Search results for: cyber security
1325 Income Inequality and Its Effects on Household Livelihoods in Parker Paint Community, Liberia
Authors: Robertson Freeman
Abstract:
The prime objective of this research is to examine income inequality and its effects on household livelihoods in Parker Paint. Many researchers failed to address the potential threat of income inequality on diverse household livelihood indicators, including health, food, housing, transport and many others. They examine and generalize the effects of income differentials on household livelihoods by addressing one indicator of livelihood security. This research fills the loopholes of previous research by examining the effects of income inequality and how it affects the livelihoods of households, taking into consideration livelihood indicators including health, food security, and transport. The researcher employed the mixed research method to analyze the distribution of income and solicit opinions of household heads on the effects of their monthly income on their livelihoods. Age and sex structure, household composition, type of employment and educational status influence income inequality. The level of income, Lorenz curve and the Gini coefficient was mutually employed to calculate and determine the level of income inequality. One hundred eighty-two representing 96% of household heads are employed while 8, representing 4%, are unemployed. However, out of a total number of 182 employed, representing 96%, 27 people representing 14%, are employed in the formal private sector, while 110, representing 58%, are employed in the private informal sector. Monthly average income, savings, investments and unexpected circumstances affect the livelihood of households. Infrastructural development and wellbeing should be pursued by reducing expenditure earmarked in other sectors and channeling the funds towards the provision of household needs. One of the potent tools for consolidating household livelihoods is to initiate livelihood empowerment programs. Government and private sector agencies should establish more health insurance schemes, providing mosquito nets, immunization services, public transport, as well as embarking on feeding programs, especially in the remote areas of Parker paint. To climax the research findings, self-employment, entrepreneurship and the general private sector employment is a transparent double-edged sword. If employed in the private sector, there is the likelihood to increase one’s income. However, this also induces the income gap between the rich and poor since many people are exploited by affluence, thereby relegating the poor from the wealth hierarchy. Age and sex structure, as well as type of employment, should not be overlooked since they all play fundamental roles in influencing income inequality. Savings and investments seem to play a positive role in reducing income inequality. However, savings and investment in this research affect livelihoods negatively. It behooves mankind to strive and work hard to the best of ability in earning sufficient income and embracing measures to retain his financial strength. In so doing, people will be able to provide basic household needs, celebrate the reduction in unemployment and dependence and finally ensure sustainable livelihoods.Keywords: income, inequality, livelihood, pakerpaint
Procedia PDF Downloads 1241324 Three Star Hotels in Sukhumvit Area of Bangkok and the Potential to Be in Tourism Industry Joining the ASEAN Community
Authors: Benjaporn Yaemjamuang, Sasitorn Jetanont
Abstract:
The three star hotels in Sukhumvit area of Bangkok and the potential to be in the tourism industry joining the ASEAN Community were studied. The findings revealed that the representative samples satisfy the potential of hotel services at a high level in all aspects. The level of service satisfaction by gender is not different. On the other hand, for different ethnic origins, ages, occupations, levels of education, the satisfaction on the services varies in significance level of 0.05. Factors associated with satisfaction in the services of the hotel include a potential location and environment. It was also found that satisfaction with the service aspects are related as follows: services (r = .810), food (r = .807), booking service (r = .768), room condition (r = .762) and security (r =.756) which is aligned with the coefficient .826.Keywords: three star hotel, ASEAN community, potential in tourism industry, Bangkok
Procedia PDF Downloads 3021323 Intellectual Property in Digital Environment
Authors: Balamurugan L.
