This results in extremely high failure rates of microenterprises and poor individuals plunging into even deeper poverty, acute indebtedness and social marginalization. Secondly, evidence shows that microcredit is exact reflection of dangerous and destructive sub-prime lending model with ‘boom-to-bust’ scenarios in which benefits are solely extracted by the tiny financial and political elite working around the microfinance sector. We argue that microcredit providers are not proper financial structures through which developing countries should look way out of underdevelopment and poverty. In order to achieve sustainable long-term growth goals, public policy needs to focus on creating, supporting and facilitating the small and mid-size enterprises development. These enterprises should be technically sophisticated, capable of creating new capabilities and innovations, with managerial expertise (skills formation) and inter-connected with other organizations (i.e. clusters, networks, supply chains, etc.). Evidence from South-East Europe suggest that such structures are not created via microfinance model but can be fostered through various forms of social enterprises. Various legal entities may operate as social enterprises: limited liability private company, limited liability public company, cooperative, associations, foundations, institutions, Mutual Insurances and Credit union. Our main hypothesis is that cooperatives are potential agents of social and economic transformation and community development in the region. Financial cooperatives are structures that can foster more efficient allocation of financial resources involving deeper democratic arrangements and more socially just outcomes. In Croatia, pioneers of the first social enterprises were civil society organizations whilst forming a separated legal entity. (i.e. cooperatives, associations, commercial companies working on the principles of returning the investment to the founder). Ever since 1995 cooperatives in Croatia have not grown by pursuing their own internal growth but mostly by relying on external financial support. The greater part of today’s registered cooperatives tend to be agricultural (39%), followed by war veterans cooperatives (38%) and others. There are no financial cooperatives in Croatia. Due to the above mentioned we look at the historical developments and the prevailing social enterprises forms and discuss their advantages and disadvantages as potential agents for social and economic transformation and community development in the region. There is an evident lack of understanding of this business model and of its potential for social and economic development followed by an unfavorable institutional environment. Thus, we discuss the role of governance and management in the formation of social enterprises in Croatia, stressing the challenges for the governance of the country’s social enterprise movement.

Keywords: financial cooperatives, governance and management models, microfinance institutions, social enterprises

Procedia PDF Downloads 263
7977 Challenges Faced by the Visually Impaired Children and their Parents in Doing Homework Assignments Using Braille

Authors: Shazia Farooq Mirza

Abstract:

The purpose of this study was to explore the challenges faced by visually impaired children and their parents in doing homework assignments using Braille. This study had a quantitative approach and it was descriptive in nature. It took place in 6 public and special private schools of Lahore.177 visually impaired children of grades 4-10 and 153 parents of the visually impaired children were the volunteer participants of this study which were selected through a convenient sampling method. A survey method was adopted for the data collection. And for this purpose 2 self-developed validated questionnaires were used as instruments. The instruments were constructed by exploring the factors and sub-factors from the literature review. Thirty students with visual impairment and 30 parents of the students with visual impairment filled the questionnaires as a pilot study, and it ensured the reliability of the instruments. Data were analyzed using a statistical package of social sciences and it was completely interpreted. Findings revealed that the common challenges faced by the students with visual impairment were Physical Stress, Readiness, Braille Knowledge, Braille Skill and Communications. And the major challenges faced by the parents of the students with visual impairment were the Availability of the helping material, the Availability of the reading material, Braille Knowledge, Braille skills, School and family interactions, Behavior management and the Environment and equipment. Conclusions were drawn on the basis of the major findings. Future suggestions are given in light of the conclusions. This study will be beneficial for the children with visual impairment, the parents of the children with visual impairment, the special education teachers and for the policymakers of the special schools.

Keywords: challenges, visually impaired children, homework, parents, braille

Procedia PDF Downloads 115
7976 Digital Economy as an Alternative for Post-Pandemic Recovery in Latin America: A Literature Review

Authors: Armijos-Orellana Ana, González-Calle María, Maldonado-Matute Juan, Guerrero-Maxi Pedro

Abstract:

Nowadays, the digital economy represents a fundamental element to guarantee economic and social development, whose importance increased significantly with the arrival of the COVID-19 pandemic. However, despite the benefits it offers, it can also be detrimental to those developing countries characterized by a wide digital divide. It is for this reason that the objective of this research was to identify and describe the main characteristics, benefits, and obstacles of the digital economy for Latin American countries. Through a bibliographic review, using the analytical-synthetic method in the period 1995-2021, it was determined that the digital economy could give way to structural changes, reduce inequality, and promote processes of social inclusion, as well as promote the construction and participatory development of organizational structures and institutional capacities in Latin American countries. However, the results showed that the digital economy is still incipient in the region and at least three factors are needed to establish it: joint work between academia, the business sector and the State, greater emphasis on learning and application of digital transformation and the creation of policies that encourage the creation of digital organizations.

Keywords: developing countries, digital divide, digital economy, digital literacy, digital transformation

Procedia PDF Downloads 133
7975 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect

Authors: Debasish Nandy

Abstract:

India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.

