Search results for: SMS security
1265 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection
Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor
Abstract:
Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing
Procedia PDF Downloads 2041264 A Pervasive System Architecture for Smart Environments in Internet of Things Context
Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço
Abstract:
Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.Keywords: internet of things, cloud, intelligent personal assistant, architecture
Procedia PDF Downloads 5121263 Web 2.0 in Higher Education: The Instructors’ Acceptance in Higher Educational Institutes in Kingdom of Bahrain
Authors: Amal M. Alrayes, Hayat M. Ali
Abstract:
Since the beginning of distance education with the rapid evolution of technology, the social network plays a vital role in the educational process to enforce the interaction been the learners and teachers. There are many Web 2.0 technologies, services and tools designed for educational purposes. This research aims to investigate instructors’ acceptance towards web-based learning systems in higher educational institutes in Kingdom of Bahrain. Questionnaire is used to investigate the instructors’ usage of Web 2.0 and the factors affecting their acceptance. The results confirm that instructors had high accessibility to such technologies. However, patterns of use were complex. Whilst most expressed interest in using online technologies to support learning activities, learners seemed cautious about other values associated with web-based system, such as the shared construction of knowledge in a public format. The research concludes that there are main factors that affect instructors’ adoption which are security, performance expectation, perceived benefits, subjective norm, and perceived usefulness.Keywords: Web 2.0, higher education, acceptance, students' perception
Procedia PDF Downloads 3361262 Automated Prepaid Billing Subscription System
Authors: Adekunle K. O, Adeniyi A. E, Kolawole E
Abstract:
One of the most dramatic trends in the communications market in recent years has been the growth of prepaid services. Today, prepaid no longer constitutes the low-revenue, basic-service segment. It is driven by a high margin, value-add service customers who view it as a convenient way of retaining control over their usage and communication spending while expecting high service levels. To service providers, prepaid services offer the advantage of reducing bad accounts while allowing them to predict usage and plan network resources. Yet, the real-time demands of prepaid services require a scalable, real-time platform to manage customers through their entire life cycle. It delivers integrated real-time rating, voucher management, recharge management, customer care and service provisioning for the generation of new prepaid services. It carries high scalability that can handle millions of prepaid customers in real-time through their entire life cycle.Keywords: prepaid billing, voucher management, customers, automated, security
Procedia PDF Downloads 1131261 Face Tracking and Recognition Using Deep Learning Approach
Authors: Degale Desta, Cheng Jian
Abstract:
The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.Keywords: deep learning, face recognition, identification, fast-RCNN
Procedia PDF Downloads 1371260 Spatial Correlation of Channel State Information in Real Long Range Measurement
Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur
Abstract:
The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially Long Range Wide Area Network (LoRaWAN). In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated from each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems by getting access to a wider band.Keywords: IoT, LPWAN, LoRa, effective signal power, onsite measurement
Procedia PDF Downloads 1611259 Explaining the Acceptance and Adoption of Digital Technologies: Digital Government in Saudi Arabia
Authors: Mohammed Alhamed
Abstract:
This research examines the factors influencing the acceptance and adoption of digital technologies in Saudi Arabia’s government sector by focusing on government employees' attitudes toward digital transformation initiatives. As digital technologies increasingly integrate into public sectors worldwide, there is a requirement to enhance citizen empowerment and government-public interactions as well as understand their impact in unique socio-political contexts like Saudi Arabia. The study aims to explore user attitudes, identify the main challenges, and investigate factors that affect the intention to use digital applications in governmental settings. The study employs a mixed-methods approach by combining quantitative and qualitative data collection to provide a comprehensive view of digital government application adoption. Data was collected through two online surveys administered to 870 government employees and face-to-face semi-structured interviews with 24 participants. This dual approach allows for both statistical