Abstract:
Artificial intelligence (AI) and its applications in Intellectual Property Rights (IPR) has been significantly growing in recent years. In last couple of years, AI tools for Patent Research and Patent Analytics have been well-stabilized in terms of accuracy of references and representation of identified patent insights. However, AI tools for Patent Prosecution and Patent Litigation are still in the nascent stage and there may be a significant potential if such market is explored further. Our research is primarily focused on identifying potential whitespaces and schematic algorithms to automate the Patent Prosecution and Patent Litigation Process of the Intellectual Property. The schematic algorithms may assist leading AI tool developers, to explore such opportunities in the field of Intellectual Property. Our research is also focused on identification of pitfalls of the AI. For example, Information Security and its impact in IPR, and Potential remediations to sustain the IPR in the digital environment.Keywords: artificial intelligence, patent analytics, patent drafting, patent litigation, patent prosecution, patent research
Procedia PDF Downloads 671322 Study of the Landslide and Stability of Open Pit Quarry: Case of Open Pite Quarry of Chouf Amar M'sila, Algeria
Authors: Saadoun Abd Errazak, Hafssaoui Abdallah, Fredj Mohamed
Abstract:
Mining operations open induce risks of instability that can cause landslides and collapse at the bleachers slope. These risks may occur both during and after the operation phase. The magnitude of these risks depends on the mechanical and physical characteristics of the rock mass, the geometrical dimensions of ore bodies, their spatial arrangement, and the state of the operated area. If security and technology measures are not taken into account for this purpose, the environment will be affected. The main objective of this work is to assess these risks by analytical and numerical methods. The study is based on the geological, hydrogeological and geotechnical rock mass of the open pit quarry of Chouf Amar M'sila. The results obtained have allowed us to obtain an acceptable factor of safety and stability study of the open pit.Keywords: stability, land sliding, numerical modeling, safety factor, open-pit quarry
Procedia PDF Downloads 3751321 A Review on Assessment on the Level of Development of Macedonia and Iran Organic Agriculture as Compared to Nigeria
Authors: Yusuf Ahmad Sani, Adamu Alhaji Yakubu, Alhaji Abdullahi Jamilu, Joel Omeke, Ibrahim Jumare Sambo
Abstract:
With the rising global threat of food security, cancer, and related diseases (carcinogenic) because of increased usage of inorganic substances in agricultural food production, the Ministry of Food Agriculture and Livestock of the Republic of Turkey organized an International Workshop on Organic Agriculture between 8 – 12th December 2014 at the International Agricultural Research and Training Center, Izmir. About 21 countries, including Nigeria, were invited to attend the training workshop. Several topics on organic agriculture were presented by renowned scholars, ranging from regulation, certification, crop, animal, seed production, pest and disease management, soil composting, and marketing of organic agricultural products, among others. This paper purposely selected two countries (Macedonia and Iran) out of the 21 countries to assess their level of development in terms of organic agriculture as compared to Nigeria. Macedonia, with a population of only 2.1 million people as of 2014, started organic agriculture in 2005 with only 266ha of land and has grown significantly to over 5,000ha in 2010, covering such crops as cereals (62%), forage (20%) fruit orchard (7%), vineyards (5%), vegetables (4%), oil seed and industrial crops (1%) each. Others are organic beekeeping from 110 hives to over 15,000 certified colonies. As part of government commitment, the level of government subsidy for organic products was 30% compared to the direct support for conventional agricultural products. About 19 by-laws were introduced on organic agricultural production that was fully consistent with European Union regulations. The republic of Iran, on the other hand, embarked on organic agriculture for the fact, that the country recorded the highest rate of cancer disease in the world, with over 30,000 people dying every year and 297 people diagnosed every day. However, the host country, Turkey, is well advanced in organic agricultural production and now being the largest exporter of organic products to Europe and other parts of the globe. A technical trip to one of the villages that are under the government scheme on organic agriculture reveals that organic agriculture was based on market-demand-driven and the support of the government was very visible, linking the farmers with private companies that provide inputs to them while the companies purchase the products at harvest with high premium price. However, in Nigeria, research on organic agriculture was very recent, and there was very scanty information on organic agriculture due to poor documentation and very low awareness, even among the elites. The paper, therefore, recommends that the government should provide funds to NARIs to conduct research on organic agriculture and to establish clear government policy and good pre-conditions for sustainable organic agricultural production in the country.Keywords: organic agriculture, food security, food safety, food nutrition