Keywords: bilateral, diplomacy, infiltration, terrorism

Procedia PDF Downloads 532
7974 Challenges of Integrating Islamic Education with Contemporary Secular System in Igaland, Kogi State Of Nigeria

Authors: Yunusa Odiba

Abstract:

Islam, from its root is a divine religion and it does not exercise anything except within the scope of its divinity-its culture, tradition morality, and the like. The damage done to the legacies, traditions, culture, morality, viability, continued existence and relevance of the Islamic religious way of life by the prevalent western secular education system in the Muslim world has become a thing of interest to many scholars especially, the Muslim scholars, hence, advocating the integration of Islamic education with the western circular educational system. The aim is to produce a new generation of dedicated Muslims whose education has prepared them for the challenges of contemporary materialistic circulation alongside real Islamic knowledge. This paper, however, examines the process of integrating Islamic schools with the contemporary western based schools that would under-take the unification which should function as basic organ of Muslim ideological revivalism, cultural retention, identity formation, socio-economic development, and scientific and ecological inventiveness.

Keywords: challenges, integrating, Islamic education, secular system, Igalaland

Procedia PDF Downloads 688
7973 Systems Lens: Towards Sustainable Management of Maintenance and Renewal of Wire-Based Infrastructure: The Case of Water Network in the City of Linköping, Sweden

Authors: E. Hegazy, S. Anderberg, J. Krook

Abstract:

The city's wire-based infrastructure systems (WBIS) are responsible for the delivery of electricity, telecommunications, sanitation, drainage, and district heating and are a necessity for sustainable modern urban life. Maintaining the functionality of these structures involves high costs and, brings disturbance to the local community and effects on the environment. One key reason for this is that the cables and pipes are placed under streets, making system parts easily worn and their service lifetime reduced, and all maintenance and renewal rely on recurrent needs for excavation. In Sweden, a significant part of wire-based infrastructure is already outdated and will need to be replaced in the coming decades. The replacement of these systems will entail massive costs as well as important traffic disruption and environmental disturbance. However, this challenge may also open a unique opportunity to introduce new, more sustainable technologies and management practices. The transformation of WBIS management for long-term sustainability and meeting maintenance and renewal needs does not have a comprehensive approach. However, a systemic approach may inform WBIS management. This approach considers both technical and non-technical aspects, as well as time-related factors. Nevertheless, there is limited systemic knowledge of how different factors influence current management practices. The aim of this study is to address this knowledge gap and contribute to the understanding of what factors influence the current practice of WBIS management. A case study approach is used to identify current management practices, the underlying factors that influence them, and their implications for sustainability outcomes. The case study is based on both quantitative data on the local system and data from interviews and workshops with local practitioners and other stakeholders. Linköping was selected as a case since it provided good accessibility to the water administration and relevant data for analyzing water infrastructure management strategies. It is a sufficiently important city in Sweden to be able to identify challenges, which, to some extent, are common to all Swedish cities. By uncovering current practices and what is influencing Linköping, knowledge gaps and uncertainties related to sustainability consequences were highlighted. The findings show that goals, priorities, and policies controlling management are short-termed, and decisions on maintenance and renewal are often restricted to finding solutions to the most urgent issues. Sustainability transformation in the infrastructure area will not be possible through individual efforts without coordinated technical, organizational, business, and regulatory changes.

Keywords: case study, infrastructure, management, practice, Sweden

Procedia PDF Downloads 77
7972 Role of Music in the Mainstream Educational Curriculum: A Study in the Light of Noble Laureate Rabindranath Tagore's Educational Philosophy

Authors: Tripti Watwe

Abstract:

Music or art of any country is its national heritage and represents the cultural personality of that region. Noble Laureate Rabindranath Tagore through his international educational endeavour called ‘Visva-Bharati’ established this concept that music can very much be a part of the mainstream education of a country because the purpose of both music and education is to bring in transformation in an individual. An individual with musical veins is more focused and meditative towards his or her goal in life. That is why in Tagore’s Visva-Bharati, one can observe even the brightest brains from various fields of economics, science, social sciences or literature equally verbal and efficient in Rabindra songs which the poet created under his own name.Tagore established this phenomenon that music if made a part of education and life, brings in profound transformation in the character and over-all personality of a person giving better and responsible citizens to a nation. It is expected that this hypothesis that music and education can be a nectarine combination can be established and proved with the help of various recorded observations containing Tagore’s educational philosophy, his experiments in his own institution ‘Visva-Bharati’ and through recorded research materials which have been gathered during the author’s field work in Visva-Bharati.

Keywords: Rabindranath Tagore, Visva-Bharati, education, music, philosophy

Procedia PDF Downloads 289
7971 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana

Authors: Tamekloe Michael Kossivi, Kenichi Matsui

Abstract:

Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.

Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation

Procedia PDF Downloads 123
7970 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 291
7969 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 56
7968 Rural Electrification in India-Challenges and Solutions

Authors: P. Chandhra Sekhar, R. A. Deshpande, T. Raghunatha

Abstract:

The government of India has given special attention on rural electrification under Rajiv Gandhi Grameena Vidyuthikarana Yojana (RGGVY) during 10th plan and 11th plan. Government of India electrified about 107523 villages and 21164003 BPL Households. This paper briefs about various rural electrification programs initiated by government of India and status of RGGVY in India. The paper mainly describes about challenges in the rural electrification, new ideas recently implemented and suggestions for improvement in the rural electrification.

Keywords: rural electrification, RGGVY, NJY, BPL

Procedia PDF Downloads 411