analysis and thematic exploration, which provides a deeper understanding of user behaviour, perceived benefits, challenges and attitudes toward these digital applications. Quantitative data were analyzed to identify significant variables influencing adoption, while qualitative responses were coded thematically to uncover recurring themes related to user trust, security, usability and socio-political influences. The results indicate that digital government applications are largely valued for their ability to increase efficiency and accessibility and streamline processes like online documentation and inter-departmental coordination. However, the study highlights that security, privacy, and confidentiality concerns constitute substantial barriers to adoption, with participants calling for stronger cybersecurity measures and data protection policies. Moreover, usability emerged as a key theme that intuitively interfaces in encouraging adoption as respondents emphasized the importance of user-friendly. Additionally, the study found that Saudi Arabia’s unique cultural and organizational dynamics impact acceptance levels with factors like hierarchical structures and varying levels of digital literacy shaping user attitudes. A significant limitation of the study is its exclusive focus on government employees, which may limit the generalizability of the findings to other stakeholder groups, such as the general public. Despite this, the study offers valuable views for policymakers. This, in turn, suggests best practices and guidelines that could enhance the design and implementation of digital government projects. By addressing the identified barriers and leveraging the factors that drive adoption, the study underscores the potential for digital government initiatives to improve efficiency, transparency and responsiveness in Saudi Arabia's public sector. Furthermore, these findings may provide a roadmap for similar countries aiming to adopt digital government solutions within comparable socio-political and economic contexts.Keywords: acceptance, adoption, digital technologies, digital government, Saudi Arabia
Procedia PDF Downloads 101258 Design and Sensitivity Analysis of Photovoltaic/Thermal Solar Collector
Authors: H. M. Farghally, N. M. Ahmed, H. T. El-Madany, D. M. Atia, F. H. Fahmy
Abstract:
Energy is required in almost every aspect of human activities and development of any nation in this world. Increasing fossil fuel price, energy security and climate change have important bearings on sustainable development of any nation. The renewable energy technology is considered one of the drastic approaches taken over the world to reduce the energy problem. The preservation of vegetables by freezing is one of the most important methods of retaining quality in agricultural products over long-term storage periods. Freezing factories show high demand of energy for both heat and electricity; the hybrid Photovoltaic/Thermal (PV/T) systems could be used in order to meet this requirement. This paper presents PV/T system design for freezing factory. Also, the complete mathematical modeling and Matlab Simulink of PV/T collector is introduced. The sensitivity analysis for the manufacturing parameters of PV/T collector is carried out to study their effect on the thermal and electrical efficiency.Keywords: renewable energy, hybrid PV/T system, sensitivity analysis, ecological sciences
Procedia PDF Downloads 2911257 Functioning of Public Distribution System and Calories Intake in the State of Maharashtra
Authors: Balasaheb Bansode, L. Ladusingh
Abstract:
The public distribution system is an important component of food security. It is a massive welfare program undertaken by Government of India and implemented by state government since India being a federal state; for achieving multiple objectives like eliminating hunger, reduction in malnutrition and making food consumption affordable. This program reaches at the community level through the various agencies of the government. The paper focuses on the accessibility of PDS at household level and how the present policy framework results in exclusion and inclusion errors. It tries to explore the sanctioned food grain quantity received by differentiated ration cards according to income criterion at household level, and also it has highlighted on the type of corruption in food distribution that is generated by the PDS system. The data used is of secondary nature from NSSO 68 round conducted in 2012. Bivariate and multivariate techniques have been used to understand the working and consumption of food for this paper.Keywords: calories intake, entitle food quantity, poverty aliviation through PDS, target error
Procedia PDF Downloads 3311256 Industrial and Environmental Safety in the Integrated Security Policy of the Industry: A Corporation and an Enterprise
Authors: Vladimir A. Grachev
Abstract:
Today, in the context of rapidly developing technosphere and hourly emerging new technologies, the industrial and environmental safety issue is ever more pressing. The article is devoted to the relationship of social, environmental, and industrial policies with industrial safety, occupational health and safety, environmental safety, and environmental protection. The author assesses the up-to-day situation through system analysis and on the basis of the existing practices. A complex system of the policies implementation without "gaps" and missing links ensures preservation of human lives, health and a favorable living environment. The author demonstrates that absence of an "environmental safety" high-priority link can lead to a significant loss of human lives and health and the global changes in the environment. The role of implementing the environmental policy of enterprises and organizations, and of economic sectors in the implementation of national environmental policy is shown. It was established that the system for implementing environmental policy should be based on a system analysis.Keywords: environmental protection, environmental safety, industrial safety, occupational health and safety
Procedia PDF Downloads 2141255 Energizing Value Added Farming in Agriculture Economic Aspects towards Sustaining Crop Yield, Quality and Food Safety of Small-Scale Cocoa Farmer in Indonesia
Authors: Burmansyah Muhammad, Supriyoto Supriyoto
Abstract:
Crop yield, quality and food safety are three important components that all estate and food crops must put into consideration to lifting the economic value. These measurements should be evaluated because marketplace demand is simultaneously changing and farmers must adapt quickly to remain competitive. The increase in economic value could be done by producing high quality product that aligns with harvest collector preferences. The purpose of this study is to examine the causal effects of value added farming in agriculture economic aspects towards crop yield, quality and food security. This research is using descriptive survey research by employing data from small-scale cocoa farmers listed to off-taker company, located on Sulawesi area of Indonesia. The questionnaire was obtained from 650 cocoa farmers, selected randomly. Major findings of the study indicate that 78% of respondents agree that agriculture inputs have positive effect on crop yield, quality and food safety. The study recommended that cocoa stakeholders should ensure access to agriculture inputs in first priority and then followed by ensuring access to cocoa supply chain trader and micro-financing. Value Added Farming refers to lifting the economic value of a commodity through particular intervention. Regarding access to agriculture inputs, one of significant intervention is fertilization and plant nutrition management, both organic and inorganic fertilizer. Small-scale cocoa farmers can get access to fertilizer intervention through establishment of demo farm. Ordinary demo farm needs large area, selective requirements, lots of field resources and centralization impact. On the contrary, satellite demo farm is developing to wide-spread the impact of agriculture economic aspects and also the involvement in number of farmers. In Sulawesi Project, we develop leveling strata of small-scale demo farm with group of farmers and local cooperative. With this methodology, all of listed small-scale farmers can get access to agriculture input, micro-financing and how to deliver quality output. PT Pupuk Kaltim is member firm of holding company PT Pupuk Indonesia, private company belongs to the government of Indonesia. The company listed as Indonesia's largest producer of urea fertilizers, besides ammonia, Compound Fertilizer (NPK) and biological fertilizers. To achieve strategic objectives, the company has distinguished award such as SNI Platinum, SGS Award IFA Protect and Sustain Stewardship and Gold Rank of Environment Friendly Company. This achievement has become the strategic foundation for our company to energize value added farming in sustaining food security program. Moreover, to ensure cocoa sustainability farming the company has developed partnership with international companies and Non-Government Organization (NGO).Keywords: fertilizer and plant nutrition management, good agriculture practices, agriculture economic aspects, value-added farming
Procedia PDF Downloads 1011254 Career Anchors and Job Satisfaction of Managers: The Mediating Role of Person-job Fit
Authors: Azadeh Askari, Ali Nasery Mohamad Abadi
Abstract:
The present study was conducted to investigate the relationship between career anchors and job satisfaction with emphasis on the mediating role of person-job fit. 502 managers and supervisors of ten operational areas of a large energy Company were selected as a cluster sample appropriate to the volume. The instruments used in this study were Career Anchor Questionnaire, Job Satisfaction Questionnaire and Person-job fit Questionnaire. Pearson correlation coefficient was used to analyze the data and AMOS software was used to determine the effect of career anchor variables and person-job fit on job satisfaction. Anchors of service and dedication, pure challenge and security and stability increase the person-job fit among managers and also the person-job fit plays a mediating role in relation to the effect it has on job satisfaction through these anchors. In contrast, the anchors of independence and autonomy reduce the person-job fit. Considering the importance of positive organizational attitudes and in order to have an optimal fit between job and worker, it is better that in human resources processes such as hiring and employing, the career anchors of the person should be considered so that the person can have more job satisfaction; and thus bring higher productivity for themselves and the organization.Keywords: career anchor, job satisfaction, person-job fit, energy company, managers
Procedia PDF Downloads 1201253 Role of Non-Renewable and Renewable Energy for Sustainable Electricity Generation in Malaysia
Authors: Hussain Ali Bekhet, Nor Hamisham Harun
Abstract:
The main objective of this paper is to give a comprehensive review of non-renewable energy and renewable energy utilization in Malaysia, including hydropower, solar photovoltaic, biomass and biogas technologies. Malaysia mainly depends on non-renewable energy (natural gas, coal and crude oil) for electricity generation. Therefore, this paper provides a comprehensive review of the energy sector and discusses diversification of electricity generation as a strategy for providing sustainable energy in Malaysia. Energy policies and strategies to protect the non-renewable energy utilization also are highlighted, focusing in the different sources of energy available for high and sustained economic growth. Emphasis is also placed on a discussion of the role of renewable energy as an alternative source for the increase of electricity supply security. It is now evident that to achieve sustainable development through renewable energy, energy policies and strategies have to be well designed and supported by the government, industries (firms), and individual or community participation. The hope is to create a positive impact on sustainable development through renewable sources for current and future generations.Keywords: Malaysia, non-renewable energy, renewable energy, sustainable energy
Procedia PDF Downloads 4001252 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography
Authors: R. Rama Kishore, Sunesh
Abstract:
Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy
Procedia PDF Downloads 3651251 The Influence of Website Quality on Customer E-Satisfaction in Low Cost Airline
Authors: Zainab Khalifah, Wong Chiet Bing, Noor Hazarina Hashim
Abstract:
The evolution of customer behavior in purchasing products or services through the Internet leads to airline companies engaging in the e-ticketing process in order to maintain their business. A well-designed website is vitally significant for the airline companies to provide effective communication, support, and competitive advantage. This study was conducted to identify the dimensions of website quality for low cost airline and to investigate the relationship between the website quality and customer e-satisfaction at low cost airline. A total of 381 responses were conveniently collected among local passengers at Low Cost Carrier Terminal, Kuala Lumpur via questionnaire distribution. This study found that the five determinant factors of website quality for AirAsia were Information Content, Navigation, Responsiveness, Personalization, and Security and Privacy. The results of this study revealed that there is a positive relationship between the five dimensions of website quality and customer e-satisfaction, and also information content was the most significant contributor to customer e-satisfaction.Keywords: website quality, customer e-satisfaction, low cost airline, e-ticketing
Procedia PDF Downloads 4201250 Domestic and Foreign Terrorism: Evaluation of the Breeding Ground
Authors: T. K. Hung
Abstract:
Terrorism acts have occurred across both developed and developing states, with well-identified motivation and causes. For many years, terrorism eradication has become a major topic yet only passive actions were taken in response to acts. The linkage between the location of terrorism occurrence and breeding ground is not well-documented, resulting in the passive approach used in counter-terrorism nowadays. The evaluation investigates all post-9/11 terrorism affairs considering their state capacity, safety, ease of border access control, religion diversity, and technology access, to measure the level of breeding ground of the states. Those "weak" states with poor border access control, resources capacity and domestic safety are the best breeding ground for terrorists. Although many attacks were caused by religious motivation, religion diversity does not predict the breeding ground. States with censored technology access, particular computer-mediated communication, predict on the terrorism breeding ground, moderated by the level of breeding ground of neighboring states.Keywords: counter-terrorism, lethality, security, terrorism