Procedia PDF Downloads 501320 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq
Authors: Ardawan Mustafa Ismail, Rebaz Sdiq Ismail
Abstract:
The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.Keywords: minority, international law, protection, Kurdistan, people
Procedia PDF Downloads 371319 Scalable Performance Testing: Facilitating The Assessment Of Application Performance Under Substantial Loads And Mitigating The Risk Of System Failures
Authors: Solanki Ravirajsinh
Abstract:
In the software testing life cycle, failing to conduct thorough performance testing can result in significant losses for an organization due to application crashes and improper behavior under high user loads in production. Simulating large volumes of requests, such as 5 million within 5-10 minutes, is challenging without a scalable performance testing framework. Leveraging cloud services to implement a performance testing framework makes it feasible to handle 5-10 million requests in just 5-10 minutes, helping organizations ensure their applications perform reliably under peak conditions. Implementing a scalable performance testing framework using cloud services and tools like JMeter, EC2 instances (Virtual machine), cloud logs (Monitor errors and logs), EFS (File storage system), and security groups offers several key benefits for organizations. Creating performance test framework using this approach helps optimize resource utilization, effective benchmarking, increased reliability, cost savings by resolving performance issues before the application is released. In performance testing, a master-slave framework facilitates distributed testing across multiple EC2 instances to emulate many concurrent users and efficiently handle high loads. The master node orchestrates the test execution by coordinating with multiple slave nodes to distribute the workload. Slave nodes execute the test scripts provided by the master node, with each node handling a portion of the overall user load and generating requests to the target application or service. By leveraging JMeter's master-slave framework in conjunction with cloud services like EC2 instances, EFS, CloudWatch logs, security groups, and command-line tools, organizations can achieve superior scalability and flexibility in their performance testing efforts. In this master-slave framework, JMeter must be installed on both the master and each slave EC2 instance. The master EC2 instance functions as the "brain," while the slave instances operate as the "body parts." The master directs each slave to execute a specified number of requests. Upon completion of the execution, the slave instances transmit their results back to the master. The master then consolidates these results into a comprehensive report detailing metrics such as the number of requests sent, encountered errors, network latency, response times, server capacity, throughput, and bandwidth. Leveraging cloud services, the framework benefits from automatic scaling based on the volume of requests. Notably, integrating cloud services allows organizations to handle more than 5-10 million requests within 5 minutes, depending on the server capacity of the hosted website or application.Keywords: identify crashes of application under heavy load, JMeter with cloud Services, Scalable performance testing, JMeter master and slave using cloud Services
Procedia PDF Downloads 271318 The Historical Framework of International Crime in International Criminal Law
Authors: Tahraoui Boualem
Abstract:
Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war.Keywords: historical framework, of international crime, peace or war., international law
Procedia PDF Downloads 1001317 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3661316 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review
Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta
Abstract:
Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism
Procedia PDF Downloads 3891315 Hybrid Obfuscation Technique for Reverse Engineering Problem
Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro
Abstract:
Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.Keywords: intellectual property, obfuscation, software security, reverse engineering
Procedia PDF Downloads 1461314 The Importance of Fire Safety in Egypt
Authors: Omar Shakra
Abstract:
This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.Keywords: fire, system, protection, fire hydrants, security, alarms
Procedia PDF Downloads 1091313 Overview of Wireless Body Area Networks
Authors: Rashi Jain
Abstract:
The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.Keywords: vehicular networks, sensors, MicroController 8085, LTE
Procedia PDF Downloads 2591312 Role of Corporate Social Responsibility in Corporate Governance: Effectiveness of CSR in Human Rights
Authors: Md. Awal Hossain Mollah
Abstract:
Corporate governance is playing a crucial role for ensuring social accountability and responsibility of business organization through Corporate Social Responsibility (CSR) for the last two decades. In Bangladesh, CSR is a growing and popular concept and a recent development. Various business and corporate organizations are playing crucial role for helping vulnerable sections of our society now. For instance, Dutch Bangla Bank has been providing scholarship for under graduate and graduate students in our country which is very helpful for promoting poor and meritorious students in Bangladesh. In this study, how far CSR is playing its role for ensuring human right in Bangladesh will be examined with specific case studies. The study focus will reflect on both developed and developing nations based on literature review and possible empirical evidence.Keywords: CSR, corporate governance, social security, Bangladesh, scholarships, graduate students, Dutch angla Bank