Procedia PDF Downloads 3371249 Study for Establishing a Concept of Underground Mining in a Folded Deposit with Weathering
Authors: Chandan Pramanik, Bikramjit Chanda
Abstract:
Large metal mines operated with open-cast mining methods must transition to underground mining at the conclusion of the operation; however, this requires a period of a difficult time when production convergence due to interference between the two mining methods. A transition model with collaborative mining operations is presented and established in this work, based on the case of the South Kaliapani Underground Project, to address these technical issues of inadequate production security and other mining challenges during the transition phase and beyond. By integrating the technology of the small-scale Drift and Fill method and Highly productive Sub Level Open Stoping at deep section, this hybrid mining concept tries to eliminate major bottlenecks and offers an optimized production profile with the safe and sustainable operation. Considering every geo-mining aspect, this study offers a genuine and precise technical deliberation for the transition from open pit to underground mining.Keywords: drift and fill, geo-mining aspect, sublevel open stoping, underground mining method
Procedia PDF Downloads 981248 Broadcast Routing in Vehicular Ad hoc Networks (VANETs)
Authors: Muazzam A. Khan, Muhammad Wasim
Abstract:
Vehicular adhoc network (VANET) Cars for network (VANET) allowing vehicles to talk to each other, which is committed to building a strong network of mobile vehicles is technical. In VANETs vehicles are equipped with special devices that can get and share info with the atmosphere and other vehicles in the network. Depending on this data security and safety of the vehicles can be enhanced. Broadcast routing is dispersion of any audio or visual medium of mass communication scattered audience distribute audio and video content, but usually using electromagnetic radiation (waves). The lack of server or fixed infrastructure media messages in VANETs plays an important role for every individual application. Broadcast Message VANETs still open research challenge and requires some effort to come to good solutions. This paper starts with a brief introduction of VANET, its applications, and the law of the message-trends in this network starts. This work provides an important and comprehensive study of reliable broadcast routing in VANET scenario.Keywords: vehicular ad-hoc network , broadcasting, networking protocols, traffic pattern, low intensity conflict
Procedia PDF Downloads 5321247 The Impact of Leadership Culture on Motivation, Efficiency, and Performance of Customs Employees: A Case Study of Iran Customs
Authors: Kazem Samadi
Abstract:
In today’s world, public agencies like customs have become vital institutions in international trade processes and in maintaining national economic security due to increasing economic and commercial complexities. In this regard, human resource management (HRM) is crucial to achieving organizational goals. This research employed a descriptive survey method, in which the statistical population consisted of all customs employees. Using Cochran's formula, 300 employees were selected from the central customs office. A researcher-made questionnaire was used as the data collection tool, with content validity and reliability confirmed using Cronbach's alpha coefficient. The collected data were analyzed through structural modeling using SPSS and AMOS 24. The results indicated that leadership culture significantly affected employee motivation, efficiency, and performance in customs. Customs managers and leaders in Iran can improve organizational productivity by fostering this culture, thereby facilitating individual and organizational development for their staff.Keywords: leadership culture, organizational culture, employee performance, customs
Procedia PDF Downloads 171246 Factors That Stimulate Employee Development in Polish Small Enterprises
Authors: Ewa Rak
Abstract:
This paper is part of a broader research project on employee development in small enterprises, financed by Polish National Science Centre. The project results will serve as basis for a doctoral dissertation. The paper utilises literature studies and qualitative research conducted in small enterprises operating in the Lower Silesia region of Poland. This paper aims to identify some of the factors that stimulate employee development in small companies operating in Poland. The great variety of business pursuits and applications represented by this sector makes it hard to determine a universal configuration of factors to offer best possible conditions for employee development. Research results suggest that each of the examined companies had one or two of such factors in focus, and serving as the basis for the entire pro-development system. These include: employment security (both for employee and entrepreneur) and extensive knowledge and experience of entrepreneurs, but only if it is combined with a willingness and ability to share it.Keywords: employee development, factors that stimulate employee development, human resources development, Poland, small enterprises, training