Procedia PDF Downloads 3641311 Digital Twins: Towards an Overarching Framework for the Built Environment
Authors: Astrid Bagireanu, Julio Bros-Williamson, Mila Duncheva, John Currie
Abstract:
Digital Twins (DTs) have entered the built environment from more established industries like aviation and manufacturing, although there has never been a common goal for utilising DTs at scale. Defined as the cyber-physical integration of data between an asset and its virtual counterpart, DT has been identified in literature from an operational standpoint – in addition to monitoring the performance of a built asset. However, this has never been translated into how DTs should be implemented into a project and what responsibilities each project stakeholder holds in the realisation of a DT. What is needed is an approach to translate these requirements into actionable DT dimensions. This paper presents a foundation for an overarching framework specific to the built environment. For the purposes of this research, the UK widely used the Royal Institute of British Architects (RIBA) Plan of Work from 2020 is used as a basis for itemising project stages. The RIBA Plan of Work consists of eight stages designed to inform on the definition, briefing, design, coordination, construction, handover, and use of a built asset. Similar project stages are utilised in other countries; therefore, the recommendations from the interviews presented in this paper are applicable internationally. Simultaneously, there is not a single mainstream software resource that leverages DT abilities. This ambiguity meets an unparalleled ambition from governments and industries worldwide to achieve a national grid of interconnected DTs. For the construction industry to access these benefits, it necessitates a defined starting point. This research aims to provide a comprehensive understanding of the potential applications and ramifications of DT in the context of the built environment. This paper is an integral part of a larger research aimed at developing a conceptual framework for the Architecture, Engineering, and Construction (AEC) sector following a conventional project timeline. Therefore, this paper plays a pivotal role in providing practical insights and a tangible foundation for developing a stage-by-stage approach to assimilate the potential of DT within the built environment. First, the research focuses on a review of relevant literature, albeit acknowledging the inherent constraint of limited sources available. Secondly, a qualitative study compiling the views of 14 DT experts is presented, concluding with an inductive analysis of the interview findings - ultimately highlighting the barriers and strengths of DT in the context of framework development. As parallel developments aim to progress net-zero-centred design and improve project efficiencies across the built environment, the limited resources available to support DTs should be leveraged to propel the industry to reach its digitalisation era, in which AEC stakeholders have a fundamental role in understanding this, from the earliest stages of a project.Keywords: digital twins, decision-making, design, net-zero, built environment
Procedia PDF Downloads 1231310 Tamper Resistance Evaluation Tests with Noise Resources
Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi
Abstract:
Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources
Procedia PDF Downloads 5041309 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 511308 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation
Authors: Y. Atilgan Şengül
Abstract:
Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.Keywords: healthcare, health informatics, medical record system, questionnaire
Procedia PDF Downloads 1731307 Human Rights Impact on Citizens Evolution
Authors: Joseph Marzouk Gerais Abdelmalak
Abstract:
The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 731306 Determining of Importance Level of Factors Affecting Job Selection with the Method of AHP
Authors: Nurullah Ekmekci, Ömer Akkaya, Kazım Karaboğa, Mahmut Tekin
Abstract:
Job selection is one of the most important decisions that affect their lives in the name of being more useful to themselves and the society. There are many criteria to consider in the job selection. The amount of criteria in the job selection makes it a multi-criteria decision-making (MCDM) problem. In this study; job selection has been discussed as multi-criteria decision-making problem and has been solved by Analytic Hierarchy Process (AHP), one of the multi-criteria decision making methods. A survey, contains 5 different job selection criteria (finding a job friendliness, salary status, job , social security, work in the community deems reputation and business of the degree of difficulty) within many job selection criteria and 4 different job alternative (being academician, working at the civil service, working at the private sector and working at in their own business), has been conducted to the students of Selcuk University Faculty of Economics and Administrative Sciences. As a result of pairwise comparisons, the highest weighted criteria in the job selection and the most coveted job preferences were identified.Keywords: analytical hierarchy process, job selection, multi-criteria, decision making