Procedia PDF Downloads 2661245 Leveraging Advanced Technologies and Data to Eliminate Abandoned, Lost, or Otherwise Discarded Fishing Gear and Derelict Fishing Gear
Authors: Grant Bifolchi
Abstract:
As global environmental problems continue to have highly adverse effects, finding long-term, sustainable solutions to combat ecological distress are of growing paramount concern. Ghost Gear—also known as abandoned, lost or otherwise discarded fishing gear (ALDFG) and derelict fishing gear (DFG)—represents one of the greatest threats to the world’s oceans, posing a significant hazard to human health, livelihoods, and global food security. In fact, according to the UN Food and Agriculture Organization (FAO), abandoned, lost and discarded fishing gear represents approximately 10% of marine debris by volume. Around the world, many governments, governmental and non-profit organizations are doing their best to manage the reporting and retrieval of nets, lines, ropes, traps, floats and more from their respective bodies of water. However, these organizations’ ability to effectively manage files and documents about the environmental problem further complicates matters. In Ghost Gear monitoring and management, organizations face additional complexities. Whether it’s data ingest, industry regulations and standards, garnering actionable insights into the location, security, and management of data, or the application of enforcement due to disparate data—all of these factors are placing massive strains on organizations struggling to save the planet from the dangers of Ghost Gear. In this 90-minute educational session, globally recognized Ghost Gear technology expert Grant Bifolchi CET, BBA, Bcom, will provide real-world insight into how governments currently manage Ghost Gear and the technology that can accelerate success in combatting ALDFG and DFG. In this session, attendees will learn how to: • Identify specific technologies to solve the ingest and management of Ghost Gear data categories, including type, geo-location, size, ownership, regional assignment, collection and disposal. • Provide enhanced access to authorities, fisheries, independent fishing vessels, individuals, etc., while securely controlling confidential and privileged data to globally recognized standards. • Create and maintain processing accuracy to effectively track ALDFG/DFG reporting progress—including acknowledging receipt of the report and sharing it with all pertinent stakeholders to ensure approvals are secured. • Enable and utilize Business Intelligence (BI) and Analytics to store and analyze data to optimize organizational performance, maintain anytime-visibility of report status, user accountability, scheduling, management, and foster governmental transparency. • Maintain Compliance Reporting through highly defined, detailed and automated reports—enabling all stakeholders to share critical insights with internal colleagues, regulatory agencies, and national and international partners.Keywords: ghost gear, ALDFG, DFG, abandoned, lost or otherwise discarded fishing gear, data, technology
Procedia PDF Downloads 941244 The Difference Between Islamic Terrorism and Tha Human Rights In The Middle East
Authors: Mina Latif Ghaly Sawiras
Abstract:
The difference between Islamic terrorism and human-rights has become a big question in the fight against Islamic terrorism globally. This is was raised on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognized in the Vienna Declaration and Program of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, Islamic-terrorism constitutes a violation on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitization’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then conclude with recommendations on how to balance counter-terrorism and human rights in the modern age.Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation
Procedia PDF Downloads 611243 Predictive Models of Ruin Probability in Retirement Withdrawal Strategies
Authors: Yuanjin Liu
Abstract:
Retirement withdrawal strategies are very important to minimize the probability of ruin in retirement. The ruin probability is modeled as a function of initial withdrawal age, gender, asset allocation, inflation rate, and initial withdrawal rate. The ruin probability is obtained based on the 2019 period life table for the Social Security, IRS Required Minimum Distribution (RMD) Worksheets, US historical bond and equity returns, and inflation rates using simulation. Several popular machine learning algorithms of the generalized additive model, random forest, support vector machine, extreme gradient boosting, and artificial neural network are built. The model validation and selection are based on the test errors using hyperparameter tuning and train-test split. The optimal model is recommended for retirees to monitor the ruin probability. The optimal withdrawal strategy can be obtained based on the optimal predictive model.Keywords: ruin probability, retirement withdrawal strategies, predictive models, optimal model