Procedia PDF Downloads 4001305 Political Determinants of Sovereign Spread: The Great East-West Divide
Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic
Abstract:
We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.Keywords: sovereign bonds, European Union, developing countries, political determinants
Procedia PDF Downloads 3111304 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables
Authors: Vicx Farm
Abstract:
This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.Keywords: energy, agriculture, sustainability, power
Procedia PDF Downloads 741303 A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Authors: Seyed Mahdi Jameii
Abstract:
Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay.Keywords: attacks, routing, security, underwater wireless sensor networks
Procedia PDF Downloads 4181302 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria
Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria
Abstract:
The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.Keywords: dental surgeon, medical devices, sterilization, survey
Procedia PDF Downloads 4021301 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 5041300 Using Multi-Level Analysis to Identify Future Trends in Small Device Digital Communication Examinations
Authors: Mark A. Spooner
Abstract:
The growth of technological advances in the digital communications industry has dictated the way forensic examination laboratories receive, analyze, and report on digital evidence. This study looks at the trends in a medium sized digital forensics lab that examines small communications devices (i.e., cellular telephones, tablets, thumb drives, etc.) over the past five years. As law enforcement and homeland security organizations budgets shrink, many agencies are being asked to perform more examinations with less resources available. Using multi-level statistical analysis using five years of examination data, this research shows the increasing technological demand trend. The research then extrapolates the current data into the model created and finds a continued exponential growth curve of said demands is well within the parameters defined earlier on in the research.Keywords: digital forensics, forensic examination, small device, trends
Procedia PDF Downloads 1991299 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification
Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune
Abstract:
This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP
Procedia PDF Downloads 721298 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand
Authors: Rahil Saeedi
Abstract:
The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking
Procedia PDF Downloads 1671297 The Web Site Development for E-Commerce Trading in Thailand Customers View
Authors: Ladaporn Pithuk
Abstract:
The purposes of the study were to ascertain the customer requirement, to identify the factors related to online business in Thailand. The sample of this study consisted of 400 customers who are purchasing product and service on E-commerce. To get primary sources, a questionnaire consisting of 31 questions was designed and adapted from previous studies. The data from the questionnaires were collected and analyzed in descriptive forms and (ONE-WAY ANOVA) was conducted. The majority of the respondents showed customer requirement by stating “moderately agree” for questions asking them about customization, connection, content, commerce, context, communication and community, however, they also displayed negative attitudes by identifying “moderately disagree” for security concerns and after-sales services. These important issues need to be improved immediately since it can encourage customers to buy goods and services through the Internet or discourage them, and businesses should offer more channels of payment methods for customers for instance, e-payment.Keywords: customer requirement, customization, connection, online business
Procedia PDF Downloads 2011296 'Bemo' (Beras Moringa) as Commodity Innovation Cost of Food Ingredients: In Dealing with Afta Competition
Authors: Isma Alfia Novita
Abstract:
Indonesia is one country with the largest agricultural producer in the world but still can not meet the needs of the national rice. In addition, Indonesia was ranked the second-largest rice importer after the Philippines. Indonesia's rice consumption reached 102 kg per capita, or almost twice the average global rice consumption is only 60 kg per capita per year. One of the government's efforts in developing national food consumption is to invite people to improve diversification and food security. This is done considering the diet of Indonesia is still high consumption of rice. Therefore, this program made innovations Rice Moringa namely imitation rice with the addition of Moringa (Moringa oleifera). Moringa is a plant that is widely grown and easily found. In addition, Moringa has many benefits because it contains vitamin A, vitamin B, vitamin C, calcium, protein, and potassium. Based on the analysis of the nutrient content, it is known that the Moringa leaves have good potential to maintain the balance of nutrients in the bodyKeywords: imitation rice, Moringa oliefera, Moringa, AFTA
Procedia PDF Downloads 129