Procedia PDF Downloads 721242 Public Perception on Child Street Hawking in Aba Urban, Abia State, Nigeria
Authors: Paul Anyaogu, E. U. M. Igbo
Abstract:
This study examines the public view on child street hawking in Aba Urban, Abia State, Nigeria, its causes and effect on the child participant and society at large. The study tends to investigate the influence of socioeconomic status on child street hawking. The current situation reflects a chronic urban poverty, which disposed of parents/guardians to send their children and wards of school age to income yielding activities. A social survey research design was employed to select the respondents. A total of 1,108 questionnaires were administered to the respondents of 18 years and above and 1,038 were retrieved. Also, 24 in-depth interviews were conducted in the study area. The findings revealed that child street hawking is on the increase and a serious threat to social cohesion and national security. The study also revealed that poverty is a major cause of child street hawking. The study recommends that government should create job opportunities for urban dwellers, as well as provide social amenities and also put up poverty alleviation/eradication programmes for the people.Keywords: Aba Urban, child street hawking, dangers, disposition, poverty
Procedia PDF Downloads 2781241 Transforming Challenges of Urban and Peri-Urban Agriculture into Opportunities for Urban Food Security in India
Authors: G. Kiran Kumar, K. Padmaja
Abstract:
The rise of urban and peri-urban agriculture (UPA) is an important urban phenomenon that needs to be well understood before we pronounce a verdict whether it is beneficial or not. The challenge of supply of safe and nutritious food is faced by urban inhabitants. The definition of urban and peri-urban varies from city to city depending on the local policies framed with a view to bring regulated urban habitations as part of governance. Expansion of cities and the blurring of boundaries between urban and rural areas make it difficult to define peri-urban agriculture. The problem is further exacerbated by the fact that definition adopted in one region may not fit in the other. On the other hand the proportion of urban population is on the rise vis-à-vis rural. The rise of UPA does not promise that the food requirements of cities can be entirely met from this practice, since availability of enormous amounts of spaces on rooftops and vacant plots is impossible for raising crops. However, UPA reduces impact of price volatility, particularly for vegetables, which relatively have a longer shelf life. UPA improves access to fresh, nutritious and safe food for the urban poor. UPA provides employment to food handlers and traders in the supply chain. UPA can pose environmental and health risks from inappropriate agricultural practices; increased competition for land, water and energy; alter the ecological landscape and make it vulnerable to increased pollution. The present work is based on case studies in peri-urban agriculture in Hyderabad, India and relies on secondary data. This paper tries to analyze the need for more intensive production technologies without affecting the environment. An optimal solution in terms of urban-rural linkages has to be devised. There is a need to develop a spatial vision and integrate UPA in urban planning in a harmonious manner. Zoning of peri-urban areas for agriculture, milk and poultry production is an essential step to preserve the traditional nurturing character of these areas. Urban local bodies in conjunction with Departments of Agriculture and Horticulture can provide uplift to existing UPA models, without which the UPA can develop into a haphazard phenomenon and add to the increasing list of urban challenges. Land to be diverted for peri-urban agriculture may render the concept of urban and peri-urban forestry ineffective. This paper suggests that UPA may be practiced for high value vegetables which can be cultivated under protected conditions and are better resilient to climate change. UPA can provide models for climate resilient agriculture in urban areas which can be replicated in rural areas. Production of organic farm produce is another option for promote UPA owing to the proximity to informed consumers and access to markets within close range. Waste lands in peri-urban areas can be allotted to unemployed rural youth with the support of Urban Local Bodies (ULBs) and used for UPA. This can serve the purposes of putting wastelands to food production, enhancing employment opportunities and enhancing access to fresh produce for urban consumers.Keywords: environment, food security, urban and peri-urban agriculture, zoning
Procedia PDF Downloads 3171240 Thai Tourists’ Satisfaction and Tourist’s Decision Making Process in Southern of Thailand
Authors: Rewadee Waiyawassana
Abstract:
The objectives of the research on Thai tourists’ satisfaction of visiting Southern of Thailand are i) to study the Thai tourists’ satisfaction who select southern of Thailand as their destinations ii) to study their tourist’s decision making process in Southern of Thailand. The samples of the study are 619 Thai visitors at Southern of Thailand by accidental sampling technic and focus group interview for 12 key informant by purposive sampling. The data analysis includes Percentage, Frequency and One-way ANOVA. The findings from the research are the satisfaction of Thai visitors on southern of Thailand ranks from the resources of the destination, transportation, convenience, security, and promotion and public relations; with the high level of satisfaction on all the factors the government or responsible agencies should also modernize the marketing and public relation with increasing public relations, the potential visitors shall be updated with new information and alternative tourist destination also.Keywords: public relations, Southern of Thailand, Thai Tourists’ satisfaction, Tourist’s decision making process
Procedia PDF Downloads 3231239 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations
Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa
Abstract:
This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy
Procedia PDF Downloads 2021238 Technical and Economic Environment in the Polish Power System as the Basis for Distributed Generation and Renewable Energy Sources Development
Authors: Pawel Sowa, Joachim Bargiel, Bogdan Mol, Katarzyna Luszcz
Abstract:
The article raises the issue of the development of local renewable energy sources and the production of distributed energy in context of improving the reliability of the Polish Power System and the beneficial impact on local and national energy security. The paper refers to the current problems of local governments in the process of investment in the area of distributed energy projects, and discusses the issues of the future role and cooperation within the local power plants and distributed energy. Attention is paid to the local communities the chance to raise their own resources and management of energy fuels (biomass, wind, gas mining) and improving the local energy balance. The material presented takes the issue of the development of the energy potential of municipalities and future cooperation with professional energy. As an example, practical solutions used in one of the communes in Silesia.Keywords: distributed generation, mini centers energy, renewable energy sources, reliability of supply of rural commune
Procedia PDF Downloads 5981237 Location Management in Wireless Sensor Networks with Mobility
Authors: Amrita Anil Agashe, Sumant Tapas, Ajay Verma Yogesh Sonavane, Sourabh Yeravar
Abstract:
Due to advancement in MEMS technology today wireless sensors network has gained a lot of importance. The wide range of its applications includes environmental and habitat monitoring, object localization, target tracking, security surveillance etc. Wireless sensor networks consist of tiny sensor devices called as motes. The constrained computation power, battery power, storage capacity and communication bandwidth of the tiny motes pose challenging problems in the design and deployment of such systems. In this paper, we propose a ubiquitous framework for Real-Time Tracking, Sensing and Management System using IITH motes. Also, we explain the algorithm that we have developed for location management in wireless sensor networks with the aspect of mobility. Our developed framework and algorithm can be used to detect emergency events and safety threats and provides warning signals to handle the emergency.Keywords: mobility management, motes, multihop, wireless sensor networks
Procedia PDF Downloads 4161236 Highly-Sensitive Nanopore-Based Sensors for Point-Of-Care Medical Diagnostics
Authors: Leyla Esfandiari
Abstract:
Rapid, sensitive detection of nucleic acid (NA) molecules of specific sequence is of interest for a range of diverse health-related applications such as screening for genetic diseases, detecting pathogenic microbes in food and water, and identifying biological warfare agents in homeland security. Sequence-specific nucleic acid detection platforms rely on base pairing interaction between two complementary single stranded NAs, which can be detected by the optical, mechanical, or electrochemical readout. However, many of the existing platforms require amplification by polymerase chain reaction (PCR), fluorescent or enzymatic labels, and expensive or bulky instrumentation. In an effort to address these shortcomings, our research is focused on utilizing the cutting edge nanotechnology and microfluidics along with resistive pulse electrical measurements to design and develop a cost-effective, handheld and highly-sensitive nanopore-based sensor for point-of-care medical diagnostics.Keywords: diagnostics, nanopore, nucleic acids, sensor
Procedia PDF Downloads 462